Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe
Resource
win10v2004-20240802-en
General
-
Target
556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe
-
Size
1.8MB
-
MD5
b6a30c74cf4ada6ed79f9627af48a3b0
-
SHA1
711bde1c76c6039e04a02ebbf92d54ca19e8b3d0
-
SHA256
556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76ea
-
SHA512
d602f74e7e19766bbfae09a6aba8c9a58d9936019b26926dff63c2f5718f6489f9a106ca7e742fd11ae97db263308c7a768443cc6d0660b5bcc017136148b2eb
-
SSDEEP
49152:dkSnU+QqCvJ2wn26gD3lMe6ULQpy25bZPa:dW2w26gD3lgYQpyUbR
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
LiveTraffic
136.244.88.135:17615
Extracted
stealc
default2
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
stealc
zalupa
http://95.217.92.42:22
-
url_path
/7db38bfff9324bbe.php
Extracted
redline
newbundle2
185.215.113.67:15206
Extracted
redline
TG CLOUD @RLREBORN Admin @FATHEROFCARDERS
89.105.223.196:29862
Extracted
remcos
MIX
liveos.zapto.org:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
music.exe
-
copy_folder
db
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
ire
-
mouse_option
false
-
mutex
Rmc-GHRUZU
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 12 IoCs
resource yara_rule behavioral1/memory/556-48-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/556-44-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/556-41-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/556-46-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/556-42-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/files/0x0006000000019438-238.dat family_redline behavioral1/memory/1544-248-0x0000000000C70000-0x0000000000CC2000-memory.dmp family_redline behavioral1/memory/1044-345-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1044-344-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1044-343-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1044-340-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1044-338-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 3040 created 1152 3040 Waters.pif 20 PID 3040 created 1152 3040 Waters.pif 20 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ edcc7fd1b7.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Rmc-GHRUZU = "\"C:\\ProgramData\\db\\music.exe\"" music.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run DEF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Rmc-GHRUZU = "\"C:\\ProgramData\\db\\music.exe\"" DEF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run music.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion edcc7fd1b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion edcc7fd1b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url cmd.exe -
Executes dropped EXE 19 IoCs
pid Process 2800 axplong.exe 2212 gold.exe 3044 legas.exe 2484 X5Eoun649t.exe 2936 GxVQ9loHte.exe 760 stealc_default2.exe 1532 penis.exe 1544 newbundle2.exe 340 edcc7fd1b7.exe 2468 MK.exe 1672 Nework.exe 892 Hkbsse.exe 832 processclass.exe 1952 DEF.exe 1004 music.exe 2520 splwow64.exe 3040 Waters.pif 280 context.exe 596 Waters.pif -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine edcc7fd1b7.exe -
Loads dropped DLL 36 IoCs
pid Process 2080 556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe 2800 axplong.exe 2960 WerFault.exe 2960 WerFault.exe 2960 WerFault.exe 2800 axplong.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 3000 MSBuild.exe 2076 WerFault.exe 3000 MSBuild.exe 2800 axplong.exe 2800 axplong.exe 2800 axplong.exe 2800 axplong.exe 2800 axplong.exe 760 stealc_default2.exe 760 stealc_default2.exe 2800 axplong.exe 2800 axplong.exe 2800 axplong.exe 1036 WerFault.exe 1036 WerFault.exe 1036 WerFault.exe 2800 axplong.exe 1672 Nework.exe 2800 axplong.exe 2800 axplong.exe 2800 axplong.exe 1952 DEF.exe 1952 DEF.exe 2800 axplong.exe 484 cmd.exe 1436 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\edcc7fd1b7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000354001\\edcc7fd1b7.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-GHRUZU = "\"C:\\ProgramData\\db\\music.exe\"" DEF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-GHRUZU = "\"C:\\ProgramData\\db\\music.exe\"" DEF.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-GHRUZU = "\"C:\\ProgramData\\db\\music.exe\"" music.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-GHRUZU = "\"C:\\ProgramData\\db\\music.exe\"" music.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 2084 tasklist.exe 1704 tasklist.exe 2212 tasklist.exe 1896 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2080 556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe 2800 axplong.exe 340 edcc7fd1b7.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2212 set thread context of 556 2212 gold.exe 34 PID 3044 set thread context of 3000 3044 legas.exe 38 PID 2468 set thread context of 1044 2468 MK.exe 52 PID 1004 set thread context of 1728 1004 music.exe 60 -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\BrandonBlind context.exe File created C:\Windows\Tasks\axplong.job 556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe File opened for modification C:\Windows\ViewpictureKingdom splwow64.exe File opened for modification C:\Windows\HardlyAircraft context.exe File opened for modification C:\Windows\ViewpictureKingdom context.exe File opened for modification C:\Windows\IpaqArthur context.exe File created C:\Windows\Tasks\Hkbsse.job Nework.exe File opened for modification C:\Windows\HardlyAircraft splwow64.exe File opened for modification C:\Windows\BrandonBlind splwow64.exe File opened for modification C:\Windows\IpaqArthur splwow64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2960 2212 WerFault.exe 33 2076 3044 WerFault.exe 37 1036 1532 WerFault.exe 44 -
System Location Discovery: System Language Discovery 1 TTPs 44 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Waters.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edcc7fd1b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language splwow64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language context.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language music.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language penis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Waters.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nework.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newbundle2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gold.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language legas.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 penis.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString penis.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default2.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2728 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 1784 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 GxVQ9loHte.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 GxVQ9loHte.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 GxVQ9loHte.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 GxVQ9loHte.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2052 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 280 context.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 2080 556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe 2800 axplong.exe 760 stealc_default2.exe 556 MSBuild.exe 556 MSBuild.exe 2484 X5Eoun649t.exe 2936 GxVQ9loHte.exe 556 MSBuild.exe 760 stealc_default2.exe 1532 penis.exe 340 edcc7fd1b7.exe 1544 newbundle2.exe 1544 newbundle2.exe 1544 newbundle2.exe 1004 music.exe 1044 RegAsm.exe 1044 RegAsm.exe 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 1044 RegAsm.exe 596 Waters.pif 596 Waters.pif 596 Waters.pif 596 Waters.pif 596 Waters.pif 596 Waters.pif 596 Waters.pif 596 Waters.pif 596 Waters.pif 596 Waters.pif 596 Waters.pif 596 Waters.pif 596 Waters.pif 596 Waters.pif 596 Waters.pif -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1004 music.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeBackupPrivilege 2936 GxVQ9loHte.exe Token: SeBackupPrivilege 2484 X5Eoun649t.exe Token: SeSecurityPrivilege 2484 X5Eoun649t.exe Token: SeSecurityPrivilege 2936 GxVQ9loHte.exe Token: SeSecurityPrivilege 2936 GxVQ9loHte.exe Token: SeSecurityPrivilege 2936 GxVQ9loHte.exe Token: SeSecurityPrivilege 2936 GxVQ9loHte.exe Token: SeSecurityPrivilege 2484 X5Eoun649t.exe Token: SeSecurityPrivilege 2484 X5Eoun649t.exe Token: SeSecurityPrivilege 2484 X5Eoun649t.exe Token: SeDebugPrivilege 2936 GxVQ9loHte.exe Token: SeDebugPrivilege 2484 X5Eoun649t.exe Token: SeDebugPrivilege 556 MSBuild.exe Token: SeDebugPrivilege 1544 newbundle2.exe Token: SeDebugPrivilege 2084 tasklist.exe Token: SeDebugPrivilege 1704 tasklist.exe Token: SeDebugPrivilege 1044 RegAsm.exe Token: SeDebugPrivilege 832 processclass.exe Token: SeDebugPrivilege 2212 tasklist.exe Token: SeDebugPrivilege 1896 tasklist.exe Token: SeDebugPrivilege 1784 taskkill.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2080 556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe 1672 Nework.exe 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 596 Waters.pif 596 Waters.pif 596 Waters.pif -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3040 Waters.pif 3040 Waters.pif 3040 Waters.pif 596 Waters.pif 596 Waters.pif 596 Waters.pif -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2800 2080 556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe 30 PID 2080 wrote to memory of 2800 2080 556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe 30 PID 2080 wrote to memory of 2800 2080 556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe 30 PID 2080 wrote to memory of 2800 2080 556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe 30 PID 2800 wrote to memory of 2212 2800 axplong.exe 33 PID 2800 wrote to memory of 2212 2800 axplong.exe 33 PID 2800 wrote to memory of 2212 2800 axplong.exe 33 PID 2800 wrote to memory of 2212 2800 axplong.exe 33 PID 2212 wrote to memory of 556 2212 gold.exe 34 PID 2212 wrote to memory of 556 2212 gold.exe 34 PID 2212 wrote to memory of 556 2212 gold.exe 34 PID 2212 wrote to memory of 556 2212 gold.exe 34 PID 2212 wrote to memory of 556 2212 gold.exe 34 PID 2212 wrote to memory of 556 2212 gold.exe 34 PID 2212 wrote to memory of 556 2212 gold.exe 34 PID 2212 wrote to memory of 556 2212 gold.exe 34 PID 2212 wrote to memory of 556 2212 gold.exe 34 PID 2212 wrote to memory of 2960 2212 gold.exe 35 PID 2212 wrote to memory of 2960 2212 gold.exe 35 PID 2212 wrote to memory of 2960 2212 gold.exe 35 PID 2212 wrote to memory of 2960 2212 gold.exe 35 PID 2800 wrote to memory of 3044 2800 axplong.exe 37 PID 2800 wrote to memory of 3044 2800 axplong.exe 37 PID 2800 wrote to memory of 3044 2800 axplong.exe 37 PID 2800 wrote to memory of 3044 2800 axplong.exe 37 PID 3044 wrote to memory of 3000 3044 legas.exe 38 PID 3044 wrote to memory of 3000 3044 legas.exe 38 PID 3044 wrote to memory of 3000 3044 legas.exe 38 PID 3044 wrote to memory of 3000 3044 legas.exe 38 PID 3044 wrote to memory of 3000 3044 legas.exe 38 PID 3044 wrote to memory of 3000 3044 legas.exe 38 PID 3044 wrote to memory of 3000 3044 legas.exe 38 PID 3044 wrote to memory of 3000 3044 legas.exe 38 PID 3044 wrote to memory of 3000 3044 legas.exe 38 PID 3044 wrote to memory of 3000 3044 legas.exe 38 PID 3044 wrote to memory of 3000 3044 legas.exe 38 PID 3044 wrote to memory of 2076 3044 legas.exe 39 PID 3044 wrote to memory of 2076 3044 legas.exe 39 PID 3044 wrote to memory of 2076 3044 legas.exe 39 PID 3044 wrote to memory of 2076 3044 legas.exe 39 PID 3000 wrote to memory of 2484 3000 MSBuild.exe 40 PID 3000 wrote to memory of 2484 3000 MSBuild.exe 40 PID 3000 wrote to memory of 2484 3000 MSBuild.exe 40 PID 3000 wrote to memory of 2484 3000 MSBuild.exe 40 PID 3000 wrote to memory of 2936 3000 MSBuild.exe 41 PID 3000 wrote to memory of 2936 3000 MSBuild.exe 41 PID 3000 wrote to memory of 2936 3000 MSBuild.exe 41 PID 3000 wrote to memory of 2936 3000 MSBuild.exe 41 PID 2800 wrote to memory of 760 2800 axplong.exe 42 PID 2800 wrote to memory of 760 2800 axplong.exe 42 PID 2800 wrote to memory of 760 2800 axplong.exe 42 PID 2800 wrote to memory of 760 2800 axplong.exe 42 PID 2800 wrote to memory of 1532 2800 axplong.exe 44 PID 2800 wrote to memory of 1532 2800 axplong.exe 44 PID 2800 wrote to memory of 1532 2800 axplong.exe 44 PID 2800 wrote to memory of 1532 2800 axplong.exe 44 PID 2800 wrote to memory of 1544 2800 axplong.exe 46 PID 2800 wrote to memory of 1544 2800 axplong.exe 46 PID 2800 wrote to memory of 1544 2800 axplong.exe 46 PID 2800 wrote to memory of 1544 2800 axplong.exe 46 PID 2800 wrote to memory of 340 2800 axplong.exe 48 PID 2800 wrote to memory of 340 2800 axplong.exe 48 PID 2800 wrote to memory of 340 2800 axplong.exe 48 PID 2800 wrote to memory of 340 2800 axplong.exe 48
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe"C:\Users\Admin\AppData\Local\Temp\556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76eaN.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 925⤵
- Loads dropped DLL
- Program crash
PID:2960
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\legas.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\legas.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Roaming\X5Eoun649t.exe"C:\Users\Admin\AppData\Roaming\X5Eoun649t.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Users\Admin\AppData\Roaming\GxVQ9loHte.exe"C:\Users\Admin\AppData\Roaming\GxVQ9loHte.exe"6⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 525⤵
- Loads dropped DLL
- Program crash
PID:2076
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 7485⤵
- Loads dropped DLL
- Program crash
PID:1036
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe"C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\1000354001\edcc7fd1b7.exe"C:\Users\Admin\AppData\Local\Temp\1000354001\edcc7fd1b7.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:340
-
-
C:\Users\Admin\AppData\Local\Temp\1000399001\MK.exe"C:\Users\Admin\AppData\Local\Temp\1000399001\MK.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000406001\Nework.exe"C:\Users\Admin\AppData\Local\Temp\1000406001\Nework.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:892
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000407001\processclass.exe"C:\Users\Admin\AppData\Local\Temp\1000407001\processclass.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:832 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start context.exe5⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\context.execontext.exe6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1436 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"8⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"8⤵
- System Location Discovery: System Language Discovery
PID:2492
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6076988⤵
- System Location Discovery: System Language Discovery
PID:1696
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q8⤵
- System Location Discovery: System Language Discovery
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\607698\Waters.pifWaters.pif Q8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:596
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000408001\DEF.exe"C:\Users\Admin\AppData\Local\Temp\1000408001\DEF.exe"4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1952 -
C:\ProgramData\db\music.exe"C:\ProgramData\db\music.exe"5⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1004 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe6⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000409001\splwow64.exe"C:\Users\Admin\AppData\Local\Temp\1000409001\splwow64.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2520 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:484 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"6⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"6⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6076986⤵
- System Location Discovery: System Language Discovery
PID:692
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "MaskBathroomCompositionInjection" Participants6⤵
- System Location Discovery: System Language Discovery
PID:836
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q6⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\607698\Waters.pifWaters.pif Q6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3040 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k "taskkill /f /im "Waters.pif" && timeout 1 && del Waters.pif && Exit"7⤵
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "Waters.pif"8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\SysWOW64\timeout.exetimeout 18⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2728
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 56⤵
- System Location Discovery: System Language Discovery
PID:1576
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & echo URL="C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53287450ae605c052bc99af281c3668ec
SHA1d1910fcc874d79f4d1c85f3e497babf58ccede16
SHA256c45308ced723ed26c82a3f710f6bdf70fd2273b531aa4f778793022cd48ff0de
SHA512cb352f8b2a17fbbad73dbd7bfff3ea74eeedfc5c3079a1ee802bc833637b3a3f4e81d042c3ac09f6abf86a0526ce4585e4d4baae447f0409ae8635931c783b2b
-
Filesize
479KB
MD5c06f1b4620ae77287d760821d0cbe8b5
SHA13334d3d049b4512f2d5c06151363fbee405a8e26
SHA25657b12f4cad8251939bffda4f9306a979fdc90d13e0af58002efbb4c7661770af
SHA512f662c35cab41ca451735a199bde39f53b639537e6046d2e85e9314e9ef15d1047e6904cfa721ff0ac333bab5339ec59432d6ac1f612d1eb05be348b54edd7e8d
-
Filesize
1.3MB
MD524402fc0617a2740c16ea9c81518d669
SHA1a0476ef848cd11bb20f8efd06e295a0f44c956ca
SHA256c02fcc32573f4546201515667154d9e51e2636af52a1790d1063183c0d012566
SHA512dd90c0036a8a109c5645b481f1bd7b193fa86518183790b75dbc400416793fb8f9e7d4d4621d7c0227cbbf483758a03a94581397686b09c6f65218b651b5bc63
-
Filesize
187KB
MD57a02aa17200aeac25a375f290a4b4c95
SHA17cc94ca64268a9a9451fb6b682be42374afc22fd
SHA256836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e
SHA512f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6
-
Filesize
307KB
MD56ead977356a0302d5712c5c72bf82b65
SHA1efc7e990984a170dd352e8290fedd1d4d748851c
SHA2567ee8a586b2c7b7772a44aed28b4cb7934f13f0939e2573c8adf22cda922790ce
SHA5127f0b88c74179866956e2358e21e4700ed9baf1c28712ee78aea689a8027c62aa05c781984c0e3bdca83657b7d34570d5f1e670ef95c91f46f48680c07e53325a
-
Filesize
304KB
MD558e8b2eb19704c5a59350d4ff92e5ab6
SHA1171fc96dda05e7d275ec42840746258217d9caf0
SHA25607d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834
SHA512e7655762c5f2d10ec246d11f82d437a2717ad05be847b5e0fd055e3241caaca85430f424055b343e3a44c90d76a0ba07a6913c2208f374f59b61f8aa4477889f
-
Filesize
1.8MB
MD5f18158be17b318605b14f62cc6319363
SHA1ca0fc6a897495289d50fa85a3f090a7026487baf
SHA25690c9b9a8f68b23d3528c87dde1e3b9bd34ebe672d7bd84a2daed468be1976930
SHA5129c66aebcca70e3b4017ca02e2b50e4627f382e88a750c18f096a5f7639873dc1751f7d3d6588bc3543361b797eeaf39ee33f422e257cb57f741a821f11a69c4a
-
Filesize
448KB
MD5aa5e42ad30cc15c0b9891b8bc67dcbe2
SHA1f3085cb0310e562b809cb46d2387aba1b325106d
SHA256332a9560b06b47f684ff347879b93c64ec4ed74c4470e60b87059116691c46af
SHA51232d2bd7021a48bfc095dcf74eb0d04d23531efb439bb3e68dca369918a7a9bba2d76a0dd2414484d7873e8f1fab9207cc165c0e31e55194a134d6a7c2930c3fa
-
Filesize
314KB
MD5ff5afed0a8b802d74af1c1422c720446
SHA17135acfa641a873cb0c4c37afc49266bfeec91d8
SHA25617ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10
SHA51211724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac
-
Filesize
416KB
MD5f5d7b79ee6b6da6b50e536030bcc3b59
SHA1751b555a8eede96d55395290f60adc43b28ba5e2
SHA2562f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459
SHA512532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46
-
Filesize
6KB
MD5c042782226565f89ce3954489075e516
SHA1256dd5ba42837a33c7aa6cb71cef33d5617117ee
SHA256a7b63cd9959ac6f23c86644a4ca5411b519855d47f1f5e75a1645d7274f545a6
SHA5129f0771c66ea7c0a2264b99a8782e3ab88a2d74b609265b5ce14f81dcc52b71e46248abd77767018711d72a18e20fe3b272513bfd722fff9043f962f7c8ed93fd
-
Filesize
482KB
MD56520492a4e7f9bc4dfb068de1c7b6450
SHA1b5c2086a01528386482826ad243c2711e04200fb
SHA25694465e214c05a6b477f6310957448e7d891ce37c960e36d246294eb6843081aa
SHA512dd8d2d9a22ff521496a908f7dd5de7e25c4d7fd0a56d917a0ba29a5d160a293890f5c397e1ae7bb8a7488d4795221f819d810826b5d533ad1d61e63c438b2565
-
Filesize
1.3MB
MD52b01c9b0c69f13da5ee7889a4b17c45e
SHA127f0c1ae0ddeddc9efac38bc473476b103fef043
SHA256d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29
SHA51223d4a0fc82b70cd2454a1be3d9b84b8ce7dd00ad7c3e8ad2b771b1b7cbca752c53feec5a3ac5a81d8384a9fc6583f63cc39f1ebe7de04d3d9b08be53641ec455
-
Filesize
1.8MB
MD5b6a30c74cf4ada6ed79f9627af48a3b0
SHA1711bde1c76c6039e04a02ebbf92d54ca19e8b3d0
SHA256556cc22826538cbdd3d0010ddb93bd0d97e443798a546efb99a6220f4dbe76ea
SHA512d602f74e7e19766bbfae09a6aba8c9a58d9936019b26926dff63c2f5718f6489f9a106ca7e742fd11ae97db263308c7a768443cc6d0660b5bcc017136148b2eb
-
Filesize
794KB
MD57b5632dcd418bcbae2a9009dbaf85f37
SHA132aaf06166854718f0bcbb2f7173c2732cfb4d33
SHA256361e9c3b62719b79bc280420b5f710e160fd55f2250bf605911ded7162483db4
SHA512c834e90ccf2d35529c294319b8e9a49db7a7d67d0567e0739131d5af51170db32076d68147dc101f8047a75cb5b2275b25a9c8346a99a146a6798b9764316838
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
393KB
MD57d7366ab79d6d3d8d83d13a8b30de999
SHA175c6c49a6701d254c3ce184054a4a01329c1a6f3
SHA2563d66fed04c76d055c6149b33dcfda544b509c57087c57a861e1d6256b59f8465
SHA51264f4551b3be1c21ce7c2d49608463e5aec4166e3e6893883c33a5b7d1109ef0fc8ab6bd15c70d9d606e2706f12a937c2d90d5bc8f6c629ad6f30f212dc25f022
-
Filesize
2KB
MD5c3c7af35edf8faaad4f7a99f332f28fc
SHA1948ae32722c638ce550f154c116fd83f05965a61
SHA256392d1b50c293e77b0208a7414db4da3bde20b5e07c582ab1ec0ffe06161a2ea4
SHA512420183d2138562ebef158a84ec6c3c29f019d8f3659a1f16ec3413396ca42b04b012f5dda2d78844ae8e8e32fdd3da1476edf4c4114dcbcc6e9186596cc1a291
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
602KB
MD5e4fc58d334930a9d6572c344e5129f6b
SHA1d38fbd0c4c86eee14722f40cc607e2128c01b00f
SHA256973a9056040af402d6f92f436a287ea164fae09c263f80aba0b8d5366ed9957a
SHA512a69f5da8de8c9782769cca2e2fc5b28bbeba0c0d0027954dbe47b15610d82277abbe912f0e5921a18000f1a3a3c54eb5922f70c773537a22f4b35ff926d17a59