Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 08:56
Static task
static1
Behavioral task
behavioral1
Sample
Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmd
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmd
Resource
win10v2004-20241007-en
General
-
Target
Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmd
-
Size
3.3MB
-
MD5
55275e90f2a4ca23422103276e8eae71
-
SHA1
1799345fb5bf3cf04c44bfa5b59790c9e4e8a0af
-
SHA256
0bd7bd207364b329f44fec39787189cc5755e9fc1a714cbf3b57be785e224596
-
SHA512
4ca26d59cba2e38751f527b12d040f1e5e67742020e3e0f93551b60f8600451e438c547d3c954778fc019889f93fb39a89ef5b214c4433a6c3f220ddabe7c26d
-
SSDEEP
24576:IHZYL1t28pLiMl5F3p03CX4axBJGhRCB4L90l6f2tliYajE/BPbN650iKBzFufPS:I5YLHFi05X03krZUFCsILZ4AX
Malware Config
Extracted
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral2/memory/1548-29-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-32-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-34-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-45-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-54-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-67-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-89-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-96-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-95-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-94-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-69-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-92-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-91-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-68-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-90-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-88-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-86-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-66-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-85-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-84-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-63-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-82-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-81-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-80-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-62-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-78-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-75-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-71-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-93-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-65-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-64-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-83-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-79-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-61-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-77-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-76-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-60-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-59-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-58-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-57-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-56-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-70-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-55-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-53-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-52-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-51-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-50-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-49-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-48-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-47-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-46-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-44-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-42-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-41-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-40-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-39-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-38-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-37-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-33-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-36-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 behavioral2/memory/1548-35-0x0000000002EA0000-0x0000000003EA0000-memory.dmp modiloader_stage2 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 7492 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation aymtmquJ.pif Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Trading_AIBot.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apihost.exe.lnk Trading_AIBot.exe -
Executes dropped EXE 23 IoCs
pid Process 4740 alpha.exe 4584 alpha.exe 1376 kn.exe 2612 alpha.exe 936 kn.exe 1548 AnyDesk.PIF 1984 alpha.exe 2560 alpha.exe 2560 alpha.pif 1316 alpha.pif 4292 alpha.pif 4868 xpha.pif 1064 aymtmquJ.pif 3632 alg.exe 3664 DiagnosticsHub.StandardCollector.Service.exe 512 Native_neworigin.exe 1512 Trading_AIBot.exe 1156 elevation_service.exe 1988 fxssvc.exe 4968 elevation_service.exe 1984 maintenanceservice.exe 7308 OSE.EXE 312 apihost.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Juqmtmya = "C:\\Users\\Public\\Juqmtmya.url" AnyDesk.PIF -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 54 api.ipify.org 53 api.ipify.org -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\alg.exe aymtmquJ.pif File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\3009a3ef94857919.bin alg.exe File opened for modification C:\Windows\system32\AppVClient.exe aymtmquJ.pif File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe aymtmquJ.pif File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe aymtmquJ.pif File opened for modification C:\Windows\system32\fxssvc.exe aymtmquJ.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1548 set thread context of 1064 1548 AnyDesk.PIF 114 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe DiagnosticsHub.StandardCollector.Service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apihost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDesk.PIF Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aymtmquJ.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Native_neworigin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trading_AIBot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3812 esentutl.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 7528 schtasks.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 15 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 312 apihost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 512 Native_neworigin.exe 512 Native_neworigin.exe 7492 powershell.exe 7492 powershell.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1064 aymtmquJ.pif Token: SeAuditPrivilege 1988 fxssvc.exe Token: SeDebugPrivilege 512 Native_neworigin.exe Token: SeDebugPrivilege 1512 Trading_AIBot.exe Token: SeDebugPrivilege 7492 powershell.exe Token: SeDebugPrivilege 312 apihost.exe Token: SeDebugPrivilege 3632 alg.exe Token: SeDebugPrivilege 3632 alg.exe Token: SeDebugPrivilege 3632 alg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 512 Native_neworigin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4960 wrote to memory of 3952 4960 cmd.exe 83 PID 4960 wrote to memory of 3952 4960 cmd.exe 83 PID 4960 wrote to memory of 4740 4960 cmd.exe 84 PID 4960 wrote to memory of 4740 4960 cmd.exe 84 PID 4740 wrote to memory of 1168 4740 alpha.exe 85 PID 4740 wrote to memory of 1168 4740 alpha.exe 85 PID 4960 wrote to memory of 4584 4960 cmd.exe 86 PID 4960 wrote to memory of 4584 4960 cmd.exe 86 PID 4584 wrote to memory of 1376 4584 alpha.exe 88 PID 4584 wrote to memory of 1376 4584 alpha.exe 88 PID 4960 wrote to memory of 2612 4960 cmd.exe 90 PID 4960 wrote to memory of 2612 4960 cmd.exe 90 PID 2612 wrote to memory of 936 2612 alpha.exe 91 PID 2612 wrote to memory of 936 2612 alpha.exe 91 PID 4960 wrote to memory of 1548 4960 cmd.exe 93 PID 4960 wrote to memory of 1548 4960 cmd.exe 93 PID 4960 wrote to memory of 1548 4960 cmd.exe 93 PID 4960 wrote to memory of 1984 4960 cmd.exe 94 PID 4960 wrote to memory of 1984 4960 cmd.exe 94 PID 4960 wrote to memory of 2560 4960 cmd.exe 95 PID 4960 wrote to memory of 2560 4960 cmd.exe 95 PID 1548 wrote to memory of 1624 1548 AnyDesk.PIF 103 PID 1548 wrote to memory of 1624 1548 AnyDesk.PIF 103 PID 1548 wrote to memory of 1624 1548 AnyDesk.PIF 103 PID 1624 wrote to memory of 3952 1624 cmd.exe 106 PID 1624 wrote to memory of 3952 1624 cmd.exe 106 PID 1624 wrote to memory of 3952 1624 cmd.exe 106 PID 1624 wrote to memory of 3812 1624 cmd.exe 107 PID 1624 wrote to memory of 3812 1624 cmd.exe 107 PID 1624 wrote to memory of 3812 1624 cmd.exe 107 PID 1624 wrote to memory of 2560 1624 cmd.exe 108 PID 1624 wrote to memory of 2560 1624 cmd.exe 108 PID 1624 wrote to memory of 2560 1624 cmd.exe 108 PID 1624 wrote to memory of 1316 1624 cmd.exe 109 PID 1624 wrote to memory of 1316 1624 cmd.exe 109 PID 1624 wrote to memory of 1316 1624 cmd.exe 109 PID 1624 wrote to memory of 4292 1624 cmd.exe 110 PID 1624 wrote to memory of 4292 1624 cmd.exe 110 PID 1624 wrote to memory of 4292 1624 cmd.exe 110 PID 4292 wrote to memory of 4868 4292 alpha.pif 111 PID 4292 wrote to memory of 4868 4292 alpha.pif 111 PID 4292 wrote to memory of 4868 4292 alpha.pif 111 PID 1548 wrote to memory of 4956 1548 AnyDesk.PIF 113 PID 1548 wrote to memory of 4956 1548 AnyDesk.PIF 113 PID 1548 wrote to memory of 4956 1548 AnyDesk.PIF 113 PID 1548 wrote to memory of 1064 1548 AnyDesk.PIF 114 PID 1548 wrote to memory of 1064 1548 AnyDesk.PIF 114 PID 1548 wrote to memory of 1064 1548 AnyDesk.PIF 114 PID 1548 wrote to memory of 1064 1548 AnyDesk.PIF 114 PID 1548 wrote to memory of 1064 1548 AnyDesk.PIF 114 PID 1064 wrote to memory of 512 1064 aymtmquJ.pif 118 PID 1064 wrote to memory of 512 1064 aymtmquJ.pif 118 PID 1064 wrote to memory of 512 1064 aymtmquJ.pif 118 PID 1064 wrote to memory of 1512 1064 aymtmquJ.pif 120 PID 1064 wrote to memory of 1512 1064 aymtmquJ.pif 120 PID 1064 wrote to memory of 1512 1064 aymtmquJ.pif 120 PID 1512 wrote to memory of 7492 1512 Trading_AIBot.exe 126 PID 1512 wrote to memory of 7492 1512 Trading_AIBot.exe 126 PID 1512 wrote to memory of 7492 1512 Trading_AIBot.exe 126 PID 1512 wrote to memory of 7528 1512 Trading_AIBot.exe 128 PID 1512 wrote to memory of 7528 1512 Trading_AIBot.exe 128 PID 1512 wrote to memory of 7528 1512 Trading_AIBot.exe 128 PID 1512 wrote to memory of 312 1512 Trading_AIBot.exe 130 PID 1512 wrote to memory of 312 1512 Trading_AIBot.exe 130
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\System32\extrac32.exeC:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"2⤵PID:3952
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe3⤵PID:1168
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmd" "C:\\Users\\Public\\AnyDesk.jpeg" 92⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmd" "C:\\Users\\Public\\AnyDesk.jpeg" 93⤵
- Executes dropped EXE
PID:1376
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 122⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 123⤵
- Executes dropped EXE
PID:936
-
-
-
C:\Users\Public\Libraries\AnyDesk.PIFC:\Users\Public\Libraries\AnyDesk.PIF2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\aymtmquJ.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o4⤵PID:3952
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3812
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1316
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 104⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Public\xpha.pifC:\\Users\\Public\\xpha.pif 127.0.0.1 -n 105⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4868
-
-
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl.exe /y C:\Users\Public\Libraries\AnyDesk.PIF /d C:\\Users\\Public\\Libraries\\Juqmtmya.PIF /o3⤵PID:4956
-
-
C:\Users\Public\Libraries\aymtmquJ.pifC:\Users\Public\Libraries\aymtmquJ.pif3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\Native_neworigin.exe"C:\Users\Admin\AppData\Local\Temp\Native_neworigin.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:512
-
-
C:\Users\Admin\AppData\Local\Temp\Trading_AIBot.exe"C:\Users\Admin\AppData\Local\Temp\Trading_AIBot.exe"4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7492
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\apihost.exe" /st 09:02 /du 23:59 /sc daily /ri 1 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:7528
-
-
C:\Users\Admin\AppData\Roaming\ACCApi\apihost.exe"C:\Users\Admin\AppData\Roaming\ACCApi\apihost.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:312
-
-
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:1984
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\AnyDesk.jpeg" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2560
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
PID:3664
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4992
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1156
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4968
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:1984
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:7308
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD55162bdd6544a6cce684bb4d5a2b41748
SHA15f5e4d9b7e5dadbdb8ea2fc2e5106f623eec05f7
SHA2569b093ca382de65e0982ff4176f7e1bd15b8f00fc5103e21dff8d81dc31cd279b
SHA51247672562d3391f3bc3861e76a5b489e05c31662abd3f1497aa65035d11f4c8555b4abd90083d79452f1b5cf1c53ee7b1f58c71b3cf2ec775a4e59222ea58bcc1
-
Filesize
1.3MB
MD55877f7e1d6fec5ba0b9f1e976efaaff6
SHA14f68d96b68292b43a09570ace0fd5d32fb260aa5
SHA256053f73869a222ff89c603e613f273201fb1f6d75c05790315b464189fb6ce902
SHA5126cc540d887bcacbfb8722e7844c27e96ce75b19fa7b0a67bbc91e55862bc82ca551562503e0b3a98719b13c6bc334a9429c7728acedc2dc5d5144047da9fb34f
-
Filesize
1.6MB
MD58d252d5e2d47556a45b616bfd6d0ae8d
SHA1bb5ff8624358a62906b89ea6ff002b8c0421efd2
SHA256237c7455bb0766d1d09ca2c671647140c9e98cdcf19a7f7d1d2384ca55a947a4
SHA51284e066fa866ab3bc7f0aca4753093911da737127d6120da16587dd0eabb53d4b238e93a8698b94bfd70d1a389880d21bb7fda3f08627e8d716aa57cbe87c90df
-
Filesize
1.5MB
MD58508030d8d81faf477a3004b51f9c807
SHA1f692f53d69d0fb5ffd3d71c1af54c520eec9ab2c
SHA256c4fdfdedebb10c1dc10dbfbdf2572089c691e28ebae172ed7de916a0fa18e4e8
SHA512c9c683beec3c49fdb7713c9465cff7c8082afadf660a3059134eaaf732805ccc856f3cec5c61ed5887956ffc10e07cd8bbf9054099ed11169183f661afff2f64
-
Filesize
1.2MB
MD53ffd9d7fad26c3a1910aab22b9476543
SHA1f5483c41447cd97b0444f7b362ebe0582cd4386f
SHA2560738651d79982eb30b3cb467b065049f7c913dcbf16aa57da9655385597b101b
SHA5126d042c26138a39caee4a921fdf3c1190e1812a3fe4a2d908c3c329f8f6e0ad0830003240d9e6ab15ac4aad4570ca445fa47d07c25c2dc4c2f19ae79b067544f1
-
Filesize
1.1MB
MD59d554351e550e3fe1e151ae31a010e1a
SHA144ee5f83ec760f373a9783b7962ab161e3c4e314
SHA256cfa57bb69368e007162ebd8d561ff3f2b7f6067e742131f339bd12314bfd8aa3
SHA512e7cdd4148bd19d173c18c193b0708fc8afe278e921bffa62f739792364c21d44a27a53ed274d23eaf253a5bbd916becda49b429826acbeaa5c8d1a75b95f8826
-
Filesize
1.3MB
MD516d4663a7306746bb94a7e2e68b62ff9
SHA1db9fc12ffca0c05d12c1985a5d5b1b4881d19431
SHA256a40efc4b0963e06dcebe396f09a31eae188dfe346babe97be086f8c4155cf33b
SHA512675caef30a5670dad985e54f22305bf4a131d702fe8cd5d9ac3762ae866ea44b14a6a0622bc7bd1a15dd4d97652e1428db9916b4d396814b071412168c0cf370
-
Filesize
4.6MB
MD52ef14dbe06bcea8951515736963a2892
SHA10d475d63a997c102e93d1d4e0efbeef8f302b2b2
SHA256706a2dcaf22b126b6e4a9fb882da15a882610898288fcef117c13cf21c9f3ac4
SHA512357574bbfb3d6fefde58b98b6db72baafdccc2cbc619eaf908f7ee70aea756362be86212331594df153738f72903996971d1da3ee2dffcdabfaa97f7aced8cad
-
Filesize
1.4MB
MD5c66af1525fa04e2265950a650b93402e
SHA1d4883ee032362e6f587bc443008d620ec249db45
SHA2563688517c73053a0bd6c006ab7ab352babf3a6f910c9b5669a9aeac247719747f
SHA5126fee4cbc82daca17e25dedab6a9b7c3a4605ea482e9fc1b8774f9d5a433b0c64a3195fcdbac197432e51a631423a5e2fc4e0c312cf88d00e31e0bf32ee88cb6e
-
Filesize
24.0MB
MD52f3255e1fb71c870d07e04111f830828
SHA170637446541be803f3a0264c42a417a6b2a35a41
SHA256103c21484b36118a1abc31c665ab9e3543a5f2dc7b5d70c062ec5c7976d327a5
SHA5121efbc7b9af8ebb17191e013550e76fd3e2fe4f69616f8ac225427a9283e50f85c0fcd042d8ecd81198f19315235dd563066c98bfbcc44b30d20c79f865f84c00
-
Filesize
2.7MB
MD552c4ec18846548bb3517940ca29ffbf8
SHA1fa5b441c7f529de000bccc4955bf1baa600b2b2c
SHA25615f56515c4a64c443118e0b4b31497d17b762cfaa65251fade9220bb8cac0c0b
SHA51239ea23edaa9bea9a6bd0df67665f21f9a1951fbd99e15df33beb2d04db211ca1cd3a78670f1935f1b126cdc86970d9d902fdf5b4f0b8c1e9364d7ba00cd64dc6
-
Filesize
1.1MB
MD5b1763fac75fffeaedb934a2cbd54e1c4
SHA1422db4827f8e63256576272a2071300edd8ddc61
SHA256bcfb20f1f08abf8e4331659ae07100ce4bb5cc27c879a280b10b4f0b6b17bdef
SHA5121a59d2e3596ca04312a1a11792c4db3270f2e0b69a948ec835a0d0f475dc0ff19883dea0bb3380c8eb016fcc9d3a8b3af7f049e025fe5285d4f113634f14870f
-
Filesize
1.3MB
MD58c6c5b5a2e9077d3028e573bb292b7fd
SHA194cfeae60c164e708b48dc284c557b194cf90510
SHA25603b83758024b0007775881640db110cf8b29c7814a0ca6572de383aa34a9f29e
SHA512213f1d4254b72a972ac5e5ed5d7dbeb0e91fd48bdf2d89f17adfc9e5a5eaceafede166106ddc216c22b9b3377f827119784c9fcb9d574475dc9c50dbdcf70f4f
-
Filesize
1.2MB
MD5b2001dcaa64f0c9fc525a30ae1b1e159
SHA1fd0788ed98ceacdb080c95fd26cef5f93e704fd4
SHA256ee706032635f7a716347c90a21548bf595c9f6d387041cf1e88d09339d7db5f5
SHA512242c6db21d51bc8ca8f52928fa48f5faa936d704c0fe546bde47049f5162efc9e923f71a00314e93eb380714e864ded4e958026c15ec8b172e8b0905756b09e3
-
Filesize
4.6MB
MD5676968847ba229f218901b7bdf14b632
SHA1fc8c7e6a784ccdc777b16c98fa7183b5f7fdf887
SHA256035976e60217a9a599b79361dfb3b4c918f04eaf6f086b2e1a04b2bfb007b480
SHA512dbd7efe99ec6d80d0a6dc71d3bc8205714fad5188bfa2a26d116dc64c614e3f6b443d5dad1f176862da85073fb1c4fba073a93a24c983a8bca4bbba5ec72fd89
-
Filesize
4.6MB
MD5855e9178025e7aab15a3b948bb8f6408
SHA13cfe223de000fc8f446e1edb076e9dc425dbc413
SHA256feb4331c00e025fd084e97ef25222196103094fac2a694638209ad6533a231a5
SHA5120e217936e0aeb92786aa9a7c5520b9d6885cc2e47b673a273c4f41d9a9b26b3ad0bc004eed206c18638fc3d1a8f1525f76e5bd404256f52b972e48e02930dc2d
-
Filesize
1.9MB
MD5a52cba5d296030870c4fcb8b0e2a4002
SHA11ebb32327afad982a9996673e8e779438850e397
SHA2562151eb994a2a4895ccd501c828ee399571cbe1abe41f520abe249421fcd98342
SHA512c6f72ab8f0cbc950f50d42d19c8e1cc7217b54515cb65c8a3ba93d00dc21df242d466b06c1f10cd0e8bb563d67ae5fc0f9687313d287527abb5e84cd3c9e376d
-
Filesize
2.1MB
MD55cdcfb4fcadf543ac4fb9fd12e7db783
SHA106ea855bb2f55fd9ce419f2db220995326122449
SHA256e36cd80ac9fa923ed6792e11751ae8b84b6484a84312aa29bfe4042f1fa6719e
SHA512d31027a7a8a0515da1dda9249cb1e5924a9582a41718537b773cb9c403915f7912ad02d3b2ffbe47bc7a6a969257e616e8665118dde9f6429d99e87a6a03e91e
-
Filesize
1.8MB
MD562adca66be8f0f138cca016931e86053
SHA10973d466f6ba8070bdcc3ee7bc2d50b7091a96f2
SHA2565b1debc09a6c6e7d309afb1ccff6b47e4ad69e9026f9f56159346e76b9d4a066
SHA512ab073c2a0b66b872ea89e26850db53e004d1f669d910b09692cd42cb64ebe22a4089c685e70d5b52600960eb0b3d391b7f96ca23485c2966dde4fb179064b12d
-
Filesize
1.6MB
MD5f5600b43a1f9723f360b0ff776b0e005
SHA19a789cc255d5bd40e8c3f7d48d59a3d344349aab
SHA256151432f6fcd3e95ef6aab0d5649305948b95bd760aefcfe33189ec84252c9802
SHA51279959d9f6e019203f733ebc227635509ed2960f6f06d9eca7cb6513277a15c8add1b329b68724d0d655021551619157b0797e44744adb2f82e0c3c9547a307e1
-
Filesize
1.1MB
MD5c8d65292bda6b6788801168369298f03
SHA15900a84e227e33753a902e6edbc3a2b6a5289bda
SHA2568c5043ed7efd40870c6e0e0bf26e7906d5a6d4248d3a796db90e166216254e77
SHA51249c2dbb29f4cab490a4ed71004c128d0a7d9c46e0bb0556785e3b8dd00a2589a3f912f39d08afb851b26d664f2dcb8a6e8c2154e82426d05be4bfd966c1238a3
-
Filesize
1.1MB
MD53f2cda5fe0649c7cb044bd920c0b3895
SHA19ef9a4be8b872a9b272ae539c69c2439aa7a066a
SHA2561c98adb14b1e0bd8e53e9b42558a1b442911d3c4318e9f7ebd579248b200e3ba
SHA512c3e3bf01030498d44cb358eb1249e4325c114d1db68a5b127a3d8a9224c95eb2c79174655e5da800ecde9f2fef4bc48e945ba7e3b122e22047f01058e2b267c8
-
Filesize
1.1MB
MD53bce03127154ae6f619f0362f956e9a7
SHA11c393c6d64263facf8c9d52e2290a98d0ec4c727
SHA256c3144e77dd3b4ac1ca5c2960de7966986a843b0354e12c2b664b1ed0c875ef83
SHA5121f7e58ced28d6a694225fae9a6f943d28e3284384df3852ee741fdfb90a0afa09d1f00bec2a732007759b94a7d26fd44e483d067cf817645ac9661c844c29a45
-
Filesize
1.1MB
MD562ee3c94b75e7ac5ce5dc39ae0d1e833
SHA15612b1f424c4bf1c21abd21fe08a9516de17f1e0
SHA25608e2e982b887ed33b2059efe27d7a98962f7d813d7ec866ee6eb0c8a447f4589
SHA5120fc10c0442a590668a78c828d27e942222ed1299270c1f94d90644444cb600dfe8aa0bd6ec92547a130dbb9a2a1055f396ef3ff1e62cb61172e3485982cc06ea
-
Filesize
1.1MB
MD5ad1317fbef550a2065608bab1cd1a959
SHA12b0670559a628e65d40198def863f8e83219f8b0
SHA2569bdc876b0e153a5cfc9342fb03f3f5039e221d55e15c499eb9a3bd0762f20207
SHA51295a20b471db52f0ca6aa409ab28f66a57e072221f1f44b95ef4cff2ebfc2e27134fce5fd19bbed29a3435d9d171bed8ab84b76dde0010f05acaed09692f3f3e4
-
Filesize
1.1MB
MD524dbf442b0a53b28a986272fe360ab8a
SHA1c9722a7fed2a7bb1dd4669f6abc38e357cd6ff8d
SHA256c01a4e597b6b7f55bb5b3049d6f86ada80c06d70de89213555e4ca40a87d4c19
SHA512136bd6dc862d3b1f557a641b29e3108e0ff5fcc6bfa015e3e71050efc2bc0ec9a3349e4a181554f6b0f59e24d59b2fd62b4b59674848d0e2a6e73e1b6b4171d8
-
Filesize
1.1MB
MD5e210d25f9b2445279e1787aa6c563931
SHA1adca318006a0d50aad8725a481911f1f5311ab86
SHA256a33db27af38b2f33d3e08270b2ae78b92430dec92520c3d865d69c5a0680ecaa
SHA5128cf5eeb3be5f00c3afb604e29ca8f2d6eaa37dd000294004ae7192df641bd179d60e98996323191ba52199d025cc6bdf722ea4fa70e57e5587098fefa6d5a3eb
-
Filesize
1.3MB
MD54964f6e7d4723e07af9dd28ecd67e418
SHA108d478d2823c47ee0c8d8fffa0505c80c3f7c3f4
SHA256b99c386f6f2b8b53fd2bcbd0d46dbfb34b0227d1f2138e943026d4c57222a01e
SHA512875c012d84deb703d15d8a17384dae42af21b6bef2b5029eeb21b506bb9cb9668d957cc807b73743db560ff7cafacb3cbf9bafaa0c75db88fd1f29d481f5d9fc
-
Filesize
1.1MB
MD5d93e333ec8319263b245bca5c4919898
SHA159804db81469df59de3de5457baedf1decb30597
SHA2562070a781546b986ab354ebb6a6c27c76b228973e36bd88180b16006ac4c01dd3
SHA5122ed14fe7e04b854be0294b3dadd74b58b2de5fd9b256820d38eb37a2d21bc2a3c8ad4ac8a9c725f52d9372b1e9b2b93cfecc91380e4fd08b891e03e34edf435c
-
Filesize
1.1MB
MD5a9b111282aba6acdbb5b9df27066062c
SHA14ed2defed15ea15b16d1d91a416221839dfa2ac0
SHA256e6a6decf53666b07470af4873c300a7598b89f19ad9abc54eb63fce25ccd6403
SHA5127a6ea9fef7c44587f2662603ac143a29e7cbf65ee2641277af75a2b36bee3e95120c2e42e7b5c1e4e2c389b7129a221e7598f1f95f02342a47f55dce1dbae1b5
-
Filesize
1.2MB
MD58f8bcebbc9e891576563c85266b7fe5e
SHA1fcfb4006dc92c8acdaad6b9be51cc806e8ca50cc
SHA2564e734a1623accaea61d3e38674190ca43f9ef74f25ec5f7159efa1208510b1b0
SHA5123d2d8f6c5ea7470813064b43b9da66e4051e86d5559ec8dd5d5dae1d2d4a51d6dc7a5e1e50f2dbbb1c16e1a4cf49e73b8677c245b44dd1f6bb354ee411929d88
-
Filesize
1.2MB
MD5034066997a240e70a8d78de7ef0528d9
SHA1429072567908d2ab117fdb91821114c2a1830b54
SHA25687e881046df49ae2d10fffac826da02d033ea366ddbc14ec42f61039dae3d10e
SHA5125775a1de4312a53d572241ed61f81f0a08746d070f774c85b57fb0c3dd6bc8c5c22b18b0daeaa8c25ecfb337b8190463fa279bb92034f7e5c824aac861aa1a25
-
Filesize
1.4MB
MD59ece2aae8e8fa77849268dda20caec7b
SHA151a2dcbba6bcbb069a3a5ab77659d46e98b02289
SHA256a7ba9eac2a255cab335d7b0d00da00c962e2becc8aebf313434e861c502d5dd9
SHA512e3cb79fb953d247c98b06e64efe737d53eb57233b43b4fd2a637ebd0f5c9ff088adcaf4cffc095aa6a6ce7b87f4b9812d1d8b76a0d27bbbbb4955fa57260adb7
-
Filesize
69KB
MD5e91a1db64f5262a633465a0aaff7a0b0
SHA1396e954077d21e94b7c20f7afa22a76c0ed522d0
SHA256f19763b48b2d2cc92e61127dd0b29760a1c630f03ad7f5055fd1ed9c7d439428
SHA512227d7dad569d77ef84326e905b7726c722ceff331246de4f5cf84428b9721f8b2732a31401df6a8cef7513bcd693417d74cdd65d54e43c710d44d1726f14b0c5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
12KB
MD5a277c41a71cffe5cff67e7100ce294a8
SHA1d9a33273a9f25b6c176bd3629e0f00b8b19b9936
SHA256aadfc0a9f931b4d034676f514b41b3cedbe7bfe529ba703ed89ba9d5aeafbaa5
SHA5122e792cd6f97ec9f4aa9ddd037ce0cce06a80e161b52cf50c52a354482005e7225466d32195dc3019f925500d137de76005c5215bfca6e1a584ea4e6291db5409
-
Filesize
2.4MB
MD5b25f8b243fa4e165791ef4db2ed58251
SHA1cf923845aac7ee38eaddea46069a98eb3e1f2ad1
SHA256564768d36462eb6b5ed7c299f612ecde7938a9f7b239bdc116f730e13fa4203e
SHA512c6fb85ecd6a48266807a89a64fd52962a1d3e4413fdeaf5a90f400cd6abf9ec7379e7c38eea013a8e54ba8b0f0ad86307feb40d08bb71b13a96012d15e38c28b
-
Filesize
1.2MB
MD5e02910d2d83f40faef8719a99ee0ef5b
SHA149f932b32703d21b2041f36829d87353e64ae685
SHA256326a9344d8d5ce3e59d1c8560043d4ebd87ba53b732b635fab2d8afa210c5c05
SHA512a55d2321fe633cae781b5868763c9f778b3413d24aa0c83a99bd4e12bd489ec2cbac3bca1fea04a8233a542fbf609b33db697e32180d3948deda723b096f60b2
-
Filesize
60KB
MD5b87f096cbc25570329e2bb59fee57580
SHA1d281d1bf37b4fb46f90973afc65eece3908532b2
SHA256d08ccc9b1e3acc205fe754bad8416964e9711815e9ceed5e6af73d8e9035ec9e
SHA51272901adde38f50cf6d74743c0a546c0fea8b1cd4a18449048a0758a7593a176fc33aad1ebfd955775eefc2b30532bcc18e4f2964b3731b668dd87d94405951f7
-
Filesize
66KB
MD5c116d3604ceafe7057d77ff27552c215
SHA1452b14432fb5758b46f2897aeccd89f7c82a727d
SHA2567bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
SHA5129202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6
-
Filesize
283KB
MD58a2122e8162dbef04694b9c3e0b6cdee
SHA1f1efb0fddc156e4c61c5f78a54700e4e7984d55d
SHA256b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450
SHA51299e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397
-
Filesize
231KB
MD5d0fce3afa6aa1d58ce9fa336cc2b675b
SHA14048488de6ba4bfef9edf103755519f1f762668f
SHA2564d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22
SHA51280e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2
-
Filesize
1.6MB
MD5bd8d9943a9b1def98eb83e0fa48796c2
SHA170e89852f023ab7cde0173eda1208dbb580f1e4f
SHA2568de7b4eb1301d6cbe4ea2c8d13b83280453eb64e3b3c80756bbd1560d65ca4d2
SHA51295630fdddad5db60cc97ec76ee1ca02dbb00ee3de7d6957ecda8968570e067ab2a9df1cc07a3ce61161a994acbe8417c83661320b54d04609818009a82552f7b
-
Filesize
18KB
MD5b3624dd758ccecf93a1226cef252ca12
SHA1fcf4dad8c4ad101504b1bf47cbbddbac36b558a7
SHA2564aaa74f294c15aeb37ada8185d0dead58bd87276a01a814abc0c4b40545bf2ef
SHA512c613d18511b00fa25fc7b1bdde10d96debb42a99b5aaab9e9826538d0e229085bb371f0197f6b1086c4f9c605f01e71287ffc5442f701a95d67c232a5f031838
-
Filesize
1.2MB
MD5b12cf91a21f8ad0ea62ad8c3ce5f2bad
SHA1bdda0bc602477239e54661a7b79fa7668a5c1c68
SHA25675af6fb6d37a788cddeb17f2612f4555f24a38f57776193884168e21dae64dba
SHA5125003cd7cf823f2047d5e23b624784de5cd778ca22349edee3f2b1db6aa2f85b16240349d1c2d7c64e4a53436692569143dfd21278117ce07732b51ae118b6b0c
-
Filesize
1.2MB
MD5367bf1fa6721c6fb8e18d4e95e31313b
SHA1501854a7c9aea31294c67222846ec8c633f610f3
SHA256a73d5cdd959022c52178cc662ca3784f09416940d2f934593daf385cce979e63
SHA5128454914622f4e969da7de6025196b7cf492f53a60eee2530dee47ba872ca5a0d5953e344800e92cc2dad26b97fb2839425d1fbfe9a7c8fc3ccbaa80e0cc95524
-
Filesize
1.2MB
MD5a1a3cd4dd2c1d803f7e8c0df3dad21b5
SHA172bb8feb73e5a60fce8e2a044ab635f3cb7200c0
SHA256f43631913da2d47578c614c0974ef943b763bc6edf22cf67040650d2392455f8
SHA5123f57940f4eb62df9af1c197a55493390b1fbe7020b492e029cf51998df5e2d1e8b272b3e91f8efa4d8882171206008070b743d06d3e70ae44628cb1a1c265e21
-
Filesize
1.3MB
MD5b6c6ea21c0e76ce49c0aaa538a350336
SHA1d81fa064efa740b012add2fb2de8bcd0c7158969
SHA256ab4c70940e3d2cc403d8c0925a871996b536b199908486a3bbc805171593af91
SHA5128bb03232a030ec2f31130f6a14d4749d52456ddf640d3d55a1eeb648ad57b47320eea03796bb0ef45ae6d73ecdf0ad90e0bcd5acf09ebd1e3d1797da60c99773