Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/09/2024, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
appFile_debump.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
appFile_debump.exe
Resource
win10v2004-20240802-en
General
-
Target
appFile_debump.exe
-
Size
37.5MB
-
MD5
6c3b270516a2731b1432f04cdefbb285
-
SHA1
454081d69cf999c960cd03ebba0e38660738b8c5
-
SHA256
9373f8ad1f33c0286734265cb5e60e69627fb5fd8f2220c655e6afa2d6ebda06
-
SHA512
81ac6b5063d6927c01106b157e87f1f665c36bfc5dc8d24d1d8dc977d5d8918d07d3e9ed962d3b476f33be452c4d1cd68719f0ee35e712805ef141490a73cd3a
-
SSDEEP
393216:ueXoa1bbXgKzn6vZrBoCMHUqbvkH/igbqmA8MLdculzFTi6AcsdNidnGF3rB:54CbwKzcHoDcH7qm6bTixca0ArB
Malware Config
Extracted
vidar
11
3a15237aa92dcd8ccca447211fb5fc2a
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Extracted
stealc
save
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Signatures
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/2788-518-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2788-516-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ za85BMvsxaM9pewVym8ppooy.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1688 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\International\Geo\Nation Generations.pif -
Executes dropped EXE 7 IoCs
pid Process 2084 Generations.pif 2124 Generations.pif 2796 5mnHiBOXDl8xPSTXiufvomDD.exe 2540 47t5UUOrKXgw4Q8bMgzSwkn5.exe 2288 vJt0aRPpqpq8xPzLBeOlk2n8.exe 2004 za85BMvsxaM9pewVym8ppooy.exe 2376 krXt9_4imQkAZnjc1syWwmHz.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Wine za85BMvsxaM9pewVym8ppooy.exe -
Loads dropped DLL 17 IoCs
pid Process 2884 cmd.exe 2084 Generations.pif 2124 Generations.pif 2124 Generations.pif 2124 Generations.pif 2124 Generations.pif 2124 Generations.pif 2124 Generations.pif 2124 Generations.pif 2124 Generations.pif 2124 Generations.pif 2124 Generations.pif 2124 Generations.pif 2124 Generations.pif 2124 Generations.pif 2124 Generations.pif 2124 Generations.pif -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 16 bitbucket.org 25 bitbucket.org 28 bitbucket.org 35 bitbucket.org 57 iplogger.org 60 iplogger.org -
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ipinfo.io 8 ipinfo.io 12 api.myip.com 13 api.myip.com 135 api.ipify.org 4 api64.ipify.org 5 api64.ipify.org -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 2576 powercfg.exe 2808 powercfg.exe 2344 powercfg.exe 900 powercfg.exe 2504 powercfg.exe 888 powercfg.exe 1968 powercfg.exe 2560 powercfg.exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 2628 tasklist.exe 2784 tasklist.exe 2444 tasklist.exe 2596 tasklist.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2084 set thread context of 2124 2084 Generations.pif 42 -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\NeonPioneer appFile_debump.exe File opened for modification C:\Windows\GpsPike appFile_debump.exe File opened for modification C:\Windows\PerhapsEntities appFile_debump.exe File opened for modification C:\Windows\WoodIsa appFile_debump.exe File opened for modification C:\Windows\FightingFri appFile_debump.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1500 sc.exe 2380 sc.exe 2564 sc.exe 2656 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Generations.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5mnHiBOXDl8xPSTXiufvomDD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language appFile_debump.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Generations.pif -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 Generations.pif Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 0f000000010000001400000007eeabaf80a9ef4ae1b2cb9b4b5fc70d0428e6a953000000010000004800000030463021060b6086480186fd6d0107170330123010060a2b0601040182373c0101030200c03021060b6086480186fd6e0107170330123010060a2b0601040182373c0101030200c00b000000010000002e00000053007400610072006600690065006c006400200054006500630068006e006f006c006f0067006900650073000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000a848b4242fc6ea24a0d78e3cb93c5c78d79833e41d00000001000000100000005959ddbc9c7632ba0a05f06316846fe6030000000100000014000000317a2ad07f2b335ef5a1c34e4b57e8b7d8f1fca62000000001000000eb020000308202e730820250020101300d06092a864886f70d01010505003081bb312430220603550407131b56616c69436572742056616c69646174696f6e204e6574776f726b31173015060355040a130e56616c69436572742c20496e632e31353033060355040b132c56616c694365727420436c617373203220506f6c6963792056616c69646174696f6e20417574686f726974793121301f06035504031318687474703a2f2f7777772e76616c69636572742e636f6d2f3120301e06092a864886f70d0109011611696e666f4076616c69636572742e636f6d301e170d3939303632363030313935345a170d3139303632363030313935345a3081bb312430220603550407131b56616c69436572742056616c69646174696f6e204e6574776f726b31173015060355040a130e56616c69436572742c20496e632e31353033060355040b132c56616c694365727420436c617373203220506f6c6963792056616c69646174696f6e20417574686f726974793121301f06035504031318687474703a2f2f7777772e76616c69636572742e636f6d2f3120301e06092a864886f70d0109011611696e666f4076616c69636572742e636f6d30819f300d06092a864886f70d010101050003818d0030818902818100ce3a71cae5abc8599255d7abd8740ef9eed9f655475965470e0555dceb98363c5c535dd330cf38ecbd4189ed254209246b0a5eb37cdd522d4ce6d4d67d5a59a965d449132d244d1c506fb5c185543bfe71e4d35c42f980e0911a0a5b393667f33f557c1b3fb45f647334e3b412bf8764f8da12ff3727c1b343bbef7b6e2e69f70203010001300d06092a864886f70d0101050500038181003b7f506f6f509499496238381f4bf8a5c83ea78281f62bc7e8c5cee83a1082cb18008e4dbda8587fa17900b5bbe98daf41d90f34ee218119a0324928f4c48e56d55233fd50d57e996c03e4c94cfccb6cab66b34a218ce5b50c323e10b2cc6ca1dc9a984c025bf3ceb99ea5720e4ab73f3ce61668f8beed744cbc5bd5621f43dd Generations.pif Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 Generations.pif Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 Generations.pif Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Generations.pif Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Generations.pif Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Generations.pif -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 988 schtasks.exe 2060 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2084 Generations.pif 2084 Generations.pif 2084 Generations.pif 2084 Generations.pif 2084 Generations.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2596 tasklist.exe Token: SeDebugPrivilege 2628 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2084 Generations.pif 2084 Generations.pif 2084 Generations.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2084 Generations.pif 2084 Generations.pif 2084 Generations.pif -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2884 3052 appFile_debump.exe 30 PID 3052 wrote to memory of 2884 3052 appFile_debump.exe 30 PID 3052 wrote to memory of 2884 3052 appFile_debump.exe 30 PID 3052 wrote to memory of 2884 3052 appFile_debump.exe 30 PID 2884 wrote to memory of 2596 2884 cmd.exe 32 PID 2884 wrote to memory of 2596 2884 cmd.exe 32 PID 2884 wrote to memory of 2596 2884 cmd.exe 32 PID 2884 wrote to memory of 2596 2884 cmd.exe 32 PID 2884 wrote to memory of 2692 2884 cmd.exe 33 PID 2884 wrote to memory of 2692 2884 cmd.exe 33 PID 2884 wrote to memory of 2692 2884 cmd.exe 33 PID 2884 wrote to memory of 2692 2884 cmd.exe 33 PID 2884 wrote to memory of 2628 2884 cmd.exe 35 PID 2884 wrote to memory of 2628 2884 cmd.exe 35 PID 2884 wrote to memory of 2628 2884 cmd.exe 35 PID 2884 wrote to memory of 2628 2884 cmd.exe 35 PID 2884 wrote to memory of 2676 2884 cmd.exe 36 PID 2884 wrote to memory of 2676 2884 cmd.exe 36 PID 2884 wrote to memory of 2676 2884 cmd.exe 36 PID 2884 wrote to memory of 2676 2884 cmd.exe 36 PID 2884 wrote to memory of 2816 2884 cmd.exe 37 PID 2884 wrote to memory of 2816 2884 cmd.exe 37 PID 2884 wrote to memory of 2816 2884 cmd.exe 37 PID 2884 wrote to memory of 2816 2884 cmd.exe 37 PID 2884 wrote to memory of 2224 2884 cmd.exe 38 PID 2884 wrote to memory of 2224 2884 cmd.exe 38 PID 2884 wrote to memory of 2224 2884 cmd.exe 38 PID 2884 wrote to memory of 2224 2884 cmd.exe 38 PID 2884 wrote to memory of 444 2884 cmd.exe 39 PID 2884 wrote to memory of 444 2884 cmd.exe 39 PID 2884 wrote to memory of 444 2884 cmd.exe 39 PID 2884 wrote to memory of 444 2884 cmd.exe 39 PID 2884 wrote to memory of 2084 2884 cmd.exe 40 PID 2884 wrote to memory of 2084 2884 cmd.exe 40 PID 2884 wrote to memory of 2084 2884 cmd.exe 40 PID 2884 wrote to memory of 2084 2884 cmd.exe 40 PID 2884 wrote to memory of 2916 2884 cmd.exe 41 PID 2884 wrote to memory of 2916 2884 cmd.exe 41 PID 2884 wrote to memory of 2916 2884 cmd.exe 41 PID 2884 wrote to memory of 2916 2884 cmd.exe 41 PID 2084 wrote to memory of 2124 2084 Generations.pif 42 PID 2084 wrote to memory of 2124 2084 Generations.pif 42 PID 2084 wrote to memory of 2124 2084 Generations.pif 42 PID 2084 wrote to memory of 2124 2084 Generations.pif 42 PID 2084 wrote to memory of 2124 2084 Generations.pif 42 PID 2084 wrote to memory of 2124 2084 Generations.pif 42 PID 2124 wrote to memory of 2796 2124 Generations.pif 44 PID 2124 wrote to memory of 2796 2124 Generations.pif 44 PID 2124 wrote to memory of 2796 2124 Generations.pif 44 PID 2124 wrote to memory of 2796 2124 Generations.pif 44 PID 2124 wrote to memory of 2540 2124 Generations.pif 45 PID 2124 wrote to memory of 2540 2124 Generations.pif 45 PID 2124 wrote to memory of 2540 2124 Generations.pif 45 PID 2124 wrote to memory of 2540 2124 Generations.pif 45 PID 2124 wrote to memory of 2288 2124 Generations.pif 46 PID 2124 wrote to memory of 2288 2124 Generations.pif 46 PID 2124 wrote to memory of 2288 2124 Generations.pif 46 PID 2124 wrote to memory of 2288 2124 Generations.pif 46 PID 2124 wrote to memory of 2004 2124 Generations.pif 48 PID 2124 wrote to memory of 2004 2124 Generations.pif 48 PID 2124 wrote to memory of 2004 2124 Generations.pif 48 PID 2124 wrote to memory of 2004 2124 Generations.pif 48 PID 2124 wrote to memory of 1968 2124 Generations.pif 96 PID 2124 wrote to memory of 1968 2124 Generations.pif 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\appFile_debump.exe"C:\Users\Admin\AppData\Local\Temp\appFile_debump.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Integral Integral.bat & Integral.bat2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"3⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"3⤵
- System Location Discovery: System Language Discovery
PID:2676
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1934153⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "assessmentsfiftyottawamid" Cite3⤵
- System Location Discovery: System Language Discovery
PID:2224
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Showcase + ..\Anniversary + ..\Refurbished + ..\Marina + ..\Cam + ..\Allocation + ..\Yemen + ..\Alter + ..\Gov + ..\Caring + ..\Counseling + ..\Receive + ..\Tops + ..\Artistic + ..\Estates + ..\Carolina + ..\Ri + ..\Cardiff + ..\Conspiracy + ..\Family + ..\Hostels + ..\Safely + ..\Messaging + ..\Weeks + ..\Delegation V3⤵
- System Location Discovery: System Language Discovery
PID:444
-
-
C:\Users\Admin\AppData\Local\Temp\193415\Generations.pifGenerations.pif V3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\193415\Generations.pifC:\Users\Admin\AppData\Local\Temp\193415\Generations.pif4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\Documents\iofolko5\5mnHiBOXDl8xPSTXiufvomDD.exeC:\Users\Admin\Documents\iofolko5\5mnHiBOXDl8xPSTXiufvomDD.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\is-I4G8U.tmp\5mnHiBOXDl8xPSTXiufvomDD.tmp"C:\Users\Admin\AppData\Local\Temp\is-I4G8U.tmp\5mnHiBOXDl8xPSTXiufvomDD.tmp" /SL5="$501D2,3352420,56832,C:\Users\Admin\Documents\iofolko5\5mnHiBOXDl8xPSTXiufvomDD.exe"6⤵PID:1508
-
C:\Users\Admin\AppData\Local\Fido Video Recorder\fidovideorecorder32.exe"C:\Users\Admin\AppData\Local\Fido Video Recorder\fidovideorecorder32.exe" -i7⤵PID:1576
-
-
-
-
C:\Users\Admin\Documents\iofolko5\47t5UUOrKXgw4Q8bMgzSwkn5.exeC:\Users\Admin\Documents\iofolko5\47t5UUOrKXgw4Q8bMgzSwkn5.exe5⤵
- Executes dropped EXE
PID:2540
-
-
C:\Users\Admin\Documents\iofolko5\vJt0aRPpqpq8xPzLBeOlk2n8.exeC:\Users\Admin\Documents\iofolko5\vJt0aRPpqpq8xPzLBeOlk2n8.exe5⤵
- Executes dropped EXE
PID:2288 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:2788
-
-
-
C:\Users\Admin\Documents\iofolko5\za85BMvsxaM9pewVym8ppooy.exeC:\Users\Admin\Documents\iofolko5\za85BMvsxaM9pewVym8ppooy.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2004
-
-
C:\Users\Admin\Documents\iofolko5\PBIMm509Xl6OMO8vtm3soA09.exeC:\Users\Admin\Documents\iofolko5\PBIMm509Xl6OMO8vtm3soA09.exe5⤵PID:1968
-
-
C:\Users\Admin\Documents\iofolko5\krXt9_4imQkAZnjc1syWwmHz.exeC:\Users\Admin\Documents\iofolko5\krXt9_4imQkAZnjc1syWwmHz.exe5⤵
- Executes dropped EXE
PID:2376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:2748
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminIJKFCFHJDB.exe"7⤵PID:2264
-
C:\Users\AdminIJKFCFHJDB.exe"C:\Users\AdminIJKFCFHJDB.exe"8⤵PID:880
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"9⤵PID:1040
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"9⤵PID:2900
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCFIEBKEHCA.exe"7⤵PID:1208
-
C:\Users\AdminCFIEBKEHCA.exe"C:\Users\AdminCFIEBKEHCA.exe"8⤵PID:2576
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"9⤵PID:2744
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCAKKJKKECF.exe"7⤵PID:444
-
C:\Users\AdminCAKKJKKECF.exe"C:\Users\AdminCAKKJKKECF.exe"8⤵PID:1088
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\RDPWInst.exe" -i9⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\RDPWInst.exeC:\Users\Admin\AppData\Local\Temp\RDPWInst.exe -i10⤵PID:1916
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow11⤵
- Modifies Windows Firewall
PID:1688
-
-
-
-
-
-
-
-
C:\Users\Admin\Documents\iofolko5\UllTAQxWHpJA7c01r8CQpd6j.exeC:\Users\Admin\Documents\iofolko5\UllTAQxWHpJA7c01r8CQpd6j.exe5⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\Malewmf\MFDBG.exe"C:\Users\Admin\AppData\Local\Temp\Malewmf\MFDBG.exe"6⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\Malewmf\FDWDZ.exe"C:\Users\Admin\AppData\Local\Temp\Malewmf\FDWDZ.exe" --checker7⤵PID:2036
-
-
-
-
C:\Users\Admin\Documents\iofolko5\Azn4o1JIiOg12PHBULd7A2Oc.exeC:\Users\Admin\Documents\iofolko5\Azn4o1JIiOg12PHBULd7A2Oc.exe5⤵PID:1476
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:2680
-
-
-
C:\Users\Admin\Documents\iofolko5\eusiWodR9RbmWI1F8i0CO5hC.exeC:\Users\Admin\Documents\iofolko5\eusiWodR9RbmWI1F8i0CO5hC.exe5⤵PID:2168
-
-
C:\Users\Admin\Documents\iofolko5\XcJzFoXuna31Coa2XqzgJ9dc.exeC:\Users\Admin\Documents\iofolko5\XcJzFoXuna31Coa2XqzgJ9dc.exe5⤵PID:1808
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 06⤵
- Power Settings
PID:2344
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 06⤵
- Power Settings
PID:2808
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 06⤵
- Power Settings
PID:2576
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 06⤵
- Power Settings
PID:2560
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "RRTELIGS"6⤵
- Launches sc.exe
PID:1500
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "RRTELIGS" binpath= "C:\ProgramData\ejitkpfdxvzt\orpqcnvisucm.exe" start= "auto"6⤵
- Launches sc.exe
PID:2380
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog6⤵
- Launches sc.exe
PID:2656
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "RRTELIGS"6⤵
- Launches sc.exe
PID:2564
-
-
-
C:\Users\Admin\Documents\iofolko5\1OOHaMuEXj4Uz5nBIksJ7nwE.exeC:\Users\Admin\Documents\iofolko5\1OOHaMuEXj4Uz5nBIksJ7nwE.exe5⤵PID:2176
-
C:\Users\Admin\Documents\iofolko5\1OOHaMuEXj4Uz5nBIksJ7nwE.exe"C:\Users\Admin\Documents\iofolko5\1OOHaMuEXj4Uz5nBIksJ7nwE.exe"6⤵PID:2020
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf HR" /sc HOURLY /rl HIGHEST7⤵
- Scheduled Task/Job: Scheduled Task
PID:988
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf LG" /sc ONLOGON /rl HIGHEST7⤵
- Scheduled Task/Job: Scheduled Task
PID:2060
-
-
-
-
C:\Users\Admin\Documents\iofolko5\IXRbv3HOflsrMkuZo1MDZtiY.exeC:\Users\Admin\Documents\iofolko5\IXRbv3HOflsrMkuZo1MDZtiY.exe5⤵PID:1956
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Kai Kai.bat & Kai.bat6⤵PID:1096
-
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
PID:2784
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"7⤵PID:2660
-
-
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
PID:2444
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"7⤵PID:2768
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7145897⤵PID:1356
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "MonkeyBeginningHurricanePhi" Underground7⤵PID:2936
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Witness + ..\Currency + ..\Eating + ..\Salary + ..\Nn + ..\Derived + ..\Preceding + ..\Journalism + ..\Disk E7⤵PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\714589\Customized.pifCustomized.pif E7⤵PID:1292
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 157⤵PID:304
-
-
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1501996316-1859573496576104356-281719047-393364156-5220548921263921556-620811357"1⤵PID:2072
-
C:\ProgramData\ejitkpfdxvzt\orpqcnvisucm.exeC:\ProgramData\ejitkpfdxvzt\orpqcnvisucm.exe1⤵PID:1056
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:1968
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:888
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:2504
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:900
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1936
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:1604
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1852225305-20994823375790783912002822212-31961062616167207271915992815190622587"1⤵PID:2376
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
3Windows Service
3Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5a2a7f4e4ad859eb4ec8929913fa7af33
SHA1e36d0442d24e1c530cf486d2db672ca8ba5cda8a
SHA2560ec67003b662f0e201402bc8ef7f2e180a02dc1f42c62c754403ca766b57ccad
SHA51265ca52817d87120811a1ac715826ac63259f76a11ea068c897e5d4b8f1595e9d20528c6dfa0a88efd425f4a51698710be4de70934d7bdf83ffc91c399bf9a73b
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD52c87b2d541eecd3b4a69f502e63a5783
SHA1c3d1777df678cf4ef89ec8330f4d64f07fb26f9e
SHA256eae2daadf140785ff98f48909f57ec24b3138fc0744018ec84a4ff8932c3d638
SHA512502bd68d3ead4d794969b1db7dde114e0d3ded7fc52d81ab4e50c9d59ba74a0279426b54502301e2589929802b91ff8aa32d7e3d02a79d98209e540b40f7304c
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3f3c81bd8c1dd7035db81c13e0f14cc
SHA18a0188b4fe6babcb14d7e2f82d75ba43b357ac53
SHA256a0ac4de0ddf976186fecc39bedc92abe3199020a76542ef07fb2dac261ba4275
SHA512c9f122309e27c4cd015a3f46761239d6a6984a2c105ae706a032067eff3c7f0323ca708fe2be020f822637e0b0dd70193f8f4c7a39e7a0049858bf06d618b5f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b106b00710cc9904be83bfe7f93c8a0b
SHA17dfb8401ed6ca898eb970d3cb436d39dd9b4e558
SHA25602800cd833346a06949b316bce3a5966b9bd699b7b17bd1fb8c8315a26ade6ee
SHA5120297f5742fe993954fc980a4af724e6293fe2bf875d67598fc37650626dfa7c3790cdcf4ed5b3b3877eec9d77a958f8c82a59ef5957bf55b553ba51314860dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be772f24e2e041f8925dac16d8abaa1
SHA1e93b869ec67f2bfd58b21ce68ed1c693cedb8335
SHA2565b17cd3e0b502d92786910eaa1c47edf0b837049b8ca85e445b4bd1bf1289684
SHA5125f7c99e510a8a1e72bdf7053226a59ff702339d9e7d1f40f83eb3ea93573ac2b3a88793b9a05f40d4a2bad1fa94e796777df9ef4151e23aca00ad7ef97ff75b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5425188ec8715dfcd0d0b323c05c76c1c
SHA1d4a10c35955ecb1864ccb1ebe7c6b89653bd4323
SHA256143b5e45a5f87b8dfd811231abc5d04b3d5eb130fd9eb0e763cfe0e3ac57b6a9
SHA512818d6c6140c3956e96381d78eddb92b6e7cf8ea59d8f57d2d0547d34cbfaaa043bb3887a970f2e6386b294711e248f363910b4b962fd4f5dae909d5782c2f856
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\nss3[1].dll
Filesize2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.9MB
MD5fdda204ac165482bc01df33b7e8588a9
SHA10a025ead40213b3914916e574d27b80aaa5abdf1
SHA25680d9abeb4e2af8b88ba71332eecef04cf817219ab3d53bcf2cc4dea79bf9ff3d
SHA512309023bc082aaf9c9f599ec142eb3740c39860819088b09ab4369de481fd0ced91fd135d8b4859edf8989ddbcfd8627ef228cf48e885187f432f997119380b44
-
Filesize
89KB
MD5d49ef79cc045922b471f4c206cf096ef
SHA1a9482ea39b3ea99885e99370c8a60d57618514b4
SHA2562f1a28d5584756db21ed464fa7b19ab94b147bd642283df1f26a4af5511655f8
SHA51258be46b7cfc150381e459cca278e0537e01b14787ad9c3193968af9cb8fe119bd8c986fe560c704d1f1495aad6ad6c02cd80f22c7fcf0eb3ab860d3b667ffafa
-
Filesize
87KB
MD594304579d545bcff611659ca1f17b15f
SHA18a0be0764fb31c964f5b37f118eaf7ad0fe1c50a
SHA256325d64ef563bfed88f6b5f503e1bf2b5e663c9388a9539cfa15cddd9d2652132
SHA512d0b8c163bd1dc49760b3c31eb31c59214f3d272eab57d6e8a202e1b1570c6071df94e2e5079caed9af72f21ebce54b3208644c5d0f5da39743233f55a0278000
-
Filesize
53KB
MD5ae534eeae46ef52a11ea1a913ae8df90
SHA12cc4798006aebc714ac393a2450c2f43a48931ae
SHA25620b2580bbfb5f1890eeeca1bac7c17aa01e7ba3886b857f6d2d64f7e527160d7
SHA5126b46180e35ea64f03f6413a15c689a9c02b07c2b8bdc0a874a7fa74b0cbacb777673e67652071af752f5eaf8eb43822767dd984c1111d38fd256db74cd88862d
-
Filesize
86KB
MD5aaf67f76072f5e4c49e0d5b714e3e439
SHA167d960899f0770c3b4e44fed2e87d69c6270ad90
SHA2560b7045da88ab7504c5acb024978d06c4aff830994eaa7aee383a73fba0ce3b03
SHA512f86394b9f725b8235a916cf5694ca23bb7ee0d11cb8e15308208519324589d6d001e34d62c85161373e2dca88b143cfee83bd7010a75586be4ac5ae715c0cfa2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
76KB
MD58166afa6cbfbfe7c3e1362c4210eb0f0
SHA1bdf9676d35eb4f78a738d7ec0c25f3e599ad4bb2
SHA256cb3a9bca35e30a9e1a36d5efa508682c0aa6bc60edc0fa9f2735f58706317200
SHA512372b180f73fb45473748423f82d185bd31fc6df89882d7f50779bfff47c921d1b5769a4c610576c7120f07a3c4dc63818fd3c6d8fb3840e76bdbba0d81cb7996
-
Filesize
72KB
MD590de89a573c2e9b09178c75904c27545
SHA1e4ecfdeb28b8e8966f097a46b6dd4e34c0df1f32
SHA2560f723f6e937c37542111cdc438ce8985fcaae5f11cbd32c26763492000934ab0
SHA512c68d2489abccdaeab7c1a044c63f8d2f8746af20b9f3e15b30ad43e71e89c0276a8a5cbc6d14f97aec0d0c5d3eab59a6689f72251f969d82095a0099c73add69
-
Filesize
58KB
MD573caa4a390a97e84101fb687a530b01a
SHA174f2704369aa150f02c1c87991fdd958b48efb8d
SHA2564d57e98a5118b901906add5ae15a01b52bbb675b0830d6667beb0960df168963
SHA512e1a3b2afaeff76db2f424a1654b5dfc9b571d89785f2e26e9d581ee685577dea4d486e239493e0773914d9b913f0941d26782f6651c5d55437eab158fafb465a
-
Filesize
80KB
MD513caa31b0d69e153cfa91bbd6310bbe6
SHA18f4f026b758eef0da57e2cf857e602934bb65cc3
SHA25669b015d22c66f4cddacf56d735e6814bcaf866585afd68606ae6a0e87e498257
SHA51291e50a5257416c8b3779737a06a163e559a67e782190feaac960ce1bab37895b9d8d7fce91ff9b83b1829429b7764f063f2cb9318e8a9a5068cb53c74e98b5fb
-
Filesize
6KB
MD5c9cbf317cf8f00c4f3b47c3454d51c2f
SHA16161ac8347c096021f7d190283693518e6c54d0c
SHA2561c27e6c3eb8ae45e084e7a0a19cd009a048c4c12d45b7926199425dfc1b15675
SHA512d51af2a6f74f1fac4a3fdcc8a5043e4332790ae995c77f2f71d95307cd57d5cb660f44e10e90cafdb02c226dd4b13358905db7581248f2db896029f7d5f84beb
-
Filesize
86KB
MD5e1a4e92d22fd71d4e8895336bff27b49
SHA1d5c6c8315abafeb3622346738af0addcfe32314b
SHA256543fe012a6ffa354fc011d34c4e1f93cdd8ba9649171eea762aaf6e62b614545
SHA512962d088d69b57f7fd4df2c4ca992526de42808845bb710b27350bc1f7523a034072b7ee90c32dd33f6b9500e822b0297834b2e9fa352a21b8a5f242cc000a032
-
Filesize
97KB
MD59697addbd0aa9dc60bdf3fc42e147cda
SHA16d62f51cf8b20f11fa84f9b27b1612f75d67cd00
SHA2562587eb6b291bf785005fd7c6ec61da344d72d8d268c84d8e6634ed0352b8003c
SHA51227d43d5e3ff5ac9f90c2ba254e620fd4e8faff9ead07d639d0b07f3a09c6a52812e0ffeb5f094bb0b14063f2706f0240c47b7d874ea2c9e6811e957ffc9b3eb2
-
Filesize
956B
MD54dd066722a205b8b7bf00b4ff8e6776c
SHA1acbf42370760f190f13d8ba42fec8661e629b3a8
SHA256782e2543a8f13b2156ef48e2ceb63dfde06ac4aa7bd233ea3eeca3cf39edc8df
SHA512eb9347643ffecf0c8aab23213ecc64f97872f7b576d6cb816d0573b9bf8ad9549d28f84406c3c8f7777f600972c4d7a8bd822db2968ac058bb6f89559f100792
-
Filesize
88KB
MD587cad9b8d71d05a67a287142211a52df
SHA151020c28041460a91c246ec987c3f5d692b8d5b7
SHA2566eeb411ddd859ac37acd7a03857f0110a0bef927b7f2944b570b3515b7e5e5cc
SHA512565877492c93ec07ae51330837562942398a0a182b88d616cede76129c81d6d8c32dfdab69f94af39ab251b8a091cc186f01f2109298c8ba761a7380cf53ba5a
-
Filesize
96KB
MD52f6d1a3b750997e0d1c2392a75940847
SHA153b395513eb826f8c1d696d27bd34f9c9f26bd3f
SHA256245657247c30611b5e09706d1fdb6f692afc7c776ae13accd1e7abbc0a3bcca2
SHA512515fad25ea9098dd2602fe13ed37d8db69d6ea1a0b570fb2412863fabbe54773ad586a34558b1ad764198e18240eb4a61416f512e1e72239307b54250c6e86a3
-
Filesize
69KB
MD55b48e6b383ccbadd06824ce446e5cd1b
SHA13b6e4211688f7e8d3eb6267055057aea0809df49
SHA25662239667451ad1a7c17af1f68096d251b8b1137d19ba242684b61e766b4885a1
SHA51210f9a4f161ebbe1c9938afb73a290b03f803ff60f902c755f24b4485e59c8cd7651987bcbdab57269466afb3ad6a16d5af26eabbc5d91652be4b34076a9969a7
-
Filesize
80KB
MD548120d462755c3e12cdad4eea65e0624
SHA1d276b03f0eae617ec9409c6e8b41fd12dc72fecb
SHA256a03d7f1f4f76c8de24bc3b9f380e1409bcc4179b3988a52d2fe5f5a4d067b821
SHA512dc0024dbaf8a2b6be20004b5a7d08116f823a10962f9a4ac800173cb2834c72aaa6fe128acf555d263f52d73c00c5fa0865ba697c26bdfdf6b9168c1bd3cf9b7
-
Filesize
15KB
MD59e2c89dba4f75f810e5910d79f342a5a
SHA1d86d802848cc861fd369fba9670ef68f33595dc4
SHA256a6cce5a3ad37d3938b5844b19dfc64ad7ef40f6a6ed6e8822b650d2848686c7c
SHA51296d1224b15e6412f4f3c254fd67cb4316f0f7e44278431cf5c1fa5691cc8e7538361560541a9a8dc4c398578aa02c0cad010cc3b3978b796d641f9a259273d45
-
Filesize
51KB
MD5bb8a60ae70244a7245dd97eb340e2e61
SHA11effdabf137fd2a4f8c484670663e57632a7ddee
SHA256d556537300242fe1546f5487efc53220bd8f0c479b5904265434340d5ef56592
SHA5128883fe987b2bd526e75ad26374f59117c6a7b3735c2085d6db661603d8033760f7912898954f450263b0805945ec083f6ded9ac80fcf19db76e6a00be3cc5b0b
-
Filesize
85KB
MD54a2920fd8e5c96d35a4832c32808a56d
SHA1e6767d859683f4aa9509a0116a35c1bac6571e54
SHA25642c64de7c25d5c3e1e7cc5a005e61996b2a8b728d02bf05aec7be7673feae59e
SHA512beedccf0a15a6ed63b0c09f695c073332f0fb7e4890b9207e376a236b330b199e893c8b7905b4fafd17d7e4ba22dfb8f0fb563f5e2d761ea41b46c1c82a73dfa
-
Filesize
94KB
MD5e31bdbc0a23a1de79b1077e06b2f0797
SHA10ec1c08309803dc471dd8c78bbb2d9b5104bc5fa
SHA256570578f483e984ce5e1e9c572fce5ef9d2d98859742c5272e490d5e76e879519
SHA512f304ba418db9c70f7e74aaba5e86d3ed7deb5e5cbea934410b0d0010b5a21fb8a469881a5df295f4e47eaff2524ca91312ef68a480f929ee9c85cb18714bdf11
-
Filesize
96KB
MD5854298d18c6921bebbe296b46ba60dfa
SHA14a538291e1e2aab85004fdd10d3c3aa19e416492
SHA2567ccd0837de026d5d846d1d1086a9e63866ba4b22232c68a94e9570403497191c
SHA5124bef4143c0ee5a8a3b4d43adf7ffe1664b55c83d93697d402a16a2454ecee6a78d929c651217f181db3ccf3af8691afe446d9a2ffdf8293d3746494af3e005b4
-
Filesize
85KB
MD532e3e827337d335afc306a0421ebf4e3
SHA1b722d4a9ad399e3ffb69b135143baaefa70cc185
SHA2569d6df7cabd00658b8dd605730c901f12e9de91dc2500183861f6f6d525cdb708
SHA51293ef3411883c0f2834c34aa9778e5c53c2a02921d2d06c2158c79f7ff0195bf45aac46c30d007fd7fe242f5327c2042397fdf42b8265dcefb641f8b752b4b358
-
Filesize
55KB
MD5a85bc982dc93f21bb402fac961e4e6c1
SHA14581b0642df49241bb87fe55d51cb1e00bd85cfe
SHA256bd7f07b78817d21ea452ec5ea71a4cebad00101130ba19fe1a02d58f9d5039d2
SHA5125b59fbdc690f4424dc868c61a90efe76f73dc56a4934a8980619d846e960516d2ba2a74bf6630cdb044fbf47f1396ec2a8ffae4174484895aa120ab20b1f94a4
-
Filesize
60KB
MD5a73d724a39ef77a6ad5c3624df6043a5
SHA1f554ecd03a51672fb4e4d1c067ad66b4ece4ec1b
SHA256b4a6106dc4360d945b0f7acb4df0b0d91519aa65271ac2b734bb8ef3604178b2
SHA5123d12571a2cf7fe134d9d49eb048f5a3ac24b8f21e4e519205efb1fbe442e6ec43885e1c5742a9a6bbfe9dbffe3dffb04741f4703c7f8517f0b0848b446e2e283
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
866KB
MD5eec3690dc0fc359eadcd637cda0008c3
SHA1338d311c729c038cdaf2ec11ddf4e4f0e5f90802
SHA256a01a08b1f70ab3a44558c3b53da36c21e484c5ffa0f77984cec975e94f3a3b76
SHA512dd250cc36283582de465a80ac4eb261d9aea877a4c0902cf4bd7741de3516e6e01dcf7ca12a374ce08fe79de948028987ca79ff9fe33bd9eff2b19285d2f2432
-
Filesize
87KB
MD51a2c708d909d10430db0d5e9ffb2d376
SHA1096bdfceb43a14009b4fcacc9d8f0ec59a2aaa57
SHA256f5255b8b96c8948182278d14787dea4f5deefcdb348d56bb5f1a874ae782b812
SHA512f9e090f26816b1ca195dbc5bbe33383add4b8ea53abafc635c6dd5d8e839af0b085782c7abd56725a37ec7bde8be9bbd6812553c7ebccaa4cebac9412ff438b1
-
Filesize
70KB
MD57dc9c177418b2b586c537c3dec076e0e
SHA1c73eb2f38924f6c59b888d72e02cb90aa195b434
SHA256fbe93b4be655dd6ba84411cf69f54fd00f16a70971b2b341655f54828df31872
SHA512d1315d0f8add811442d1deb6855bde000dade82759f2c3f1ecffa81db5f21247c1bb4bcbb246041841268eb2fde1ce65f92b7343c7c5349a20908f6429795036
-
Filesize
98KB
MD594ae4391d65062899d7ad1d3df90f243
SHA14a390980dab143b34b6bd14bf064fd1f9f329d83
SHA2569934dd797d48daffa31004fe8c3c9a7ac759b5b22a0489f8bf380994c136719a
SHA512b78bcd6c74cbd6a1e8c4936398f3b17f388e68bc2f24ce23792a00260da99a8bb9885569aa7cbdacd68569bd40d76ebb118c90db6cc8a3c2b772e623f1ad0198
-
Filesize
3.1MB
MD5712d466cf9f8e982f18eb3355131e5c0
SHA17d713406a470e2d34ec2b44a353fc6f0a700ebf3
SHA256c35431b8db327238a32ce86f4f65b57571a57ce552d79e05cd49b53d4dc66f97
SHA5125edb0967f46cd466347442f900e90c800e2304cd7c595b1802669dd2056483e9b6575b8aae80ba2d797531176bd0e68c381c574ec2f24b2f5a0f6651e5b9b35a
-
Filesize
262KB
MD5fe9a74e5d7a8eb7c09ebffc6f6a6128b
SHA1ec15f80d746ef681ab34ea124b0704e98b67e05e
SHA2560989916204259770d65679bdb4f7dd28f4cc04d74128812a1fec111e13448fe6
SHA512891600569a7cd07e790498a08c661e4337b0f3404c52ed15dc207c0b83e8e3978cedce05f51abfb8f9653b73dbcca78df9ccb270f35fb74b743f353293597a54
-
Filesize
3.5MB
MD53ddc54bfd323661b305fc0de02450eb5
SHA1c2e0f15df9138001a5689493fb49420ff6aa865e
SHA2566d070dd40088be613f9635527845dadae669ad7a3fb954cfb3cad71cec9944a3
SHA512bf2b1404d2fd76a900c3ad1d934e4aac2ff68bd31657353d5b5208f97a7233eef92f0ee0a5d2c4d54000923d4091f7231d8b9f7c418b385e50c97048b7bf6d1b
-
Filesize
366KB
MD5149131a90f99225e6c7e28a06164dd9a
SHA1f9d0e7ae3bed79498bf4da92c0ef9568d4e5595e
SHA2566b176bab868dc372496ab3c6ce97518d276c17143f77ae15c992970c1efdf21f
SHA512d6f611d974402adba0548c6f15527f2d7f45e2e5a3466ff2d1b93fcd9eb5ae22a96468e8d4c8d428167a0801f2e1f4a702384878a4fec230f79529ba975b309a
-
Filesize
1.1MB
MD5dcf197da548e85d911ce6d40222b3592
SHA12b5e353c214eaa0bbd7adfe00ff4c9f1cf9467ae
SHA256d0e75a424812f8b899626795c8b929c40fdcbf09a0b7445d159f82256b896acf
SHA51226f28dd0f88c5f912b29495912eecc06cfcdb000a591b6a53cf85c6000c3e3dbad871750b7d4167e1657044c3efdc8576d0b3b5512814991c9d0f7c7d9ba0ef3
-
Filesize
261KB
MD5cd0a460f7d7b6b7e26ab93a76db238e7
SHA17fd65b4ab83feb3924920b65b780d651881fe700
SHA2568297174fbead83c38fee9b7ed1d9017a9c8629c7b1ed4d48e89aae7faba1846f
SHA5128a030751bb330abde0d2f1bb626bd83b307fa80adf863316a10a7e1a25b0245bee3c7b46ee1461d19b2672a8d0160f049d58cdb128c74f6728cba4b61c0e9d76
-
Filesize
25KB
MD5168087c84c5ff3664e5e2f4eec18d7dd
SHA1639e9e87103f576617ed08c50910ca92fe5c8c5b
SHA2562a7cdb79045658b9c02ebbb159e5b3680d7d6d832dbd757572f7d202c3fa935d
SHA51289491261e1234f917964566def4b1a50505ba4c2eb90d14c19e2130d78fe65cd61c4bba685909109c7088b35e7fd48f6311ace7a0dd8c703a6d1b1d23d1a54bb
-
Filesize
11.0MB
MD5d60d266e8fbdbd7794653ecf2aba26ed
SHA1469ed7d853d590e90f05bdf77af114b84c88de2c
SHA256d4df1aba83289161d578336e1b7b6daf7269bb73acc92bd9dfa2c262ebc6c4d2
SHA51280df5d568e34dfc086f546e8d076749e58a7230ed1aa33f3a5c9d966809becadc9922317095032d6e6a7ecdfbfbce02a72cc82513ab0d132c5ffa6c07682bd87
-
Filesize
21.4MB
MD5cb3952f1852179348f8d2db91760d03b
SHA14d2c9d9b09226524868760263c873edc664456a9
SHA256a9ea40670a686e175cc8c32e3fc6ba92505379303d6524f149022490a2dda181
SHA512163006435a30b31ff0b079215efc0cedf6a624516af1ffccbc6144cfdb205b822029d523f28ec86e0391af1b741771b860cf4d3492c87567a55f541a39c69d11
-
Filesize
326KB
MD593d82638ef554a5117ce5b0d23449d01
SHA172f96fae5b89aec666887d34655552e8f9cca90b
SHA256c45269675dbf15f6ef65637952f5e57c50f124f2182bb6d526cff137bdd07008
SHA512271b1a758070354bb1ae8530c21fa7a25937f739b1d2844dc0c23a8984e3a8e5b0478e7bc6053e36dbcaa460eca814e751d770553b224c0081e46981d8ad2a79
-
Filesize
403KB
MD5c7f95fc671d7bf1bec293e9500577bcf
SHA15366030099354e76ab5f8b8df4b2e226a29679ef
SHA256d1bd0c0a32f154e4a9c6eca1eafee762ccea17a390706025b63e657f0305f432
SHA51282b932b03c091cf27c4671ae2bf14a35b4c9a80d0eca01204cc67b85ff215468d2de2db6f2950df9a86c165fbbe2156bb5314e8fcf841b7439badfa122eec99f
-
Filesize
1.8MB
MD53780f9d19a4c140b9602d4d296eb1dd5
SHA12f1330ed454a211654117510d441bfb45ef367f9
SHA2561095f0cd3259c8740c345a37417d7928a9ac7d70db31ccb9b8bfe36b0e231f08
SHA5122bfbc67959026c91207d3c9283a736a9b3eb35695612ce42e129231c7cf67df8943ab146513f7123383958c8de613d1bab733cdd8ac2f9ac1c73c200f5afbd00
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
692KB
MD5a68ad41d37794044ca97795adc82aca9
SHA1d543e851fb4d0546539e8507b1b53bf83e68a690
SHA2569921dd74757f7e43ccfac522ee57baef2376545b5e6ca66573f8c597c04b6398
SHA51253cf7ed7ebeabd729df07ebd5bd25670774f4b2dedd2b0e789aa2b27138d008ca2571c10e06baae7a9690e9d72e39a83ceeba11f0d1ba7595924a16bd6709c7c