Resubmissions
23-09-2024 16:46
240923-t983fatbnp 823-09-2024 16:39
240923-t587mswgrf 723-09-2024 08:53
240923-ktpjeswhnc 10Analysis
-
max time kernel
148s -
max time network
174s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-09-2024 08:53
Static task
static1
Behavioral task
behavioral1
Sample
topaz video enhance ai crack windows/topaz video enhance ai crack windows.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
topaz video enhance ai crack windows/topaz video enhance ai crack windows.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
EarthAccepting/Limitation
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
EarthAccepting/Limitation
Resource
win11-20240802-en
General
-
Target
topaz video enhance ai crack windows/topaz video enhance ai crack windows.exe
-
Size
816.4MB
-
MD5
0ed473ad80f4539c46f043e7d14d4e85
-
SHA1
112d4a25c16a12190e8bc8d5c35346d0eb47acb8
-
SHA256
a903f61b3327529f59ef005efa7b41bdd91ce259b8f4422e1c9c13e5267b2117
-
SHA512
47ef94feb19a7d8de63ae45949369c37624e801afcaed80f31556f700389f8ec02d0546de3a5eda7ae83d2724e8860d7b5b8882ccbdb7e0be766cd280ea8c320
-
SSDEEP
393216:TAVchpPmaXtrAPxE3DjM16vbuo6EigC/Reiaqakjaz8BTwZeJkjoboj:ucFtkPxlqKo6T3Rtg8hv0
Malware Config
Extracted
vidar
11
3a15237aa92dcd8ccca447211fb5fc2a
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
193.3.168.69:41193
Extracted
cryptbot
tventyvf20vs.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Extracted
lumma
https://lootebarrkeyn.shop/api
Signatures
-
Detect Vidar Stealer 4 IoCs
resource yara_rule behavioral1/memory/2008-308-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2008-312-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2008-311-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2008-418-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/788-324-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\International\Geo\Nation Maryland.pif -
Executes dropped EXE 18 IoCs
pid Process 624 Maryland.pif 5020 Maryland.pif 4676 J68F2GcrOotDPlVNDeGdibst.exe 4508 NeNKUOzlnTqlfha4lt3FOAR_.exe 1560 SvuqwJ7_b6dDT0lOzXcomoOj.exe 1012 348nAKb1L5p6wPpb4oyPqpMZ.exe 1600 SQlJBn5uO9wbpdfH6iBfLzaB.exe 1972 MH6mGcwAfkDn8TXWpQGyXTTd.exe 4060 XpgNDSmhbnaqEdT4zF8Asj0j.exe 2012 ou3v8y7ZntvvsrZDKFCCXxwH.exe 3308 kD90KBfuEh4ukYc1GPBTx1CB.exe 4680 qjw7oy9xBoBLXk5FKFoiYD5x.exe 1044 kOCellBTGtxqglJj0netqwhl.exe 3256 VJqvqdM_HScphkMqWbTLiHCW.exe 1180 SvuqwJ7_b6dDT0lOzXcomoOj.tmp 1108 nikkitosscreenrecorder.exe 4860 AdminAAKKECFBGI.exe 4060 AdminDBKFHJEBAA.exe -
Loads dropped DLL 3 IoCs
pid Process 1180 SvuqwJ7_b6dDT0lOzXcomoOj.tmp 4136 RegAsm.exe 4136 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 23 bitbucket.org 25 bitbucket.org 27 bitbucket.org 59 iplogger.org 60 iplogger.org 22 bitbucket.org -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api64.ipify.org 5 api64.ipify.org 7 ipinfo.io 8 ipinfo.io -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 4428 powercfg.exe 3932 powercfg.exe 5056 powercfg.exe 2912 powercfg.exe 4580 powercfg.exe 3828 powercfg.exe 4560 powercfg.exe 4616 powercfg.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 kD90KBfuEh4ukYc1GPBTx1CB.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2740 tasklist.exe 1148 tasklist.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 624 set thread context of 5020 624 Maryland.pif 85 PID 4508 set thread context of 4136 4508 NeNKUOzlnTqlfha4lt3FOAR_.exe 106 PID 4060 set thread context of 2008 4060 XpgNDSmhbnaqEdT4zF8Asj0j.exe 107 PID 2012 set thread context of 788 2012 ou3v8y7ZntvvsrZDKFCCXxwH.exe 108 PID 1012 set thread context of 1296 1012 348nAKb1L5p6wPpb4oyPqpMZ.exe 109 PID 4860 set thread context of 1416 4860 AdminAAKKECFBGI.exe 122 PID 4060 set thread context of 2120 4060 AdminDBKFHJEBAA.exe 123 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\PbConcert topaz video enhance ai crack windows.exe File opened for modification C:\Windows\DeclarationHepatitis topaz video enhance ai crack windows.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1388 sc.exe 4852 sc.exe 4168 sc.exe 4980 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4720 1296 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nikkitosscreenrecorder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J68F2GcrOotDPlVNDeGdibst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SvuqwJ7_b6dDT0lOzXcomoOj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MH6mGcwAfkDn8TXWpQGyXTTd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qjw7oy9xBoBLXk5FKFoiYD5x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SvuqwJ7_b6dDT0lOzXcomoOj.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NeNKUOzlnTqlfha4lt3FOAR_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Maryland.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminAAKKECFBGI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Maryland.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminDBKFHJEBAA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language topaz video enhance ai crack windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kD90KBfuEh4ukYc1GPBTx1CB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ou3v8y7ZntvvsrZDKFCCXxwH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SQlJBn5uO9wbpdfH6iBfLzaB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 348nAKb1L5p6wPpb4oyPqpMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XpgNDSmhbnaqEdT4zF8Asj0j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString qjw7oy9xBoBLXk5FKFoiYD5x.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 qjw7oy9xBoBLXk5FKFoiYD5x.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3576 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 624 Maryland.pif 624 Maryland.pif 624 Maryland.pif 624 Maryland.pif 624 Maryland.pif 624 Maryland.pif 624 Maryland.pif 624 Maryland.pif 624 Maryland.pif 624 Maryland.pif 1180 SvuqwJ7_b6dDT0lOzXcomoOj.tmp 1180 SvuqwJ7_b6dDT0lOzXcomoOj.tmp 2008 RegAsm.exe 2008 RegAsm.exe 3256 VJqvqdM_HScphkMqWbTLiHCW.exe 3256 VJqvqdM_HScphkMqWbTLiHCW.exe 4136 RegAsm.exe 4136 RegAsm.exe 2008 RegAsm.exe 2008 RegAsm.exe 4136 RegAsm.exe 4136 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2740 tasklist.exe Token: SeDebugPrivilege 1148 tasklist.exe Token: SeDebugPrivilege 1044 kOCellBTGtxqglJj0netqwhl.exe Token: SeDebugPrivilege 1972 MH6mGcwAfkDn8TXWpQGyXTTd.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 624 Maryland.pif 624 Maryland.pif 624 Maryland.pif 1180 SvuqwJ7_b6dDT0lOzXcomoOj.tmp -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 624 Maryland.pif 624 Maryland.pif 624 Maryland.pif -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4448 wrote to memory of 1120 4448 topaz video enhance ai crack windows.exe 73 PID 4448 wrote to memory of 1120 4448 topaz video enhance ai crack windows.exe 73 PID 4448 wrote to memory of 1120 4448 topaz video enhance ai crack windows.exe 73 PID 1120 wrote to memory of 2740 1120 cmd.exe 75 PID 1120 wrote to memory of 2740 1120 cmd.exe 75 PID 1120 wrote to memory of 2740 1120 cmd.exe 75 PID 1120 wrote to memory of 4508 1120 cmd.exe 76 PID 1120 wrote to memory of 4508 1120 cmd.exe 76 PID 1120 wrote to memory of 4508 1120 cmd.exe 76 PID 1120 wrote to memory of 1148 1120 cmd.exe 78 PID 1120 wrote to memory of 1148 1120 cmd.exe 78 PID 1120 wrote to memory of 1148 1120 cmd.exe 78 PID 1120 wrote to memory of 2332 1120 cmd.exe 79 PID 1120 wrote to memory of 2332 1120 cmd.exe 79 PID 1120 wrote to memory of 2332 1120 cmd.exe 79 PID 1120 wrote to memory of 1012 1120 cmd.exe 80 PID 1120 wrote to memory of 1012 1120 cmd.exe 80 PID 1120 wrote to memory of 1012 1120 cmd.exe 80 PID 1120 wrote to memory of 5116 1120 cmd.exe 81 PID 1120 wrote to memory of 5116 1120 cmd.exe 81 PID 1120 wrote to memory of 5116 1120 cmd.exe 81 PID 1120 wrote to memory of 4488 1120 cmd.exe 82 PID 1120 wrote to memory of 4488 1120 cmd.exe 82 PID 1120 wrote to memory of 4488 1120 cmd.exe 82 PID 1120 wrote to memory of 624 1120 cmd.exe 83 PID 1120 wrote to memory of 624 1120 cmd.exe 83 PID 1120 wrote to memory of 624 1120 cmd.exe 83 PID 1120 wrote to memory of 4636 1120 cmd.exe 84 PID 1120 wrote to memory of 4636 1120 cmd.exe 84 PID 1120 wrote to memory of 4636 1120 cmd.exe 84 PID 624 wrote to memory of 5020 624 Maryland.pif 85 PID 624 wrote to memory of 5020 624 Maryland.pif 85 PID 624 wrote to memory of 5020 624 Maryland.pif 85 PID 624 wrote to memory of 5020 624 Maryland.pif 85 PID 624 wrote to memory of 5020 624 Maryland.pif 85 PID 5020 wrote to memory of 4676 5020 Maryland.pif 88 PID 5020 wrote to memory of 4676 5020 Maryland.pif 88 PID 5020 wrote to memory of 4676 5020 Maryland.pif 88 PID 5020 wrote to memory of 4508 5020 Maryland.pif 89 PID 5020 wrote to memory of 4508 5020 Maryland.pif 89 PID 5020 wrote to memory of 4508 5020 Maryland.pif 89 PID 5020 wrote to memory of 1560 5020 Maryland.pif 90 PID 5020 wrote to memory of 1560 5020 Maryland.pif 90 PID 5020 wrote to memory of 1560 5020 Maryland.pif 90 PID 5020 wrote to memory of 1012 5020 Maryland.pif 91 PID 5020 wrote to memory of 1012 5020 Maryland.pif 91 PID 5020 wrote to memory of 1012 5020 Maryland.pif 91 PID 5020 wrote to memory of 1600 5020 Maryland.pif 95 PID 5020 wrote to memory of 1600 5020 Maryland.pif 95 PID 5020 wrote to memory of 1600 5020 Maryland.pif 95 PID 5020 wrote to memory of 1972 5020 Maryland.pif 96 PID 5020 wrote to memory of 1972 5020 Maryland.pif 96 PID 5020 wrote to memory of 1972 5020 Maryland.pif 96 PID 5020 wrote to memory of 4060 5020 Maryland.pif 97 PID 5020 wrote to memory of 4060 5020 Maryland.pif 97 PID 5020 wrote to memory of 4060 5020 Maryland.pif 97 PID 5020 wrote to memory of 2012 5020 Maryland.pif 98 PID 5020 wrote to memory of 2012 5020 Maryland.pif 98 PID 5020 wrote to memory of 2012 5020 Maryland.pif 98 PID 5020 wrote to memory of 3308 5020 Maryland.pif 100 PID 5020 wrote to memory of 3308 5020 Maryland.pif 100 PID 5020 wrote to memory of 3308 5020 Maryland.pif 100 PID 5020 wrote to memory of 4680 5020 Maryland.pif 101 PID 5020 wrote to memory of 4680 5020 Maryland.pif 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\topaz video enhance ai crack windows\topaz video enhance ai crack windows.exe"C:\Users\Admin\AppData\Local\Temp\topaz video enhance ai crack windows\topaz video enhance ai crack windows.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Lo Lo.bat & Lo.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"3⤵
- System Location Discovery: System Language Discovery
PID:4508
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"3⤵
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5827173⤵
- System Location Discovery: System Language Discovery
PID:1012
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "AppleNeCordConvergence" Talent3⤵
- System Location Discovery: System Language Discovery
PID:5116
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Girl + ..\Lions + ..\Meetings + ..\With + ..\Ab + ..\Genes + ..\Panama + ..\Niger + ..\Genome + ..\Anger + ..\Sandwich + ..\Therapist + ..\Unto + ..\Are + ..\Flashing + ..\Disks + ..\Dist + ..\Preserve + ..\Becomes + ..\Mission + ..\Andorra + ..\Victory + ..\Limitation + ..\Deviation + ..\Met + ..\Prevent + ..\Massive + ..\Worlds b3⤵
- System Location Discovery: System Language Discovery
PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\582717\Maryland.pifMaryland.pif b3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\582717\Maryland.pifC:\Users\Admin\AppData\Local\Temp\582717\Maryland.pif4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\Documents\iofolko5\J68F2GcrOotDPlVNDeGdibst.exeC:\Users\Admin\Documents\iofolko5\J68F2GcrOotDPlVNDeGdibst.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4676
-
-
C:\Users\Admin\Documents\iofolko5\NeNKUOzlnTqlfha4lt3FOAR_.exeC:\Users\Admin\Documents\iofolko5\NeNKUOzlnTqlfha4lt3FOAR_.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4136 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminAAKKECFBGI.exe"7⤵
- System Location Discovery: System Language Discovery
PID:4108 -
C:\Users\AdminAAKKECFBGI.exe"C:\Users\AdminAAKKECFBGI.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"9⤵
- System Location Discovery: System Language Discovery
PID:1416
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminDBKFHJEBAA.exe"7⤵
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Users\AdminDBKFHJEBAA.exe"C:\Users\AdminDBKFHJEBAA.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"9⤵
- System Location Discovery: System Language Discovery
PID:2120
-
-
-
-
-
-
C:\Users\Admin\Documents\iofolko5\SvuqwJ7_b6dDT0lOzXcomoOj.exeC:\Users\Admin\Documents\iofolko5\SvuqwJ7_b6dDT0lOzXcomoOj.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\is-3PS3S.tmp\SvuqwJ7_b6dDT0lOzXcomoOj.tmp"C:\Users\Admin\AppData\Local\Temp\is-3PS3S.tmp\SvuqwJ7_b6dDT0lOzXcomoOj.tmp" /SL5="$7004A,2862397,56832,C:\Users\Admin\Documents\iofolko5\SvuqwJ7_b6dDT0lOzXcomoOj.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1180 -
C:\Users\Admin\AppData\Local\Nikkitos Screen Recorder\nikkitosscreenrecorder.exe"C:\Users\Admin\AppData\Local\Nikkitos Screen Recorder\nikkitosscreenrecorder.exe" -i7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1108
-
-
-
-
C:\Users\Admin\Documents\iofolko5\348nAKb1L5p6wPpb4oyPqpMZ.exeC:\Users\Admin\Documents\iofolko5\348nAKb1L5p6wPpb4oyPqpMZ.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 12887⤵
- Program crash
PID:4720
-
-
-
-
C:\Users\Admin\Documents\iofolko5\kOCellBTGtxqglJj0netqwhl.exeC:\Users\Admin\Documents\iofolko5\kOCellBTGtxqglJj0netqwhl.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\Users\Admin\Documents\iofolko5\SQlJBn5uO9wbpdfH6iBfLzaB.exeC:\Users\Admin\Documents\iofolko5\SQlJBn5uO9wbpdfH6iBfLzaB.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1600
-
-
C:\Users\Admin\Documents\iofolko5\MH6mGcwAfkDn8TXWpQGyXTTd.exeC:\Users\Admin\Documents\iofolko5\MH6mGcwAfkDn8TXWpQGyXTTd.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1972 -
C:\Users\Admin\Documents\iofolko5\MH6mGcwAfkDn8TXWpQGyXTTd.exe"C:\Users\Admin\Documents\iofolko5\MH6mGcwAfkDn8TXWpQGyXTTd.exe"6⤵PID:3920
-
-
-
C:\Users\Admin\Documents\iofolko5\XpgNDSmhbnaqEdT4zF8Asj0j.exeC:\Users\Admin\Documents\iofolko5\XpgNDSmhbnaqEdT4zF8Asj0j.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\ProgramData\CFBFCGIDAK.exe"C:\ProgramData\CFBFCGIDAK.exe"7⤵PID:924
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵PID:2184
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\IJKFHDBKFCAA" & exit7⤵PID:4632
-
C:\Windows\SysWOW64\timeout.exetimeout /t 108⤵
- Delays execution with timeout.exe
PID:3576
-
-
-
-
-
C:\Users\Admin\Documents\iofolko5\ou3v8y7ZntvvsrZDKFCCXxwH.exeC:\Users\Admin\Documents\iofolko5\ou3v8y7ZntvvsrZDKFCCXxwH.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:788
-
-
-
C:\Users\Admin\Documents\iofolko5\VJqvqdM_HScphkMqWbTLiHCW.exeC:\Users\Admin\Documents\iofolko5\VJqvqdM_HScphkMqWbTLiHCW.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3256 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 06⤵
- Power Settings
PID:2912
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 06⤵
- Power Settings
PID:5056
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 06⤵
- Power Settings
PID:3932
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 06⤵
- Power Settings
PID:4428
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "RRTELIGS"6⤵
- Launches sc.exe
PID:1388
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "RRTELIGS" binpath= "C:\ProgramData\ejitkpfdxvzt\orpqcnvisucm.exe" start= "auto"6⤵
- Launches sc.exe
PID:4852
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog6⤵
- Launches sc.exe
PID:4980
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "RRTELIGS"6⤵
- Launches sc.exe
PID:4168
-
-
-
C:\Users\Admin\Documents\iofolko5\kD90KBfuEh4ukYc1GPBTx1CB.exeC:\Users\Admin\Documents\iofolko5\kD90KBfuEh4ukYc1GPBTx1CB.exe5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3308
-
-
C:\Users\Admin\Documents\iofolko5\qjw7oy9xBoBLXk5FKFoiYD5x.exeC:\Users\Admin\Documents\iofolko5\qjw7oy9xBoBLXk5FKFoiYD5x.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4680
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:4636
-
-
-
C:\ProgramData\ejitkpfdxvzt\orpqcnvisucm.exeC:\ProgramData\ejitkpfdxvzt\orpqcnvisucm.exe1⤵PID:3552
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:4616
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:4560
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:3828
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:4580
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:164
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:5064
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Power Settings
1Pre-OS Boot
1Bootkit
1Defense Evasion
Impair Defenses
1Modify Registry
1Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5d08aaff00f555040a68660d9b6ca6c86
SHA16074f8af2407ed5a437340553cec7afb19225e0c
SHA25603d660e2d11d284a2c59ae1925daf52e8367a22665e7cf97fabb46ec6fc79bc6
SHA512e3121001cbcf457e8f3593d4e572889cf2f7f360fe27f5d53ce79c7ba56b561f33458dc1ac655af6caf559abb10df0cfa9cfe962fbc40eb699b3328263eab13e
-
Filesize
92KB
MD5dc89cfe2a3b5ff9acb683c7237226713
SHA124f19bc7d79fa0c5af945b28616225866ee51dd5
SHA256ceddefa824f1dd6e7e669d4470e18e557c22fe73359f5b31edf4537473b96148
SHA512ee5d047e1124351997ecfaa5c8bd3e9ce8a974ac281675cda4d0a55e40f3883336a2378b9ebf3d1f227d01b386c26473c32e39bcab836da2b392bf778a6cf5c2
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize400B
MD504a89482c525142b426063d52561d4eb
SHA1f530902883955895165a2645616c9f038a877c17
SHA2561029d9c043e3b90fb69eafb1e1e86d993cf31e04330c68df8f37afe59c3f3a1b
SHA512d0987081bb6d2cfcd24eb734db75d0cc318bfead9519c30a4e80a461c82476a569bf059bd9a8bac80da2110624f9cf6b1d78846ede50a814db406e6bc7eac551
-
Filesize
425B
MD5605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
Filesize
381KB
MD5f5a1956973dce107d4c0b6267ce88870
SHA179a19513d7c9cff939f2881c4172a05dbaef735b
SHA2567b794c5bdb820791f0359da90a9a4f258412b8feef9c6e6a0411f6aead9d3a04
SHA512f42180c75c0ae8dc083c6fff98a66c0d875fadb400d7945816ea330a54777632a3a7752d3e78b90e45f58ed3d04d6708b1dcea51d82711356e6d14e405a7c579
-
Filesize
2.6MB
MD51f4abb409b8a4600ec497a139d308d7b
SHA11a7546c0e4d871348b355c274d7f2672c3257545
SHA256e07e050594db8583d4132d4b3b0cf4f2b97a10837739a0777118aae5b912847a
SHA512cda8bf35e1ad21138f19cccea13749fe8d79a5efa33a5a768b0ff46cd53cceaf5163829c234c22db020087673fecb2e46db0b40c2f7c908e7a97239212fd652e
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
1.9MB
MD56d174513fbee6ddbfad3910bd033459a
SHA18d28ad16148814034a78595dba063bcce596fcbe
SHA256cecc7c943a43c742266a434053acfe9d6665023425613eb454024f7380c4e833
SHA512384757b880f6686e28e247583e23f7bcb0103e724603e2b552a06773a6d853e4cc65577806a689190e2d0d8b0efdbee4737688ce6f789c19919724653c9bc60f
-
Filesize
87KB
MD5c3d7681658631a2550d329e8858cd4d0
SHA1cffd5d84597c39e801b3f27a3406d4d4cfbb8213
SHA2564da93fbd06b1f8fcdfd083738e2a7ac3a93debf374b5e7c80ff68c959947308d
SHA512ef963da5ff8618e05dd330d760ab1f4f3640bb0de240aa7321c9a4f38b2d63797b961224ea7e3f40a421c3d6897812f3cfab3d05652daf80b662612b83c8254f
-
Filesize
60KB
MD5a33ca1f3026fd3ff8e9030c81314a3a4
SHA10f60dc58b4d5a88810ce18d577693bee388a04d5
SHA256de6d85d289b7d6dc4c9274a8a3367e31adf4325e1a85d4af1ab376675881b928
SHA512b0138d3cd57a17301863996e2f32ddee9ab57e9964290241cc88c7e456a83f2c82a03929d8613eb3aa6f5170adea86f99e16f5b468b5b98693f2d71195679909
-
Filesize
74KB
MD5fff6d9433273992327280118b97029b4
SHA1a2c855f9be6f988b8c8a0ec328608224e89dddaf
SHA256eef3c6317e9f86b49493c37b20fb28d42adb297feff0e3f19c2aa6aa116491ae
SHA5129500f6e1ceeb819455852e012d48635ef3c4cccae7988c91dcf7e15a15f5b1dcedc24cbc71142a4d8855c4c13d8f8fd37e5300329f761bdde7d44fc0972116a6
-
Filesize
64KB
MD50936eb21aa46a93d7bef524bb232d5d2
SHA1d06a9d2c45bc2815d92551c0e0b38de82100cb25
SHA256e9f4f20d5cf325db423a8884060a1b52aaa2b7d129ba732d94533df228611474
SHA512554c7a60bed7d8610776122d0f99e53d88631fa9e9ba5b13322fa86e920d985a28246bfa22f5cddbae8e84d629e15ab485840462acbf4a717bd7b88af2b33479
-
Filesize
81KB
MD5a9df2b0b02a74e8ed85560bc59aa6381
SHA1fc7f0df073df454ae3b9989a9f8e8647c05c8b5a
SHA2562e490ef6a85275fb5db7d0762ca6d7ac8bac95437646ca9bc029983fcd4b7928
SHA512055b2b8bf6ec865be9488ee993b5366981989ed23ee98c4b243bf2cc3e8bf776bdcd4a0e9f386440019a23663f2032cf797a9612a26bf4094195892c8e55faeb
-
Filesize
77KB
MD52af511a959e248836bd1cb8d71a115b2
SHA1eda54900227dc1146ba8e5821e500c8a942c7e9f
SHA256777bd339d1de721bd28c4d167fe88c1016cea82a2288bf748d9473b6a1871813
SHA512055b6b6f4f8953d44ee3a9da744845565f047ea5fe4066a54013914a1f68ec41cd1646bf31440d4f2166f952f025aa5464b2653b1f0de9f512dc05abbbe4bd9d
-
Filesize
72KB
MD5d54aec4d487099604271466c2ad292f9
SHA1ced16eace86ab62a1e0af8c3f8ce1d7e7f8f2c2e
SHA2566f1736c3ad969a224abf3100b31dd73d4389fe9d7a22de3eb35e5b77caa7a05f
SHA512633542cbd489d2c531dfbe9af7f17f2728877b327c6bf43fad08b10c1e48ae27737bd1422ece8554505134a5b99f8c7f3e4de6f33e8a42159fd8df5e35bceca1
-
Filesize
52KB
MD53db84bdce37176e8ded0c0d6a95efde7
SHA12f11a1c7b19f4c91d4c6794ed066fbf0a1c2a22d
SHA256efd1a6dd0cde66d67594291ab6a3fba5ffd597c5321d808d992f0cf6336f037d
SHA5128dc0e874aace0c529ad2b50033b8673e0c308dd2ff1a26c24b9cac61b41a0aec02867d59f7684a2d9f7c7afe06f4eb53bb8b7f276a2febad34b7c6a9bcaebc31
-
Filesize
63KB
MD524755334ef1c47f4ca103e769d88cdf9
SHA1cb719671fe06516fa520913cf8d986427cdf8460
SHA256b141464642bd173808821467aa5a1d0abe21a7b7692ed88c3405d3c8c79e43cb
SHA5125104c93256294a6d9f00e3d4a1a6773cf75007167538315b13d3a3c379a1ffbaafc0ed6735a5df163fb988c6ce33a63af2bee16d9b269a93b954a59f614e3dea
-
Filesize
81KB
MD5643ef5e0c59ae81ed477ceb7969d02d6
SHA1576f6226c83f0342e5e3e9463f4df025b107c63f
SHA2562d7a719c1d2fef1f7a29d5ca96510fcbcd64ac4221017bb2620cf8c344a5fd77
SHA512e80227c65a975a4c6e8d7486b1448de3232b25febaaa14ebc94d1a31d7b3177e715cf40855bd0fece689f7803d84976c8defaa8ad027369c529ca87b196cf3da
-
Filesize
50KB
MD5ed287bde22e278bc26ddbbb86e3b91fa
SHA1f8b53295a7a9e0899dc5643e920165447514b6b7
SHA256625c7a85b64ec467b39b5eacd5d22cdebe061c4071733e9468a5b25a34b74bbd
SHA512248d0a95dc6de9df50c35c263a7b82270d8c1ad22e974890a878f6a90151528a33b5ed67ff6c119a0705f06af1fe7aadd31a9eebd04ace33bda97faa567c9c11
-
Filesize
54KB
MD5721754267f69e93dd4d5c8e182614b62
SHA171842854960c32d9c958fe6729703b5c0d834a80
SHA256fd7c8d87ec3969f6b038ccac564880a403679f05fde9f7056b6aaebcb5628ef7
SHA512b62bcdf4ace7e84058b14f1376abcc8356371979f99c80d4f32262b01e5e58daffe3c44286f269e4a39bee6b773ed039969fa4c97af3be0eab8c4a6d7b6e192c
-
Filesize
866KB
MD57260f9e276e7bafa4e7a86322be79063
SHA18fda4776421b93b49141315015feab0e1a06b1b7
SHA25680b681291a1adcb5d815a8bf4e4e614fbd02291dd138bbc9180052be5d047952
SHA512287d8a5c0b98470cf0563185bafc8c956a3fb0493e17c09377a20ce0577b83b45942b421dcd24bb195a1b0676f7b021f035f8601e1e08499a71f11db6f732ed7
-
Filesize
80KB
MD50732937d35617fc70025d70b3101ad38
SHA11f822534503e8b7c433f1133c6325a8bb9c4656a
SHA256d0345655474b9da78e7374784e0e7629787307f55033c5243e3681181eac8682
SHA51262b872630d820dcdd7b545ec7fc74f1acf304c3ca4cc361a677cdf834f31fca2ce2cb67e2f69c267efc493f3bfd7ce2c33529fbf5fcb405a2b9da89029db874e
-
Filesize
76KB
MD51e24a6ce4a4c6454aee239d81b489e12
SHA1522f510442507c74868ee422917d82fdf5b920f2
SHA256e096b81d83ca822b5048ea25876fd0f21b3281f48ee27b915a2d599c40dc1c06
SHA51216e19dc487ef9be63083cbeca59182d4be5b868f77b7f443e1e549a08fae0aaeca09817347196bb6b343db604b493b8298935af94da8899e8c9c1078666e02c2
-
Filesize
10KB
MD547e9c8413366f4d9abf4ea0e939d64ec
SHA18f706abc89c4557b21318ac0aea04a5f771409b1
SHA2567d3cd3055dca4b7cdd6f3e3f539433a7e798d3682b369fcabf8b53df91899041
SHA512d178e0cf94c668c32a87a5e0d45cb0f440514a8718592640d39156d4e6915dc6fadb0993f8b3a9a2b56e32adee4f493ffb55614ec1b79ab09c20768f19f595d5
-
Filesize
65KB
MD57768f7cd4a2b20b422b8a55cefceb59e
SHA1c823ef7e83f5092d7ce0d7b0bf122b0f89ff3a24
SHA2565690b771c5da8666b37344cc5e4aec70ef1d4419f71acefa8dc9f286f6a29461
SHA5126b2c36a43b0fb9c31a3564b0b2273ddde3511172fb75e6f1129242bf94bf107cd47d1837bc5a0d94f58ea5702f25d8de63932ecc981fdc69e6b3e0995d4454fe
-
Filesize
88KB
MD5941282ba0f71a37f14fbffbe843cbe35
SHA1fec73e735d22cce2217058fc8a0c99c11531e5a8
SHA2562bd30ea74d45ccccdff9564642b8ed4626a9ca6498a568fe82e524d92affa1d1
SHA51269cd070511c752b8c2a7c33ff5efc5c30324817e57dc0a7f83c525a6af36ddfdd27ede5a84f209ef08fbc18abb21ab6750eea0273accb8dc1de885ecdefcf112
-
Filesize
62KB
MD59a728b96437d0ed586802eaf8da2739c
SHA11a5d0d6082f3e937b62145097d3149c9aed521ed
SHA256c8a6bb646c0e77bbb74360fae2ad4a2140bb308d43e164c4c0cc9909243882c0
SHA5128c57128d1adb1963399d5ab0990767e175db347db7c8b754d3171c9a37995cdedf536d994e3b288d0c8f4176f80bf8db5e2ef085e935c105b60a8bbc93677bcf
-
Filesize
55KB
MD5282b6137108f3ab85b992f371407fa2e
SHA172990ada04a24cae336dcabfe6a184332dbd4ed7
SHA256fb3e910820d529fbfc7695502b80013784aeca3b26a3e1d8e7c85ac5f2318812
SHA512a2a9cc7f3d17873e7d9e706fc0a56a17a0424bc917cc6f724be0a6ae3a8c1a96ac41fb1d3498a1b680bc02cb2cf529239019b2c8f4d77cdcc7eb5bd395c75b4b
-
Filesize
66KB
MD57319ccbc06c0f43059961df55449fd74
SHA13526024279d8fbdae070639b22f8f2789eb4f54a
SHA256bf641c5acbc0db6bc3ac8500457f7c8da5e38d3c5f37b0eb0c0d238bbbcf48e2
SHA512e8e35c63c39edd6d16d0469f40917feee9f0c6f87b7cdf43424c218d430b59b8805da540c890c15258bc51a3fc0bdb8a3f8712694773564ca070f60116bf473b
-
Filesize
60KB
MD59267679da65c13c62b6c9ed0d701df06
SHA11926f6894f926b5583dbbd1b068b0054aa65670e
SHA2566a8816143be9e48a49cadee908a8684fc1ad53e254aed611fd84dc6c0461e913
SHA51219c1fd6361d7d403e75c1bd503eb22d90de3c3d538433695caff080b65eff1a45f3f4bbd22c76c699e072ffadb5cca2eb262babfd8987c4774a12b6da0c9d457
-
Filesize
85KB
MD554cb682c32d61911cf60e3d6e052bf19
SHA19e9da7249f0443ca09a1ccce25b0a5e7b213f55c
SHA25600f576edb92b94b054c31b303f7dd4d7ca0ac36e2362f57353033a50864d81ed
SHA512b87ff6eec70bf0b4ccbdc1f20d8c7486392dd7d8aad8b8e24518a5bd8651d2d61feebd10771af63d96c31a3c8f2ea4586f81a6e81669fd8b6f45221fc0c95a24
-
Filesize
68KB
MD546885de7fd3ff3ab68002f3cccec4b77
SHA1f6f17fef216a7521f8c81202ef0d157091f105e7
SHA25609885ee28e3d7f797ef1d0db27878420f02f5570d5968a6388b2e65b702c6420
SHA5120e2ebb615ca2fe18845f91f41e847c74c58a628e9da01928ed37d5e891d029b7c45964c7f5253c6562fd75bc4728a0f0686689d1a3a0f338d5c305b4682fae07
-
Filesize
94KB
MD5a2f625653582868237c2c02135f58148
SHA11947698285f6858525a0e663537e15df7405875f
SHA256d740f2a29c34d1def3b0090e4f425f7b4629ce338700bef4cddf68855e5ecc07
SHA5124547a0d0b1cb422963048f37cc380d63025fa6ceded1e723f426d0af5c5f51cf229362bf0def9707830a49b788bae64c11c5d982dd0d3c0bdbd871751ac7bb32
-
Filesize
6KB
MD5c3617efce1e2f86ae068294bb5bd5f07
SHA1ee6f9e7a98fd8a0c7d1fd5b00b1c7b2cfa23dfb8
SHA256e6f210612a96d3059865ab8ac42ecd63c1df225a8893420163b7d59ad3fa00a2
SHA5123429e81d322f9ce275baff399fd21fa9254a7e2445752cc4c0c5706c631606d0bfd07ce488008277233f36ada84205a113bb8358676a19ca438fc0bb1fa185de
-
Filesize
59KB
MD5288856f5328a297ca650dbfdb08016dc
SHA1c7fdcd3da6f97ea398bccdfc09c19b0e4b7bf9f3
SHA25699b9ea5533c22f4c032f8c436074f4100439945c8fdef3d18aa15d3d5b66ac18
SHA512113c5342b3a6177daeaf7373120e17811d6d2faa0c090e4dee28911c3c85d3ac54bc798e6061cfe5e30cb2cd25222d22050626dd7bde5022a4ceabe9dc1e24ee
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
82KB
MD539695106af0d352588ec217fb30bba41
SHA19748ca8c66ba7e3973c869a21c116a1869e87f14
SHA25699a97e4d5fe43111fddc745f7b2b801ac9220c5457c0b335d62ac99e64190d02
SHA512e0d8680142c01085f1af8437408fd98224f62347b3e0f263ebd68f489b57c188a2ee3d1f391d621ad4e54eeccca1cb6b51dd1327a648c87bcd39e071e006e23f
-
Filesize
52KB
MD5881d19bf173c88643cf15e0e3368d9fa
SHA16a6620849affb2d6710847620492190e2432080e
SHA256d2fa013df807555b102d65a755d08c588e58e2f1e24ca196606f5aa4bfe5246c
SHA512ef3dc5fcb6ef0ee8e62b1af902662580da2e4bbdb493f0f5e165c44a7124a5786967b6f78e713891df0ebef96d374458c7163554bd11768db54b822d286fd729
-
Filesize
59KB
MD5c0f7adf931dce385829b67e1f4e20c82
SHA171d32a50c33e5bb666ca89c8f1c876c3d2dda2e6
SHA25629f8c5595e89ed845c6f1c6bd9db87879d7290f81160f3590a6e37ce1ec09926
SHA5123b70b98616fd1f9bda7ba80feea25a8325be459ceab71213fbddff80b69ceaeb748a5ed77ede607d9f30f1d227ba0ca318aaeb5e29ae6893ef19230efb71591d
-
Filesize
33KB
MD538b47459aefdbbfc34543bd4f6cfc102
SHA12a590edad9714735f48aa76420f428958b7e8958
SHA2564ce0d5b780ef8eccf55cb15a01352e2e92ff94a085d01c1077e43c2ea3982428
SHA512e6f130f54d25143980c77947c4091a16a26973bc866143afa8fa5efc304a2e3fc3cb80b85ab1c5c91152e30b37e93b76aa19de682d9de08f82f64768cd619e66
-
Filesize
691KB
MD509fc27a149d2e93a6ce508e7e631e7dd
SHA1283a293c229af7cddc5d51f0d04b1bbe406bd088
SHA256d8c00c5cea289e511aa7fffc88e07fc9f526776ac2b21d50dda3ebb2ddb5acc8
SHA512df41e98ac60c616263f24a5d494ad1f5ff97d2330543e7a3eadad3b209d62f10cea198b2906b35a86817e30216e9836de574ced71e71bdf90093c5318ee0488e
-
Filesize
361KB
MD506d5c3c3c249ea51791336557cdc619b
SHA105d372af9e9085f6076fbd0833094edb32b2c9b1
SHA256a72d4d0ece553b8140a169f5aca11693f3e411f733f1440ec12b1a30b323f164
SHA512c5073ecfaa57bc584254bce7e07d0d67023c0602cfa2901f498ae48bd42020acd62d45a002ec6eddae2847a55863721f18508726344e05a50fbfc117e4a03b5e
-
Filesize
402KB
MD58298633a9314793be6b79c257929903b
SHA1fafc6a837a29c647250338f14f9b6289e4c5b624
SHA25656aec8ee198131b8e621e152ec748a6e0b957edf2603e7c0876827cf3a1a364c
SHA5123a8e34a25bba5a3eaed96b7f4b3550cc99f548f412622ceadbd481ab5e86f2941d2af17af31de1354aac9f4060374312689831cfac9ec327ccd4ce0473700911
-
Filesize
4.1MB
MD5abdbcc23bd8f767e671bac6d2ff60335
SHA118ca867c0502b353e9aad63553efd4eb4e25723f
SHA25645a7b861baac5f8234433fefd9dbdd0a5f288a18b72346b6b6917cf56882bf85
SHA51267c00713e6d24d192c0f8e3e49fa146418faf72b2bb42c276ad560f08e39c68f4ab446c47c7e7710778aee9ca1f193ad65e061645b6bcec414844165b5e16bc7
-
Filesize
216KB
MD59a29528b1463ae389bd3e03e4e686a56
SHA10cefb61f8615c6ed5606360db20adecdedf4c59c
SHA256a0add2ff01fd0b1c7a259a9b0f0bdee713a7edbbf12fa18820fc95a373254e3b
SHA51234743dd19630de9802258476e6c9aacd14b7338c9e1c22c0369e759844b3248570b272c7edbc89079fe5eb8f375c7e2680e71f88ab5b8a4c01ba4d7ef116f9ae
-
Filesize
249KB
MD5d56bea8714d3b0d71a4905b3e9103e03
SHA1f87548174e258b4e9aaf02a76d28874b87413f54
SHA256c27e2d17cf286c37d3691b278c530c70911950db0c7bbc4e57523ecf325f1547
SHA512ca1cda273c0f828fb1773ae7fb06e01be85416b757777461db460a4c421802d0d33e2f5a23823197767871531efbce8eb65adf0cb7f716994ad7ea2e10fafa37
-
Filesize
3.0MB
MD55ed7b8ab23b223e058261d7898172c1a
SHA17a3f0b626d5a18fc09e767716e37c8b152dcbb7d
SHA2566bc84bd401a258cac58e3c562481601d35ef2feadde7c0cb367fbaf0702e9dc3
SHA512a6e281ecb227eb20eb3e93203d83ce8d62e45bfaf7c5b195698abb8fa08ffb50804b217388712e13c70b9d43e55e25f5c84f03e35976201f26d47077c5f4563a
-
Filesize
11.0MB
MD5d60d266e8fbdbd7794653ecf2aba26ed
SHA1469ed7d853d590e90f05bdf77af114b84c88de2c
SHA256d4df1aba83289161d578336e1b7b6daf7269bb73acc92bd9dfa2c262ebc6c4d2
SHA51280df5d568e34dfc086f546e8d076749e58a7230ed1aa33f3a5c9d966809becadc9922317095032d6e6a7ecdfbfbce02a72cc82513ab0d132c5ffa6c07682bd87
-
Filesize
413KB
MD576b81bbaa929e92a0885267869e62fdf
SHA116ee3b53fd9d0fe6bd7fc75ac961a21bfd9fae51
SHA256f59f82ea9cbaa95389bbec5f80b427daa2e575c2827eaaede006590810809f9c
SHA51267d4fb8ed2c767871a307c54fddc86fa4df07ccfa943eeb61e6e8960c4038fb8a38118a69cbb7a6364dde6c11fd3139b8c5f91e029a437dad0d39202383ac3cd
-
Filesize
421KB
MD559f2f7f0cf8faf41dbb0a7878b5d66bb
SHA10a96781c3e937cd7c12a052242f4755ea3656297
SHA256683391c9e997f8e960c52edb11106157fb4bf122d21a0a72fe6a9a14ebacf584
SHA512f3c6bc3fe42dbf48bda944817718298c9e23b7b6c08d7ff3142dfbc82b9a5070090ba80ce8dad8bc7b99e334f888bad3b6109142b5dc063a5ef73883f2b87ccd
-
Filesize
21.4MB
MD5cb3952f1852179348f8d2db91760d03b
SHA14d2c9d9b09226524868760263c873edc664456a9
SHA256a9ea40670a686e175cc8c32e3fc6ba92505379303d6524f149022490a2dda181
SHA512163006435a30b31ff0b079215efc0cedf6a624516af1ffccbc6144cfdb205b822029d523f28ec86e0391af1b741771b860cf4d3492c87567a55f541a39c69d11
-
Filesize
313KB
MD56423234685ca0046f61adac81f3b71d2
SHA1138de6c0170db1a72203475b94583b7f06fbaf1f
SHA2562982d7fbda8b889a9cc7ea780acd6ab1e03dc69360836a3a60bae08ae6307ad5
SHA51207ec233c53057f26ecfccd9b3a6e27de373d980fa760c689468357c5f7a8f8f1020aada9263545b38fd8dd19af91cbca2a1006f30294abde278c1c0dec42d3fb
-
Filesize
6.4MB
MD5666cf8a81ba6f3c5bb9b61d200584441
SHA178d1cde65dbd232930a836f00d3c37003f583b6f
SHA2560b14c37c84d89fd4939173c7cdb22f18c76098756fdb90694a63232f68530050
SHA51274cf1412c37d40dd009395bc0899af7b19b80f0649011102b87356b597d08bd31beb3e75aa6b8356323097aa05d411159590cf0aaa7a86b4355e36f2be4a36e0
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63