Analysis
-
max time kernel
126s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 14:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe
-
Size
10.4MB
-
MD5
185c218239b46dff1b2b4642338f373e
-
SHA1
77b794f16a8621b424355343bc5a4b04fd07f875
-
SHA256
07eb94556da6da2c55e65b5fa7b48fd983c0b448c6ffa202d44c689d49ce6da8
-
SHA512
77f579ea578865d9ab76378dc6207ee8e43647426c534616e7dff39c943d00f00ef306039d924ed45445850a68fd5bf1aa0c85d9c9ca95d0a1eb2bf2dc1955be
-
SSDEEP
196608:1zS1+mVNY/EeryIqxQcZ77QxqJ8UhPo09VSY0P7JkwGIQW5zf:1zSLVaqx77UxS8cPFWY0P7JkwmWN
Malware Config
Signatures
-
Ardamax family
-
Executes dropped EXE 3 IoCs
Processes:
MSI3AA6.tmpSRO_R.exeTEV.exepid process 1708 MSI3AA6.tmp 2256 SRO_R.exe 2076 TEV.exe -
Loads dropped DLL 13 IoCs
Processes:
MsiExec.exeMsiExec.exeMSI3AA6.tmpSRO_R.exeTEV.exe2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exepid process 2884 MsiExec.exe 2884 MsiExec.exe 2884 MsiExec.exe 1368 MsiExec.exe 1368 MsiExec.exe 1368 MsiExec.exe 1708 MSI3AA6.tmp 2256 SRO_R.exe 2076 TEV.exe 2076 TEV.exe 2076 TEV.exe 1244 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
TEV.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TEV Start = "C:\\ProgramData\\CFQPBU\\TEV.exe" TEV.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exemsiexec.exedescription ioc process File opened (read-only) \??\K: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\U: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\S: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\U: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\I: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\O: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\Q: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\L: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\W: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\Z: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\T: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\G: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\H: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\M: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\I: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\J: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\W: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\R: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\V: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\Z: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\E: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\R: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\T: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\X: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\X: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\N: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\Y: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\B: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\H: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\N: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\Y: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\B: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\M: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\Q: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\S: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\K: 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe -
Drops file in Program Files directory 6 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files\Net2e\SilkroadR\32-bit\silkroad.exe msiexec.exe File created C:\Program Files\Net2e\SilkroadR\32-bit\sro_client.exe msiexec.exe File created C:\Program Files\Net2e\SilkroadR\32-bit\SRO_R.exe msiexec.exe File created C:\Program Files\Net2e\SilkroadR\silkroad.exe msiexec.exe File created C:\Program Files\Net2e\SilkroadR\sro_client.exe msiexec.exe File created C:\Program Files\Net2e\SilkroadR\SRO_R.exe msiexec.exe -
Drops file in Windows directory 14 IoCs
Processes:
msiexec.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\Installer\f77340b.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI37C7.tmp msiexec.exe File created C:\Windows\Installer\f77340e.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI3777.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\f77340c.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI3757.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\Installer\MSI3488.tmp msiexec.exe File opened for modification C:\Windows\Installer\f77340c.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI3AA6.tmp msiexec.exe File created C:\Windows\Installer\f77340b.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
SRO_R.execmd.execmd.exe2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exeMsiExec.exeMSI3AA6.tmpcmd.execmd.exe2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exeattrib.exeattrib.exeTEV.exeattrib.execmd.exeMsiExec.exeattrib.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SRO_R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSI3AA6.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TEV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 46 IoCs
Processes:
DrvInst.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe -
Modifies registry class 23 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9EFE6C4521DBFD14DBC334CD7CDFE14A msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\SourceList\PackageName = "ChayNhieuAcc_SroR_Net2e.x64.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\SourceList\Media\1 = "Disk1;Disk1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9EFE6C4521DBFD14DBC334CD7CDFE14A\MainFeature msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\PackageCode = "B87D7B2FD80F7A64A88108FCEED0D789" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\Language = "1066" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\2EA26921870436C4383A1BA7F69AB577 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\SourceList\Media msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\ProductName = "SilkroadR" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\2EA26921870436C4383A1BA7F69AB577\9EFE6C4521DBFD14DBC334CD7CDFE14A msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Roaming\\Net2e\\SilkroadR 1.0.0\\install\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9EFE6C4521DBFD14DBC334CD7CDFE14A\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Roaming\\Net2e\\SilkroadR 1.0.0\\install\\" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
msiexec.exeTEV.exepid process 2380 msiexec.exe 2380 msiexec.exe 2076 TEV.exe 2076 TEV.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
TEV.exepid process 2076 TEV.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exe2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exedescription pid process Token: SeRestorePrivilege 2380 msiexec.exe Token: SeTakeOwnershipPrivilege 2380 msiexec.exe Token: SeSecurityPrivilege 2380 msiexec.exe Token: SeCreateTokenPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeAssignPrimaryTokenPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeLockMemoryPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeIncreaseQuotaPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeMachineAccountPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeTcbPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeSecurityPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeTakeOwnershipPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeLoadDriverPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeSystemProfilePrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeSystemtimePrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeProfSingleProcessPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeIncBasePriorityPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeCreatePagefilePrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeCreatePermanentPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeBackupPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeRestorePrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeShutdownPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeDebugPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeAuditPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeSystemEnvironmentPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeChangeNotifyPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeRemoteShutdownPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeUndockPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeSyncAgentPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeEnableDelegationPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeManageVolumePrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeImpersonatePrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeCreateGlobalPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeCreateTokenPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeAssignPrimaryTokenPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeLockMemoryPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeIncreaseQuotaPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeMachineAccountPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeTcbPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeSecurityPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeTakeOwnershipPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeLoadDriverPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeSystemProfilePrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeSystemtimePrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeProfSingleProcessPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeIncBasePriorityPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeCreatePagefilePrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeCreatePermanentPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeBackupPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeRestorePrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeShutdownPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeDebugPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeAuditPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeSystemEnvironmentPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeChangeNotifyPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeRemoteShutdownPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeUndockPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeSyncAgentPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeEnableDelegationPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeManageVolumePrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeImpersonatePrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeCreateGlobalPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeCreateTokenPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeAssignPrimaryTokenPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe Token: SeLockMemoryPrivilege 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exepid process 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
TEV.exepid process 2076 TEV.exe 2076 TEV.exe 2076 TEV.exe 2076 TEV.exe 2076 TEV.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msiexec.exe2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exeMSI3AA6.tmpSRO_R.execmd.execmd.exedescription pid process target process PID 2380 wrote to memory of 2884 2380 msiexec.exe MsiExec.exe PID 2380 wrote to memory of 2884 2380 msiexec.exe MsiExec.exe PID 2380 wrote to memory of 2884 2380 msiexec.exe MsiExec.exe PID 2380 wrote to memory of 2884 2380 msiexec.exe MsiExec.exe PID 2380 wrote to memory of 2884 2380 msiexec.exe MsiExec.exe PID 2380 wrote to memory of 2884 2380 msiexec.exe MsiExec.exe PID 2380 wrote to memory of 2884 2380 msiexec.exe MsiExec.exe PID 2384 wrote to memory of 1244 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe PID 2384 wrote to memory of 1244 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe PID 2384 wrote to memory of 1244 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe PID 2384 wrote to memory of 1244 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe PID 2384 wrote to memory of 1244 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe PID 2384 wrote to memory of 1244 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe PID 2384 wrote to memory of 1244 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe PID 2380 wrote to memory of 1368 2380 msiexec.exe MsiExec.exe PID 2380 wrote to memory of 1368 2380 msiexec.exe MsiExec.exe PID 2380 wrote to memory of 1368 2380 msiexec.exe MsiExec.exe PID 2380 wrote to memory of 1368 2380 msiexec.exe MsiExec.exe PID 2380 wrote to memory of 1368 2380 msiexec.exe MsiExec.exe PID 2380 wrote to memory of 1368 2380 msiexec.exe MsiExec.exe PID 2380 wrote to memory of 1368 2380 msiexec.exe MsiExec.exe PID 2380 wrote to memory of 1708 2380 msiexec.exe MSI3AA6.tmp PID 2380 wrote to memory of 1708 2380 msiexec.exe MSI3AA6.tmp PID 2380 wrote to memory of 1708 2380 msiexec.exe MSI3AA6.tmp PID 2380 wrote to memory of 1708 2380 msiexec.exe MSI3AA6.tmp PID 2380 wrote to memory of 1708 2380 msiexec.exe MSI3AA6.tmp PID 2380 wrote to memory of 1708 2380 msiexec.exe MSI3AA6.tmp PID 2380 wrote to memory of 1708 2380 msiexec.exe MSI3AA6.tmp PID 1708 wrote to memory of 2256 1708 MSI3AA6.tmp SRO_R.exe PID 1708 wrote to memory of 2256 1708 MSI3AA6.tmp SRO_R.exe PID 1708 wrote to memory of 2256 1708 MSI3AA6.tmp SRO_R.exe PID 1708 wrote to memory of 2256 1708 MSI3AA6.tmp SRO_R.exe PID 2256 wrote to memory of 2076 2256 SRO_R.exe TEV.exe PID 2256 wrote to memory of 2076 2256 SRO_R.exe TEV.exe PID 2256 wrote to memory of 2076 2256 SRO_R.exe TEV.exe PID 2256 wrote to memory of 2076 2256 SRO_R.exe TEV.exe PID 2384 wrote to memory of 2756 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe cmd.exe PID 2384 wrote to memory of 2756 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe cmd.exe PID 2384 wrote to memory of 2756 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe cmd.exe PID 2384 wrote to memory of 2756 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe cmd.exe PID 2384 wrote to memory of 2592 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe cmd.exe PID 2384 wrote to memory of 2592 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe cmd.exe PID 2384 wrote to memory of 2592 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe cmd.exe PID 2384 wrote to memory of 2592 2384 2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe cmd.exe PID 2756 wrote to memory of 904 2756 cmd.exe attrib.exe PID 2756 wrote to memory of 904 2756 cmd.exe attrib.exe PID 2756 wrote to memory of 904 2756 cmd.exe attrib.exe PID 2756 wrote to memory of 904 2756 cmd.exe attrib.exe PID 2592 wrote to memory of 1488 2592 cmd.exe attrib.exe PID 2592 wrote to memory of 1488 2592 cmd.exe attrib.exe PID 2592 wrote to memory of 1488 2592 cmd.exe attrib.exe PID 2592 wrote to memory of 1488 2592 cmd.exe attrib.exe PID 2756 wrote to memory of 2428 2756 cmd.exe attrib.exe PID 2756 wrote to memory of 2428 2756 cmd.exe attrib.exe PID 2756 wrote to memory of 2428 2756 cmd.exe attrib.exe PID 2756 wrote to memory of 2428 2756 cmd.exe attrib.exe PID 2756 wrote to memory of 848 2756 cmd.exe cmd.exe PID 2756 wrote to memory of 848 2756 cmd.exe cmd.exe PID 2756 wrote to memory of 848 2756 cmd.exe cmd.exe PID 2756 wrote to memory of 848 2756 cmd.exe cmd.exe PID 2592 wrote to memory of 1040 2592 cmd.exe attrib.exe PID 2592 wrote to memory of 1040 2592 cmd.exe attrib.exe PID 2592 wrote to memory of 1040 2592 cmd.exe attrib.exe PID 2592 wrote to memory of 1040 2592 cmd.exe attrib.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 4 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exepid process 904 attrib.exe 1488 attrib.exe 2428 attrib.exe 1040 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe" /i "C:\Users\Admin\AppData\Roaming\Net2e\SilkroadR 1.0.0\install\ChayNhieuAcc_SroR_Net2e.x64.msi" CLIENTPROCESSID="2384" ADDLOCAL="MainFeature" SECONDSEQUENCE="1" CHAINERUIPROCESSID="2384Chainer" ACTION="INSTALL" EXECUTEACTION="INSTALL" CLIENTUILEVEL="0" PRIMARYFOLDER="APPDIR" ROOTDRIVE="C:\" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\2024-11-18_185c218239b46dff1b2b4642338f373e_mafia.exe" EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs " TARGETDIR="C:\" APPDIR="C:\Program Files\Net2e\SilkroadR\" SHORTCUTDIR="C:\ProgramData\Microsoft\Windows\Start Menu\Programs\SilkroadR"2⤵
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1244
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EXE45E9.tmp.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\attrib.exeATTRIB -r "\\?\C:\Users\Admin\AppData\Roaming\Net2e\SILKRO~1.0\install\CHAYNH~2.MSI"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:904
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB -r "C:\Users\Admin\AppData\Local\Temp\EXE45E9.tmp.bat"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXE45E9.tmp.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" cls"3⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EXE4609.tmp.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\attrib.exeATTRIB -r "\\?\C:\Users\Admin\AppData\Roaming\Net2e\SILKRO~1.0\install\CHAYNH~2.MSI"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1488
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB -r "C:\Users\Admin\AppData\Local\Temp\EXE4609.tmp.bat"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXE4609.tmp.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" cls"3⤵
- System Location Discovery: System Language Discovery
PID:1964
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 99B22446475386E1DEDD53D9D95C9622 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2884
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B1D091DBAAE98C8D9F31ADCA0571BA862⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1368
-
-
C:\Windows\Installer\MSI3AA6.tmp"C:\Windows\Installer\MSI3AA6.tmp" "C:\Program Files\Net2e\SilkroadR\SRO_R.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files\Net2e\SilkroadR\SRO_R.exe"C:\Program Files\Net2e\SilkroadR\SRO_R.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\ProgramData\CFQPBU\TEV.exe"C:\ProgramData\CFQPBU\TEV.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2076
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2424
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000560" "00000000000005D8"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2168
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5945534b7541c30173f6d0057e977c2ce
SHA1546e9153206b004a51b6963171e36d2a2210f982
SHA256ddcbbd171cd31c6106fdc953e0108af63e3003d6cc7ce3ddd3898d13fe66d930
SHA512ede6fc56f8fe4afdd0932cda5985b70ab58479200e57e4fd4730ad6db17db554d789bb914f9591002b87f96fbeffeb568c01e252d2385d17a4fb391b3f67bd80
-
Filesize
2.3MB
MD538bbc879ab82720283d9a27b3ca72490
SHA128ed426f5462b1eaf3dec3c50000dc47d03b5549
SHA256546360798477f6e8ec31bf1e230a69bb78f882e71908c504b80604b00e0475cc
SHA5121a8aa20936fafd8abac638e19fc7297df710301b2e0b7c66ebbd3b47b5606bfd83718b97c29edcc29efa3bde235d3eb59904ebafa8160c48cf3a086f4442e27b
-
Filesize
796KB
MD57848d12390433960af0803630be759d6
SHA1f35285e2dc52893195544af8598f4f00138a5d46
SHA2563cddac8869e71e4ac294ac757428a2bf577d41a344388bae454572c66554f5a1
SHA512e613a36c4a8baf110b54c079d4db333f86cd8ba5e3a08d894b81cc09e3a02bfd63ca84b7a7ab4dd518f880d0e98602e0e7056b040d8dab713036c2cba1727525
-
Filesize
2KB
MD5869c7988a9fae9365caeeabcda0e7f1a
SHA113bd3b73b6368ce425a8fb5673aaabe7d23325c1
SHA2565d30f82285ce74ce9a3c2550df03e0c003fc5c9225ce256cdb0d023d39985a2c
SHA5128fe063b771c85aeb25bfb4bb42bac4116d9857d2a987f5640042a3ac1ed167668d911eebe70a07c5fad2f7978d756d90d9fbb996d68b0438ee10664e025b6737
-
Filesize
919B
MD57fce666abefcf0959bcd40f1840d72ba
SHA1abba7db7b9f67024de2c254531d3984fdd80ed3c
SHA25661fd27ae55a312c17f42d94a61f188e5786765c9dd07bb47183a1b9ef6072214
SHA5120f5b8b41e91bda2aaf43e7968432cd6156cd89b48a19ab74954e7cb904669acdcfd908d6f29bf1a2480f96a129b43a1f18765d5dd4ac09113f59f65cf60b0cd0
-
Filesize
208KB
MD5c11651b1901e704b6b4b49f1df62401f
SHA1e5ce36a9b955ff5fc72e3f11cd7c62e7416ed0ea
SHA256e9657b10049a589e014cb97952eed96baa7daffdbbcef4089da821226b420ae4
SHA512a50ac93d1a1018d43c54580d267f57bd23aec17903fdc537a00ba20bd27b609aae81192c2b297c704edeaa7b308f41ba76bd70f851e43d327ebc05d5bcaf60c8
-
Filesize
1KB
MD5750b3ce655a3dbc7961306d52c7b22b5
SHA12d5ed71c01abb38628eb81e1ac216f324a5c6f9d
SHA256e7ff02b62f83626e7115f8a98f017fa4ec2927541c87a8555f51398d39583fbd
SHA512d765f9008bd58e7d87392a44804945cecf04515ed5e0b134192c1e7a6e55d3509c181aa65de98d2c2afaba55e808e6cd4b625042c0a96f62ff0a64dbf88eb6eb
-
Filesize
2KB
MD5b3d6cf5322b0a6e038fbf402b7a54f14
SHA17c65f0ec826cd5ec68c72a4fa79d37b0a44a2d95
SHA2565ae1d4ab295fd065b861f319ecc62d2e5740423e2b7ffc662fdf45af9131ce40
SHA512e6f1724c547555e58adbc22584ea834996f912cd504bacda41fd77cdb3793b57c4a93cba9610dde516a52f61448b7c78392823e159a24187f41364807ac1067b
-
Filesize
2KB
MD56a6ddf6728d0ba09c6e2983a97b1031c
SHA101352ded02319992c25d89dadc22e4631981b54e
SHA25626ac8e8fd30e4bc4f66aaee0ce0bde0db2293012ae39f96652e9b12e1542d8be
SHA51291a50aa21cec298b555c86b8ee5fb559f0f8e4b5160038f07d9be10be2f5920249b9eb0e1b957cd2d7dcef126115d5cbbadc74092a1c74c876db8f25e0b6bd98
-
Filesize
1KB
MD5c420154355e85d1b2ca8cc6de2f78fde
SHA1014707b5bc98d52e92c68b77d299e22075d2a561
SHA25647b996f1d726dffcc482bcee2117ecaafed5df5e05cf8673bddfc769db08c3c0
SHA5121506cd5ad09fc2cb99e2860cb94c70ec88f1ae97df8f75f5391827c9481c4e265dd0f1dc83cbd844678fd2f68c92dfe588338ea845e50e16effde24efd322143
-
Filesize
406B
MD5222a2c01d5eb54249367aa4f8c114d0d
SHA1e4884899695d32d2ad055b6fd577f29542cf8ae6
SHA256a31b941087f354fe8f547d4eeaa2a8cf6fb2dd5acabefb1a055f9dde02c8b09e
SHA5129ac0c73d7aef1921708b134f6301b5689f7832a489fe706522bc2d92ab8e8da65cef9297c9611f8cba23b6f85ca04826b6ab9949e670dcbead57093bfe73652b
-
Filesize
406B
MD5b68d675d4159376da2949b24b648e8d0
SHA1a5f63b663ff4e7423a436c19057c2309c24ee962
SHA256d5d61f58a916f3c8f62172e1d0c4e9e1e66c6192ef5197a71d09f27b9fe3e184
SHA512bfefc10061d78f9b96eb443b10dccf3e589b71ef295316d5dae95e968198cf8ab1d86dc22981462d031e3beb6aa02b9a0be20312ee6dc4fc08f12f4ee305a73d
-
Filesize
91KB
MD5f16f35078bfb36d801f8c500ba5c1a40
SHA13b97e9a8daf7e2d6a9e656edede87314ee142a89
SHA256583bf08b032b830d33cb34fd0a1d51361311592528d27881266e87a074b416ff
SHA51284e3207d6399a314f533ea597e23759c618a16fc57493e8fdf2ee86a1daf776d4315612fd6ba23046d46e46a92b1b0b29a2d40bdd27baa9dc51feadb4af89230
-
Filesize
968KB
MD5162a3c0bf3073c5a9d719d40abc2c1fc
SHA1f618cfe1969992031456ad4932e5a3fb5af0f13e
SHA25667353957c148bc1724cba07175216a738b924c4fa4adb5d52eaa3d99a19a321a
SHA512c7a2ad6419d170f902a82d241fb1d35321ebe08c1fd63aa09f44b432faafaa003c3daa80cff96de122c446844d6de368c5885827587cb8b7951d3d3e3fa7acf1
-
Filesize
6.9MB
MD53e9bb7bf788f08d0194182820d423cab
SHA1acc00292ce2f4c4e5091c4d3343672c8a0d02711
SHA2568c0743ce218cf973d2ce755eb29213a54ea8c46771cd8ee39470cb7c573cc11a
SHA51296639b731a61a403023aa4bf2383a04ebcfbb24ddc0977894a9372bee1669dfb7b722869df99ff9514b303b27bba7467e520ded6bc3caa86cddb5503d2fb4c74
-
Filesize
300KB
MD53953318d1e6d124b10805cc5919fe47e
SHA176dfb3240d7fd6b860d23a6d210d85adb17b7803
SHA2560670c12c9d190d80f0e4b907041dd94ac25c93b71b121b75372e3560e7818e1b
SHA5128937bc63d5cb685216e4fef6eef45cbdea96787d762467bfc7f8ce87b28985f4834cf67ba13e3f2194e472af1ce3ab39eb239ae2140ecab4eaf411cc95c207aa
-
Filesize
14KB
MD5aa154d2b96be7ab9f8f2588c07ba7669
SHA1972e5f88b4408b13c88f4126106db6a495806b7f
SHA2560ca2db61f95832d643559b51acf71a01b3caa22a975988a1669898716f657c46
SHA5124cfe97af406075a09cea81c84340fdc141ae95ae26cc6e1a465b7cf00fafccde48e55ac01cfee18dba5e7d368dc7cb3efd1dcc819f87b770691e4205882f7e3e
-
Filesize
79KB
MD5582bfe4bf9de1077982664ad8ce0754a
SHA1465eb7f460f9eb9a34572df6f17cf2cb2d8c3688
SHA256ce4597c260250342bec2baec880a040a62b70137c3aea062ea78e80159101184
SHA51240ca7584c33eb8a4df9b7566ee4b2cc55061e627160a99535e43b3189ff1093d3b8d55cf56156f20bec8562de9fb80f3ddfd07b878002111d22b991c05b46207
-
Filesize
2.6MB
MD5bbf69aeaed386c67d946b1cb197abcac
SHA1c291c37b677c0784ead38e57ee22d704b2196730
SHA2568bd424a581e6307dce2231a459d686486937d491677827b2f3eee8110741ba2a
SHA5124e7df27a352a207f7d9c2a20835e6b3d036ce30f69b3cce74687e165f1138f15de62a6aa8ee81c777d168e5ee7202077e7e9e1c5a67e39d07b5064c7e96c3a85