Analysis
-
max time kernel
127s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe
Resource
win10v2004-20241007-en
General
-
Target
1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe
-
Size
1.8MB
-
MD5
659a28dd5c85f4482c3818467461f372
-
SHA1
a9f54c9aa53da8f3e8b47ab4ed4650b9e0df0f3f
-
SHA256
1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe
-
SHA512
123c05cbc778406da4fab525c84fc8650c714826d8984a5de4753ccc17dcf59e43f4a2b48d16aa56d54466616f42d485e9b4307ce7a24fa56b1691064ec3c5cf
-
SSDEEP
49152:TQsjXkTmwxhOCTzyr9uInP/OkMk8X+dINgZcb:dnONHSUIe1Rxb
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
default_valenciga
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "0" explorer.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
Processes:
1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exeaxplong.exec69cca7054.exee8ae99a9fa.exe20786068d6.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c69cca7054.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e8ae99a9fa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 20786068d6.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Yddftopda\ImagePath = "C:\\Users\\Admin\\AppData\\Roaming\\Fbhost_alpha\\Newfts.exe" explorer.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
20786068d6.exe1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exee8ae99a9fa.exec69cca7054.exeaxplong.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 20786068d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e8ae99a9fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 20786068d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c69cca7054.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c69cca7054.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e8ae99a9fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Executes dropped EXE 19 IoCs
Processes:
axplong.exestealc_default2.exe5hvzv2sl.exeha7dur10.exeha7dur10.exec69cca7054.exeAllNew.exeGxtuum.exeJavvvum.exestail.exestail.tmpNewfts.exeBeautyGuide.exekxfh9qhs.exequzfesaq.exee8ae99a9fa.exeNewfts.exe20786068d6.exetcpvcon.exepid Process 2760 axplong.exe 1860 stealc_default2.exe 2928 5hvzv2sl.exe 2068 ha7dur10.exe 328 ha7dur10.exe 1940 c69cca7054.exe 1348 AllNew.exe 1608 Gxtuum.exe 2600 Javvvum.exe 560 stail.exe 1712 stail.tmp 2176 Newfts.exe 2756 BeautyGuide.exe 2064 kxfh9qhs.exe 2180 quzfesaq.exe 2852 e8ae99a9fa.exe 2616 Newfts.exe 1104 20786068d6.exe 1060 tcpvcon.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exeaxplong.exec69cca7054.exee8ae99a9fa.exe20786068d6.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine c69cca7054.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine e8ae99a9fa.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 20786068d6.exe -
Loads dropped DLL 43 IoCs
Processes:
1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exeaxplong.exestealc_default2.exeha7dur10.exeha7dur10.exeAllNew.exeGxtuum.exestail.exestail.tmpNewfts.exeBeautyGuide.exeNewfts.exeexplorer.exepid Process 1620 1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe 1620 1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe 2760 axplong.exe 2760 axplong.exe 2760 axplong.exe 2760 axplong.exe 1860 stealc_default2.exe 1860 stealc_default2.exe 2760 axplong.exe 2068 ha7dur10.exe 328 ha7dur10.exe 2760 axplong.exe 2760 axplong.exe 2760 axplong.exe 1348 AllNew.exe 1608 Gxtuum.exe 1608 Gxtuum.exe 1608 Gxtuum.exe 560 stail.exe 1712 stail.tmp 1712 stail.tmp 1712 stail.tmp 328 ha7dur10.exe 2176 Newfts.exe 2176 Newfts.exe 1712 stail.tmp 2756 BeautyGuide.exe 2760 axplong.exe 2760 axplong.exe 2760 axplong.exe 2760 axplong.exe 2176 Newfts.exe 2616 Newfts.exe 2616 Newfts.exe 2760 axplong.exe 2760 axplong.exe 2616 Newfts.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
explorer.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts explorer.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
Processes:
explorer.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
axplong.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\e8ae99a9fa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003496001\\e8ae99a9fa.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\20786068d6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003497001\\20786068d6.exe" axplong.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exeaxplong.exec69cca7054.exee8ae99a9fa.exe20786068d6.exepid Process 1620 1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe 2760 axplong.exe 1940 c69cca7054.exe 2852 e8ae99a9fa.exe 1104 20786068d6.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Newfts.exedescription pid Process procid_target PID 2616 set thread context of 1060 2616 Newfts.exe 54 -
Drops file in Program Files directory 1 IoCs
Processes:
explorer.exedescription ioc Process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe explorer.exe -
Drops file in Windows directory 3 IoCs
Processes:
1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exeAllNew.exetcpvcon.exedescription ioc Process File created C:\Windows\Tasks\axplong.job 1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe File created C:\Windows\Tasks\Gxtuum.job AllNew.exe File created C:\Windows\Tasks\uninstallBeacon.job tcpvcon.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
Processes:
resource yara_rule behavioral1/files/0x000600000001a020-203.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AllNew.exeNewfts.exe1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exeha7dur10.exeha7dur10.exec69cca7054.exeGxtuum.exekxfh9qhs.exee8ae99a9fa.exe20786068d6.exeaxplong.exestail.exestail.tmpnet.exenet1.exequzfesaq.exetcpvcon.exestealc_default2.exeNewfts.exeBeautyGuide.exeexplorer.exepowershell.exeJavvvum.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AllNew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Newfts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ha7dur10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ha7dur10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c69cca7054.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kxfh9qhs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8ae99a9fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20786068d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stail.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quzfesaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcpvcon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Newfts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BeautyGuide.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Javvvum.exe -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
explorer.exestealc_default2.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz explorer.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data explorer.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe -
Processes:
c69cca7054.exe20786068d6.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 c69cca7054.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 c69cca7054.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 c69cca7054.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 20786068d6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 20786068d6.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exeaxplong.exestealc_default2.exec69cca7054.exestail.tmpkxfh9qhs.exee8ae99a9fa.exeNewfts.exe20786068d6.exeNewfts.exetcpvcon.exeexplorer.exepowershell.exepid Process 1620 1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe 2760 axplong.exe 1860 stealc_default2.exe 1860 stealc_default2.exe 1940 c69cca7054.exe 1712 stail.tmp 1712 stail.tmp 2064 kxfh9qhs.exe 2064 kxfh9qhs.exe 2852 e8ae99a9fa.exe 2176 Newfts.exe 1104 20786068d6.exe 2616 Newfts.exe 2616 Newfts.exe 1060 tcpvcon.exe 1060 tcpvcon.exe 1060 tcpvcon.exe 1060 tcpvcon.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 1616 powershell.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Newfts.exetcpvcon.exepid Process 2616 Newfts.exe 1060 tcpvcon.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tcpvcon.exepowershell.exeexplorer.exedescription pid Process Token: SeDebugPrivilege 1060 tcpvcon.exe Token: SeDebugPrivilege 1616 powershell.exe Token: SeDebugPrivilege 624 explorer.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exeAllNew.exestail.tmppid Process 1620 1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe 1348 AllNew.exe 1712 stail.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exeaxplong.exeha7dur10.exeAllNew.exeGxtuum.exestail.exeha7dur10.exestail.tmpdescription pid Process procid_target PID 1620 wrote to memory of 2760 1620 1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe 30 PID 1620 wrote to memory of 2760 1620 1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe 30 PID 1620 wrote to memory of 2760 1620 1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe 30 PID 1620 wrote to memory of 2760 1620 1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe 30 PID 2760 wrote to memory of 1860 2760 axplong.exe 31 PID 2760 wrote to memory of 1860 2760 axplong.exe 31 PID 2760 wrote to memory of 1860 2760 axplong.exe 31 PID 2760 wrote to memory of 1860 2760 axplong.exe 31 PID 2760 wrote to memory of 2928 2760 axplong.exe 33 PID 2760 wrote to memory of 2928 2760 axplong.exe 33 PID 2760 wrote to memory of 2928 2760 axplong.exe 33 PID 2760 wrote to memory of 2928 2760 axplong.exe 33 PID 2760 wrote to memory of 2068 2760 axplong.exe 35 PID 2760 wrote to memory of 2068 2760 axplong.exe 35 PID 2760 wrote to memory of 2068 2760 axplong.exe 35 PID 2760 wrote to memory of 2068 2760 axplong.exe 35 PID 2760 wrote to memory of 2068 2760 axplong.exe 35 PID 2760 wrote to memory of 2068 2760 axplong.exe 35 PID 2760 wrote to memory of 2068 2760 axplong.exe 35 PID 2068 wrote to memory of 328 2068 ha7dur10.exe 36 PID 2068 wrote to memory of 328 2068 ha7dur10.exe 36 PID 2068 wrote to memory of 328 2068 ha7dur10.exe 36 PID 2068 wrote to memory of 328 2068 ha7dur10.exe 36 PID 2068 wrote to memory of 328 2068 ha7dur10.exe 36 PID 2068 wrote to memory of 328 2068 ha7dur10.exe 36 PID 2068 wrote to memory of 328 2068 ha7dur10.exe 36 PID 2760 wrote to memory of 1940 2760 axplong.exe 37 PID 2760 wrote to memory of 1940 2760 axplong.exe 37 PID 2760 wrote to memory of 1940 2760 axplong.exe 37 PID 2760 wrote to memory of 1940 2760 axplong.exe 37 PID 2760 wrote to memory of 1348 2760 axplong.exe 38 PID 2760 wrote to memory of 1348 2760 axplong.exe 38 PID 2760 wrote to memory of 1348 2760 axplong.exe 38 PID 2760 wrote to memory of 1348 2760 axplong.exe 38 PID 1348 wrote to memory of 1608 1348 AllNew.exe 39 PID 1348 wrote to memory of 1608 1348 AllNew.exe 39 PID 1348 wrote to memory of 1608 1348 AllNew.exe 39 PID 1348 wrote to memory of 1608 1348 AllNew.exe 39 PID 1608 wrote to memory of 2600 1608 Gxtuum.exe 41 PID 1608 wrote to memory of 2600 1608 Gxtuum.exe 41 PID 1608 wrote to memory of 2600 1608 Gxtuum.exe 41 PID 1608 wrote to memory of 2600 1608 Gxtuum.exe 41 PID 1608 wrote to memory of 560 1608 Gxtuum.exe 42 PID 1608 wrote to memory of 560 1608 Gxtuum.exe 42 PID 1608 wrote to memory of 560 1608 Gxtuum.exe 42 PID 1608 wrote to memory of 560 1608 Gxtuum.exe 42 PID 1608 wrote to memory of 560 1608 Gxtuum.exe 42 PID 1608 wrote to memory of 560 1608 Gxtuum.exe 42 PID 1608 wrote to memory of 560 1608 Gxtuum.exe 42 PID 560 wrote to memory of 1712 560 stail.exe 43 PID 560 wrote to memory of 1712 560 stail.exe 43 PID 560 wrote to memory of 1712 560 stail.exe 43 PID 560 wrote to memory of 1712 560 stail.exe 43 PID 560 wrote to memory of 1712 560 stail.exe 43 PID 560 wrote to memory of 1712 560 stail.exe 43 PID 560 wrote to memory of 1712 560 stail.exe 43 PID 328 wrote to memory of 2176 328 ha7dur10.exe 44 PID 328 wrote to memory of 2176 328 ha7dur10.exe 44 PID 328 wrote to memory of 2176 328 ha7dur10.exe 44 PID 328 wrote to memory of 2176 328 ha7dur10.exe 44 PID 1712 wrote to memory of 2816 1712 stail.tmp 45 PID 1712 wrote to memory of 2816 1712 stail.tmp 45 PID 1712 wrote to memory of 2816 1712 stail.tmp 45 PID 1712 wrote to memory of 2816 1712 stail.tmp 45 -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe"C:\Users\Admin\AppData\Local\Temp\1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\1001527001\5hvzv2sl.exe"C:\Users\Admin\AppData\Local\Temp\1001527001\5hvzv2sl.exe"3⤵
- Executes dropped EXE
PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe"C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\Temp\{7C29F24B-2740-4B32-865D-9924D7DDFFF9}\.cr\ha7dur10.exe"C:\Windows\Temp\{7C29F24B-2740-4B32-865D-9924D7DDFFF9}\.cr\ha7dur10.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1884⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\Temp\{AB0BBC28-8F58-4496-9ADC-E0D78D2B25C0}\.ba\Newfts.exe"C:\Windows\Temp\{AB0BBC28-8F58-4496-9ADC-E0D78D2B25C0}\.ba\Newfts.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2176 -
C:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exeC:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2616 -
C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe"C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe" "C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe" /accepteula7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1060 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe8⤵
- Modifies visibility of file extensions in Explorer
- Sets service image path in registry
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:624 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exe9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1002824001\c69cca7054.exe"C:\Users\Admin\AppData\Local\Temp\1002824001\c69cca7054.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\10000270101\Javvvum.exe"C:\Users\Admin\AppData\Local\Temp\10000270101\Javvvum.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\10000281101\stail.exe"C:\Users\Admin\AppData\Local\Temp\10000281101\stail.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\is-QSQDB.tmp\stail.tmp"C:\Users\Admin\AppData\Local\Temp\is-QSQDB.tmp\stail.tmp" /SL5="$B015A,3823954,54272,C:\Users\Admin\AppData\Local\Temp\10000281101\stail.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause beauty_guide_111837⤵
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause beauty_guide_111838⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
-
C:\Users\Admin\AppData\Local\Beauty Guide 2.2.9\BeautyGuide.exe"C:\Users\Admin\AppData\Local\Beauty Guide 2.2.9\BeautyGuide.exe" -i7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2756
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003374001\kxfh9qhs.exe"C:\Users\Admin\AppData\Local\Temp\1003374001\kxfh9qhs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Users\Admin\AppData\Local\Temp\1003429001\quzfesaq.exe"C:\Users\Admin\AppData\Local\Temp\1003429001\quzfesaq.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2180
-
-
C:\Users\Admin\AppData\Local\Temp\1003496001\e8ae99a9fa.exe"C:\Users\Admin\AppData\Local\Temp\1003496001\e8ae99a9fa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\1003497001\20786068d6.exe"C:\Users\Admin\AppData\Local\Temp\1003497001\20786068d6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1104
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.3MB
MD5aed024049f525c8ae6671ebdd7001c30
SHA1fadd86e0ce140dc18f33193564d0355b02ee9b05
SHA2569c45c5456167f65156faa1313ad8bbaffb8aa375669bf756fe0273580a621494
SHA512ec0846be717d200639c529a4ac14f47f6b466fa2c8231049bc474183b285c7d8ce3200ff9f9c813171de8b7eb15c63f229b4748c751a167d7eff3489249738d2
-
Filesize
3.9MB
MD55e6a31c380ec68a2488f554efb111eac
SHA17e0c1e694d4621d9d183732c4d6132386e7090ad
SHA25675348cefa63eabc6e8395cfe4dc9bcb25b04a15b706e94d32dc391cb6be1d4b6
SHA512bf8950af595e89d9374adcb3b114357bae13d228ce22ff5b093d897b41fdf9477e3c2b3f0eb8bfe958c328c58ab606c7520ba93c66ce85e569bfe2d83706b891
-
Filesize
307KB
MD568a99cf42959dc6406af26e91d39f523
SHA1f11db933a83400136dc992820f485e0b73f1b933
SHA256c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3
SHA5127342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75
-
Filesize
730KB
MD5cc3381bd320d2a249405b46982abe611
SHA132a5bc854726c829da2fbaed02ff8d41ea55e432
SHA256781e958b54a63ef673857bfe9c0a5992eb44b06f15d5499f8e35e44b1e1c868c
SHA51273c95936748b9edf103c28d558d885bfee070efc18d318581fb1723769a15bb642976bdfb93b36a0b68d869538e0ee3c1936d613240bf29d3ff64dbb3d20e2e4
-
Filesize
8.4MB
MD52f8fd18eb8f7832baa360c7ea352fb4f
SHA1e6e35646162c50941cb04767c3efb6e877800660
SHA2566c68d28c2fd55a424a21ba96b76d383f652bbed8cb68d7fbfaafcd139a689e44
SHA5121323985d00c239059d490357ee58d6ac70a804da77a706d793774ef1c8feeec52bc1b33ae01b9b51bb8ba787ebbed11b94e7f30c482ad9a7ee89a91bd6189434
-
Filesize
2.8MB
MD56a3268db51b26c41418351e516bc33a6
SHA157a12903fff8cd7ea5aa3a2d2308c910ac455428
SHA256eaebfc5e60378bbc47a603ca1310440c290a396cb2446de36ff6e7afb624ee0c
SHA51243f257dbb7e444355e29a8023e8c8838c9e0ca7538a86c25ac41db1e0308bf73c3adda1b0fe5d0bcf536387b9ce5f8fed216f5f7d92c80bcc12e7bffde979b33
-
Filesize
429KB
MD5c07e06e76de584bcddd59073a4161dbb
SHA108954ac6f6cf51fd5d9d034060a9ae25a8448971
SHA256cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9
SHA512e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f
-
Filesize
3.9MB
MD5b3834900eea7e3c2bae3ab65bb78664a
SHA1cf5665241bc0ea70d7856ea75b812619cb31fb94
SHA256cc35b0641c3c85446892311031369a42990c019c7b143b875be5c683e83ff3ce
SHA512ae36ab053e692434b9307a21dcebe6499b60a3d0bca8549d7264b4756565cb44e190aa9396aea087609adaeb1443f098da1787fd8ffe2458c4fa1c5faea15909
-
Filesize
4.5MB
MD5f32cd2e08a31508b3d354b2c5a064cc4
SHA1b89527b38529cbc310ece5b0298ba499ae5800b2
SHA256c351efd9a6f2c28d5fb053ce8c10e015c2d311a76e323033508089c4445a2f62
SHA512ff5ece4b4d4b26b4d2e18d64913b9b62c05d8360dc6bab3213a003bf604acfb6077a7e7584d6269cfc3e68c8a00c5c99fb96654e4fe878559c7d056e0f60ff52
-
Filesize
1.7MB
MD5ad398edce35bd091cf4d289d7ba7d86d
SHA157cdef68ec90161085099d4934ce5ef8ab36b172
SHA2560e4fb6445367192fdf5c0b1231bed52120349a9c25faefe28b0e419815fc3dcb
SHA51251c244c00984f899151c147e7a90e1ac072b3438be1236cbbeb2175c5cfc61bfc064694268f98bba65e1966d11a4043f62e73dc0cf95979a1f79a95e54f597b7
-
Filesize
1.8MB
MD5b7c3abf55d5e1333f94076a0a9002430
SHA1e8e00a2d672af40521d8a14e105851f81bf4d455
SHA25634b65f9663df77ab98087f697cb780b492c549f3d316e701d966a8dd9f88ae7e
SHA5120a70d8fc0f37d00277c68cdd913a18455ef370055b8e7d170acb4e13fd4d54563b4c959e5492666666b652c97a92fcc5848bd1b58652d60942a30dc44cc192b2
-
Filesize
1.8MB
MD5659a28dd5c85f4482c3818467461f372
SHA1a9f54c9aa53da8f3e8b47ab4ed4650b9e0df0f3f
SHA2561e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe
SHA512123c05cbc778406da4fab525c84fc8650c714826d8984a5de4753ccc17dcf59e43f4a2b48d16aa56d54466616f42d485e9b4307ce7a24fa56b1691064ec3c5cf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
46KB
MD5b13fcb3223116f6eec60be9143cae98b
SHA19a9eb6da6d8e008a51e6ce6212c49bfbe7cb3c88
SHA256961fc9bf866c5b58401d3c91735f9a7b7b4fc93c94038c504c965491f622b52b
SHA51289d72b893acd2ec537b3c3deffcc71d1ce02211f9f5b931c561625ee7162052b511e46d4b4596c0a715e1c992310f2536ebdd512db400eeab23c8960ec4d312d
-
Filesize
1.1MB
MD559c15c71fd599ff745a862d0b8932919
SHA18384f88b4cac4694cf510ca0d3f867fd83cc9e18
SHA256c4ed07ad748661ce776ac6ebb4f8bef7619586bfb4443ce58c92d4b889f3d5c2
SHA512be3425d55dcaa361bc8481b87b2086454baca79a3c948de9acf9ef7d3084d6d987c328d665b45dfcd0510e2c97c980aa63d7cd669fe9fc1a67983c325593481e
-
Filesize
7KB
MD506d205c486bfa3488ad9f480573b3c2f
SHA1ea871113310da1bdc01ad1af4ca7e9975ebb3c06
SHA25629b9952c056ab61ddfe859714cf5376d3e852753022bb40fd35dc473e82e35af
SHA512cc2254033ef88ec745d27563e1205fdd87504cef096d9402961f35b8428f59f7a0aabfe4ba07154fb9be6fdcc54a2912cf86c5747adaf4f2a3f1ab8eb6713f2c
-
Filesize
5.5MB
MD51d37dc833ae7612fb6b90de413ba8792
SHA1d606b4f0bcd4c00597d78f789d3a9fc984d2aeb0
SHA2569b25e0214a5b4335545d5fcc970edcfdea11c24c4ef951bace98ddfe09680ccc
SHA51206ad8524df73f4710f642541823819dad7c519f556e1337ed244785bd46d69e7aa38d8f472d24be519ae5050c18590cd761c8079d50630deb643666fefb911fa
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
4.9MB
MD56832495bc85da7156dd75dfb0d8b2316
SHA114c131a0c34a71aca94fce98f9041f92b19ef7ae
SHA25659707d266524959a02054ee86779966b359edb512a6ac7546f363c509622a2fa
SHA512f8a13bcfe720206913a9dd84b8f358d20e8fa16d0bd7c576ed05e1ba39debaf92d7ffcf46eaa14c8258926c9d500010bdfa9674c24713b8b26992a6164c826c5
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
687KB
MD5aedafe03ae0116d97ccea6ea6e55cc66
SHA13d5ef615b6a75c776670a1d576ec52c332c40437
SHA256b00f1c80c4a90c3060f8c24f36ec3137ca2946026b4e0edbc87f98c6019001cd
SHA51211da0521b16315e47ee58a7e8d2d2cd05535ed3ca53e9fea0a267af03ab875cee749a9f074aa6381bb2d038b2794f34652e6fdfb8a6d1b255f1b484e3134eee7
-
Filesize
8.1MB
MD58543de5d216f8112e80867337dec74db
SHA11cb2462e70718245cd4cb023576c74e2d4a9b213
SHA2563cc98ab01aa1fb3ab9f6147ae0d0d7f82ad965f09520511ce1456eeb9aac7d58
SHA512af285d51cf45e1b3a8caa89e0ce73d14c2ea76eb5cf72f09aa7fab97c486e349b5ebd0936f756e4ca8817f97182819aa1ede186a73c45c96f5d9ed138fdf8e12
-
Filesize
312KB
MD51a4efbc6b661d10a1a4fdbe1a7fa54f0
SHA179f665dcb75db8d711728bab172e444cae2d8133
SHA256b3baa312189da8828d8e3c2b8c20ad3df76da96908d961aa03fed98a61b9bc86
SHA5127cbb77e084f0b8c1af1c7f0451fc0bddfb6b97bb0f9a563a982be8df8effb6816c0aa992448c354d3dc1b13520d440b67bb9e33bd03739e06dee7bf80d32ee39
-
Filesize
2.1MB
MD5db7e67835fce6cf9889f0f68ca9c29a9
SHA15565afda37006a66f0e4546105be60bbe7970616
SHA256dbd3057a58fd3407c95418bc5d9c253adc8c658ee338f22d58374ed3ea37b738
SHA512bc2714bb408715e5e1cec1337b831e26dbda208183955a07ec8653a38c9c0f25f60f333a154b738927ce085e7bbff438963b941a6c2773b3e7325cd900e7651b
-
Filesize
1.4MB
MD50014da7457565c1e458919f5d4cb82c1
SHA176aebb8db4eddd04ffb2e0cb841701e1edde925a
SHA256ab7e259f88801dc746e8877fbf4d6eb4216af7245139ca968eca19065227e2c1
SHA51274dbcf6995575360ff0ff077667bcedf856333114b0e902ec7de7e25e068a6c412e486c0100f97a3df604487697e3b5c9e5243b377d3caa8bb09d59206bdc079