Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 11:39
Behavioral task
behavioral1
Sample
2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe
Resource
win7-20240729-en
General
-
Target
2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe
-
Size
29.5MB
-
MD5
e6af77e3ec383cd78ec9b7f0f94e12cb
-
SHA1
7acfb040b938caaf34015751a607f1467daaec25
-
SHA256
84bff06a71810c0f742acfdbcab3a89966912aaee1260159db9f9dbd6661f850
-
SHA512
d5cd86a645d62b8ea8fe9c764cb1f2cda0c4a49b1a6aeb6c85de10fb09a63472d7908b312e743487e7844fc6049263119a7f0a07c96048276581e4864bd67f6f
-
SSDEEP
786432:HrI2fVu1bJctT0UFi7H+tAW7TtKW8L2UKAlAI:HrIeO0T0UcqtrTIWYBGI
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
resource yara_rule behavioral2/memory/2652-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2652-23-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2652-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/712-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/712-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/364-35-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/364-39-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/364-42-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral2/files/0x000b000000023b2e-5.dat family_gh0strat behavioral2/memory/2652-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2652-23-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2652-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/712-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/712-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/364-35-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/364-39-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/364-42-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Xred family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\240620750.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 11 IoCs
pid Process 4244 R.exe 2652 N.exe 712 TXPlatfor.exe 364 TXPlatfor.exe 4492 HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3284 Remote Data.exe 1752 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 4812 Synaptics.exe 4304 ._cache_Synaptics.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 4524 ._cache_Synaptics.exe -
Loads dropped DLL 64 IoCs
pid Process 4244 R.exe 3152 svchost.exe 3284 Remote Data.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe 4524 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\240620750.txt R.exe File opened for modification C:\Windows\SysWOW64\ini.ini R.exe File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe -
resource yara_rule behavioral2/memory/2652-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2652-23-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2652-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2652-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/712-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/712-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/712-26-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/364-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/364-39-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/364-42-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe -
Detects Pyinstaller 2 IoCs
resource yara_rule behavioral2/files/0x000b000000023b2f-44.dat pyinstaller behavioral2/files/0x000f0000000239f0-62.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Remote Data.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatfor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4804 cmd.exe 4572 PING.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4572 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1812 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3220 2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3220 2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 364 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2652 N.exe Token: SeLoadDriverPrivilege 364 TXPlatfor.exe Token: 33 364 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 364 TXPlatfor.exe Token: 33 364 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 364 TXPlatfor.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3220 2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 3220 2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 1812 EXCEL.EXE 1812 EXCEL.EXE 1812 EXCEL.EXE 1812 EXCEL.EXE 1812 EXCEL.EXE 1812 EXCEL.EXE 1812 EXCEL.EXE 1812 EXCEL.EXE -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3220 wrote to memory of 4244 3220 2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 85 PID 3220 wrote to memory of 4244 3220 2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 85 PID 3220 wrote to memory of 4244 3220 2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 85 PID 3220 wrote to memory of 2652 3220 2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 88 PID 3220 wrote to memory of 2652 3220 2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 88 PID 3220 wrote to memory of 2652 3220 2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 88 PID 712 wrote to memory of 364 712 TXPlatfor.exe 90 PID 712 wrote to memory of 364 712 TXPlatfor.exe 90 PID 712 wrote to memory of 364 712 TXPlatfor.exe 90 PID 2652 wrote to memory of 4804 2652 N.exe 91 PID 2652 wrote to memory of 4804 2652 N.exe 91 PID 2652 wrote to memory of 4804 2652 N.exe 91 PID 3220 wrote to memory of 4492 3220 2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 93 PID 3220 wrote to memory of 4492 3220 2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 93 PID 3220 wrote to memory of 4492 3220 2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 93 PID 4804 wrote to memory of 4572 4804 cmd.exe 94 PID 4804 wrote to memory of 4572 4804 cmd.exe 94 PID 4804 wrote to memory of 4572 4804 cmd.exe 94 PID 3152 wrote to memory of 3284 3152 svchost.exe 95 PID 3152 wrote to memory of 3284 3152 svchost.exe 95 PID 3152 wrote to memory of 3284 3152 svchost.exe 95 PID 4492 wrote to memory of 1752 4492 HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 96 PID 4492 wrote to memory of 1752 4492 HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 96 PID 4492 wrote to memory of 1752 4492 HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 96 PID 4492 wrote to memory of 4812 4492 HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 98 PID 4492 wrote to memory of 4812 4492 HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 98 PID 4492 wrote to memory of 4812 4492 HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 98 PID 4812 wrote to memory of 4304 4812 Synaptics.exe 99 PID 4812 wrote to memory of 4304 4812 Synaptics.exe 99 PID 4812 wrote to memory of 4304 4812 Synaptics.exe 99 PID 1752 wrote to memory of 3616 1752 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 102 PID 1752 wrote to memory of 3616 1752 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 102 PID 1752 wrote to memory of 3616 1752 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 102 PID 3616 wrote to memory of 4472 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 104 PID 3616 wrote to memory of 4472 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 104 PID 3616 wrote to memory of 4472 3616 ._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe 104 PID 4304 wrote to memory of 4524 4304 ._cache_Synaptics.exe 105 PID 4304 wrote to memory of 4524 4304 ._cache_Synaptics.exe 105 PID 4304 wrote to memory of 4524 4304 ._cache_Synaptics.exe 105 PID 4524 wrote to memory of 4532 4524 ._cache_Synaptics.exe 106 PID 4524 wrote to memory of 4532 4524 ._cache_Synaptics.exe 106 PID 4524 wrote to memory of 4532 4524 ._cache_Synaptics.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4244
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exeC:\Users\Admin\AppData\Local\Temp\HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "ver"5⤵
- System Location Discovery: System Language Discovery
PID:4472
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "ver"6⤵
- System Location Discovery: System Language Discovery
PID:4532
-
-
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵PID:1888
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\240620750.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3284
-
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:364
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1812
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe
Filesize25.3MB
MD5250edd5dee344f6d90053b2df0919d78
SHA19795f7000eda7d04a8078df3723775eb94d5ff9d
SHA256b9c175b7541ebb681efa089c2a393c858dd90e5a5168b3a0b488158097565fc5
SHA51282687c7d8a8a33c4ccca315b941e4a96588a1de814cb9efd5439e83f8d7c09ae2fc00950aa01006cebec0f4e1596a5e8f28af27500948ee7c5987fd20bd40f40
-
Filesize
26KB
MD514671781282b4a99337fc04ed720a3c9
SHA194eaaafe503e892b121235ab81dec7ef35077a70
SHA25697accd51da7f48f2a6c5c45c1675d993bed5b521075a5c8f4fae05e72ce52a91
SHA512abb57d7de2b7a607319d2de671b669b43bfb3148003ef91a8708fcaee6a8857e09bd7445e981fefc2819168067a11ba06266438ab5a531d06e750ec56f676848
-
C:\Users\Admin\AppData\Local\Temp\HD_2025-01-29_e6af77e3ec383cd78ec9b7f0f94e12cb_icedid_luca-stealer.exe
Filesize26.1MB
MD5737c69214d5ada4901a06629bb10498b
SHA113ff4574772d0824fcb486185e60e08b9f528e3a
SHA256b9133a7c26e039ead1676cadfbc7601309ed439f4d927ea930520687aa31ae3b
SHA512a887be5969faecae08d349a66d385b98a5ec14a4584adbf59793d9e9e72469dfecc262eccf953a61f58887125dc198dce2d736afdec55f0458a2687d1f603ad9
-
Filesize
3.4MB
MD5acc4e9eab1197376787453b41bbd2020
SHA17722657c37c436ba23c5f847b98cb97aa4bcc63c
SHA2569d2e25a24066210b368edcc87ede521df9fe6985cec4c91778fe6b4a4a98a08f
SHA51266571502f7f69f7a801ca33dde0288399e490b55d0e178c2a5eebea90c7f3364267334f39cf780d396aa81bc9be16bd2c53a2df29ebb5d31ad483234d9d68a7d
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
74KB
MD5afa8fb684eded0d4ca6aa03aebea446f
SHA198bbb8543d4b3fbecebb952037adb0f9869a63a5
SHA25644de8d0dc9994bff357344c44f12e8bfff8150442f7ca313298b98e6c23a588e
SHA5126669eec07269002c881467d4f4af82e5510928ea32ce79a7b1f51a71ba9567e8d99605c5bc86f940a7b70231d70638aeb2f6c2397ef197bd4c28f5e9fad40312
-
Filesize
77KB
MD533075d6d6c251babc03e93c4eed04dd1
SHA171df48d49d69f191819973e5ee908a744b68ca71
SHA256096a1b09536237816e953828637795f1035d7f6ea692367b0c9f27003859f9ee
SHA5129417a008304f8b07635a9df180fd4fbabed7780f9eeaf346a6713ea51dd932ffbbf8881ae38f75e939b0cbafd02aac33c5f22843895f57b8a5ed062d2af6a2b2
-
Filesize
114KB
MD5f6f666c6b64f09d528f71572a43b32fa
SHA1409128f514f846b0c965c1435e326aaea3ffa6e5
SHA2563a3220acae3e467778a0e27a1316f08bcf9218b30ba9eb01a8b6af7fc0362468
SHA512b4c0cd2d9714658bd935a1f3ddf1655a5cf319d07b369e26117ac2070a9c14135c850408a191ced6e37ee8a91e66c7136be4d7a6040e885a947e85519cdf6c31
-
Filesize
159KB
MD519eb58172eaff721accbae284e791c19
SHA1bf9c9e5b1d37a904e65224dedab4f6db3927edda
SHA2562f684a51d5f7c00052527734a8e4de0d62c0ab7d5f9c37bc91f6a7fde809223f
SHA5125fd01591417e31da29bdf79a4ec9516d1456ed2e1dfa2b13f22a3bd6f0d0d2c2dc5d2e5681c73683643fe3540287ee4a3382fbfdbe7cc084ae322247ca5cdc59
-
Filesize
19KB
MD574beae5356425c49f72802a831bcd702
SHA1f9b7a9b525e62c3e839c784a50cb070ec596b219
SHA256f81daeb8003722d5637d018d25084cbb00028d0deb5bf36cb60c9c33e98fbd8f
SHA5128c6863a3e773217db915624c31d2e03825cf697d75c2a11ee26a6e9f6ca7477ff2af864ad31162eef2b6a4151f89834032df9c0119d4e3680a6d251ce62fa102
-
Filesize
18KB
MD5f7d5c9faa99c305bf95e5cd83e51806c
SHA1326299a6c25f5ad8ee4f2eabf49b8ee4ff58a542
SHA256d6bb13cfcdffab9e0b5ff82417cfdf958d99ce59e615902b1cb6735cbd4fec13
SHA5129dcede3e989d528636d29cbec2422661b293168b8a8c24ebd7e514d924a7a5e965dd73bd0b33d05ee96a73191769d113db2c17be504f37ac7790345d6a4e15bc
-
Filesize
18KB
MD53853e263d267051b2b0f1b724141fb31
SHA14c6db59395b19743d7b96f6d5acd6708f5752065
SHA256404c8791b420e26b099932e7c910222b6a41a7f03ad1034d585c7efe188518f8
SHA5121905677f190fe923042e1de448063c42027476de371add6afcf120ae7c806e0ecb8d063fa770528cc853a431b862dcd40e9c6f6e7c3f267debb8c6a10ab9e429
-
Filesize
18KB
MD5ca4ffac56dcbb2c3e700b68005acc372
SHA1848b44b9f7a88c4588e1b04621753cff5be2cc35
SHA256eb567bf961c16b551b8f2c75b3889728037449cd16a250498259d93e65cc1368
SHA512ede437b7d9d79c6f13a74f12e18c7b7abffe7413764afb7cf64c201b99ed692e773377fd981705aec26b62a330149cdf0490248b8d64fcec896332ecc43eb727
-
Filesize
22KB
MD5e625dcdce4ad4f40028f2fbc599566da
SHA1397780f7f44aaa987ca367871e6ea3cfd59fcc8f
SHA25615c2d40df960d271d5fc8252100e156b525b49fa4d94c8b0fb29e749c3933203
SHA512fd31bf4e7f3c98ae9b0751a646286d509ec0840a380d221c79fd9563df42c9a63a7d6631c7aadfade86a95ca46a4cbe9579f5e0a5f418d9076468adc6c3d3c80
-
Filesize
18KB
MD5395d39f6ec3e09c5194899434150cdf7
SHA1abd262b486e1adc39b40dbfe012a551c732dfd69
SHA256ecc40b2c80300b94615b450d5a97ed15ce51aa929c73da22c906ab01856f8223
SHA5120f55725eb8609ae52c45ff7e255c3e23bff0b9e049f2f37cb4fc12841ad9f5ed8264307961cbd27031997c29ce04677b646f9c859fc629b25186ec52f735ba36
-
Filesize
18KB
MD5f2cd3227975bd33ae08e34221d223ca6
SHA126b19fd814ea86825244e7a7cf82e7eddc189895
SHA256f88209bb4993bfbcfc9727d101a4f1ecf84649ca5fd15b264faac11daf19ac7f
SHA512690408ba6d88ad97334a8f9012c5db5c4d46d70cd9519f1d8e9131d1044805dce992d89167ef12d0192f4e5ab079722b88700df9601c05674267fc4f8d5486e3
-
Filesize
18KB
MD5f5338d65d2e09d77d68432ebd19a4912
SHA14d833997fc0bff49291629fb81d21090ec49c843
SHA256f89188eb93c4a556320ff380803ed74066d9023ee4f1143e2963a9284e55b00e
SHA512bd3eb41656e8b54968a6747d8f2fd1801c72e1441689ab6f93baa4d9fa2cd866aeb7a25e51361306d50e72e377e9796ea324f71af2e4635060d1eca7294b743a
-
Filesize
19KB
MD51d2ac1274b83a5e48d41dbaab8781069
SHA123f18aaad274bdf8aae00a445e18ebc176d31c9f
SHA2563bab76c1bdeb706b46b8d284e6de9b9dc199f6188315bcd8b7e43ffa4dd922bb
SHA5129bbdb8909c36b26ac4c3615d5b1407cc8cb86e43e02de3498a824ef0c8e6cbda39707a9f54bf186dda14cfd96c5586a96c813a41137d65cf0831369d09e22cc1
-
Filesize
19KB
MD55085f73d69109312ec3732298475dac2
SHA19d1093beeca65ca08ad9b9bb4158e8a9fc7bd99a
SHA256d3f23eb6eae7a39118a76a013c668eb36e57cc07eb33ba45435814327e70b71a
SHA5123fddb666c0c0579f3bb3a7d9ee88dd5907059d1f8406113b96a384240139aa15fe1b2a568914725d946e500a09e332da557df725875e02b18616df49e9cefe0e
-
Filesize
19KB
MD50888e4d0f905845ebf38de8c5ef10a74
SHA11d7243f40d8ce2e2ce4c1f766b48ec5e2de1d72f
SHA256040e6833c5400609a5b5d6790c65ac33187ac7457fba30df4ea3e744beb40afd
SHA51245ccef482975e7ba721a4b475778788c3dee252a4d9e6074930e88a9390534467ab7832a03648c5904a80c2db8e81e4cff87adb9e5d6069dc4755e15ae782c96
-
Filesize
21KB
MD5b178f49844a5168d29d5cce20a6303e3
SHA129dd5bd890addbba1d8a9aeacb68716f8208da73
SHA2569358400795afcc41f5e748e20b139cfbb1ac976b3e460597b0b21893d647276d
SHA512b65308d482342291069314e9f99964c3479ea41579db17d3cbe3888318bb7605ee67c11a40f14609665a419f44a61809513bddb8b3657b24a4bac16bb274664f
-
Filesize
19KB
MD513b5e01cc5c54032f49f86c8aabb1f7e
SHA1cfb398a5397709b260e8d11e3b450c77e7c93f82
SHA25650be868ec47fe0f6c80df106b1a275bfb2776d81e505f6474ef3d088d52e5b4e
SHA5123086c3c0421d817206af86a48844df384f689fd498ac22533511f2cf028707f7927dc8004c4ef286292013ae8579c249df48e0d0a2ef8f530c235641306a57c3
-
Filesize
18KB
MD5256677a807d727f8d0f9535a803c5eaf
SHA1f3c27bf742c71491c0de36ec9d5edc65ee4cd27b
SHA256b592d9e2290a0dee51568550324f46e31390f177924513595436d2e85fd0ec0f
SHA512072c3c02b84e1ed24364a9248fc007d44edd949ec886494940ce00b45414a418c428324a0df8abc9ecfb131ad8dd69c530194348b43afddeb670ac3774ec51bb
-
Filesize
19KB
MD59a97f58226166747ba3f6c713b6c917c
SHA187915dfaac5207ea9083a1e0e767f016f07f84b8
SHA2561acb9d56863131de5a0e38a13065c3db0932a1f094f5598dcc8357ce177cb79a
SHA5129193f7eeaaa1482aca519e2799ce2c23971a38b277da12aac4ece80170f1723cdfdf5a680042659dc55dcb228617999bb4520ca70b789dd05dae2a9e71c91a27
-
Filesize
20KB
MD5ac244920257f8a1201c2b0b7e9eba4f3
SHA1319014ac49fac2e07b752f04dfce04a66c69a850
SHA256dc539d5dc64375acbcf5369d733553aa979529efcb0a1d6bc3e702334d1bd112
SHA5122edd0d64d31a8da9be1b89f6d0e6390d92067f9f5e3f8f0699657dbaacdc9d618587efc5cbbe842c66454024a52381dc6f1f176b5c06cc2500ab11a1bc051936
-
Filesize
19KB
MD5da1c671169dd183afca9ac76f46fd86e
SHA147a1bd0c45d5b87351870b8dd2122da30638ec83
SHA256e5c2478571ab260776b547579acd847bdecac9b4b9b4590d4ac7c80135c68930
SHA5125e6eb5525a77ac63bbae2288fecfd5712aff5c194e55d93239ae6171b8602de9d029ca725f15efb03890dff57a34c07435687e87a20839d614cc9c90fdf06f5d
-
Filesize
18KB
MD57992071269b1a2983bc758c698d71847
SHA1acc8b8b2ca031b392b171ad5e1fd3dc8ce3ab166
SHA256599b5d2c0ee3a2c716a01fa1eaada78a0b6a70fe86d540157a78c1d9a4f1a72b
SHA512b16dd99224e3ccd7ed3f646f55e9e447c304d421fa6d1952194e55cf9e9189c9f6907990ff3c4d96abc74733c29aa5c4a2d2bcd6cb37ff4bfb3f329f71d2be45
-
Filesize
18KB
MD5556d914a96840f898725d60f7a5421ad
SHA19178bf1c1156942da714c01e5225601b1a3c8471
SHA256e4a86d278cc33e061f5926879f2ceac3995a58ececbbccbe649f2b73ef0286fc
SHA5123d6dda62f62f442b84a6a32ed2e3d1b4fa37b85da69b05dc4123be10c83a3da1f10a578ffcde819e4b6328852dc72bb73275b62da4a5e1842e1fa9670ab18551
-
Filesize
18KB
MD5addf225e75ae40d806c5e0128fe442c8
SHA1edde2c75e419ee1a20bf7760760cf4901b42d304
SHA25615587cc81f89b6f0e84d50f9ed0303a7c2064df8883cb751c2159afcd41a3764
SHA51264a797d77730313993756cb32180ec665169e4beb76461a7b00bc0b52883f39252e0eb0aa107c5c76c8dd39624ece8043a1f6678d010a4db73821543f0945a33
-
Filesize
20KB
MD555425582260e252c7fb4bb235200952d
SHA1e6d580d5472a423e193a913df23a00e596a09eac
SHA256794a7c222e9d0b30c06a70d2f5980bccad5f61678d1664edb09bf4715eec0c47
SHA512f8a8a8d21d21b8c2e4a579d96608248e0fb704f26bd12f9ee3c580e2499f8542ba7e8af6a2208b72a227dbe432988571830896cd69aa43c2d904d3556b788537
-
Filesize
19KB
MD5500dc43299f083fbdccd7043d8665c6f
SHA1ad084aad23cc9e18fd4b436fb53aeff4484a7e14
SHA256829c05601bac069db875dc89c713ee2f54b350cd5a1a96ecd1ea8ea46ac59ad5
SHA5124b6490b9d4890b5c8d7fe2e2b31b88841f239daf6756034f14d3ded247eaece8290dc078d69e934de49ab623dcbf69c22b32a0fde72d31accef91f6c5cc496fd
-
Filesize
19KB
MD536f92e6ca7810e1fc722099c9d7b3424
SHA16f1b3760b3027e5ac0edfb5a3328beeec7c9fd86
SHA256cfc948063e0451e716f5a221c0b4334b72c5052859c1506ea6a7662fdc0c86db
SHA5126afe49cd5c00ed4feb3c2874bd49fffba32ae42412c22a5a673a204d42aa25fd84cbff90a9a848d4243a34e70c300570ab8f48e303a405860b9c73cc1d907c09
-
Filesize
18KB
MD5c54a336fdc425291b1d972f6fbaca6c7
SHA1ea3872c198f3f41e41dcc42cf92aabbc6540579d
SHA2568d1f5410f8b4326876410b45fcdcabb96bea4941f71ea5b11cb6dae80e6bdd49
SHA512abe7694493ce2e367582be1155fb5100a7840e67eb1f646dbd5360a47b430ec03634a3f1a940a8a5f555d96da0fdab66a4a2de544b847234e38b588cf597e0e9
-
Filesize
18KB
MD5b1a0e722fdcdbd6fd22103bb38c8730a
SHA1abd608a9bf9cbc56f6ecde6ce7b63e8b42f547a8
SHA2561f4dd0887f186c99a826ee64c1c64ba27105c61a40bacc9a1f521b855db2887b
SHA5129920d2b868666bc4ca2d4bbd20da6fe2648a3b829417268c3468006d1259a0450a31d4b4605ec8bcee697f3b060f14009dad37bac7f564123e0180eabdf8c0ce
-
Filesize
828KB
MD5ce95dc9acd6d3fa9930e83cfaaace1a3
SHA1ea30f0a12f32970a766ce3dc4ad1e9d106dd7ee3
SHA256b541ed3dd383272de7700a1a25e31c451ef6a79f244c8289fced8a329926165b
SHA512340f432d5cc1a267d823c632a440a82b73f5c035933300f204c8ba3fb6dff99ab83961f6593e52901a3859009ae94fe1567902b38b314f84a75b3e3c193c1824
-
Filesize
28KB
MD5bc20614744ebf4c2b8acd28d1fe54174
SHA1665c0acc404e13a69800fae94efd69a41bdda901
SHA2560c7ec6de19c246a23756b8550e6178ac2394b1093e96d0f43789124149486f57
SHA5120c473e7070c72d85ae098d208b8d128b50574abebba874dda2a7408aea2aabc6c4b9018801416670af91548c471b7dd5a709a7b17e3358b053c37433665d3f6b
-
Filesize
58KB
MD5161ffbbcf85e020173a11abf4146375d
SHA15e33d966199ffb904fd1718b8a10e6041c86d27c
SHA25615403d93e42d82d98e62a8b5a30710dd767857eed88a1f8c4ba806528c37bc22
SHA5125899e11474eee7f47687f6d8bd40e1074f0cf35493a4eabb9fdef0c2f8256c289908ce21c33e568c50d9758ebccb3f79180c39065afedddca57dc4817c5ccc9c
-
Filesize
4.3MB
MD52f437852e6db4e02e50530914842b97e
SHA16d767a495d6980798f3f2e673208f84d60bcc0b6
SHA256b4c1ee645ac50e5e38debeeb36344b1de87b7149510fc9f5347db3f9db5f7b20
SHA5124d60337e3f53dc3a908b8d82f9ad287b17a6db4ad559e32f3cd30937c9e42a26f1d4926b5d5ce78e466f4a28d9d5913ea20ca44d93dbf5aab74e55a315a59da6
-
Filesize
1.1MB
MD5359a14ce507a0d0ada72127ae5e7d439
SHA1951b1fbc667ffed0b9961bc14a5e7c37bae52afc
SHA256e0bb6f1a8606fd8988f93255a5c69e89970da6a30ff60be22d3f90ac5d20e56b
SHA512d6151dc504aa469a275e2ffc25a014995c72dbcf6509e33a679202a5c3f0f4e8f7fe283ca46120cfe53f13cf0b2548e040ac1840fdb615986a9ca7497f7edec0
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
899KB
MD5aa8c178d7903b504d384979b4027d79c
SHA1280fe75a34da0f88a444a8f4b10a67a5eca35d34
SHA256b762d2dd32043b354ef6870eaba50f415f98acde51f53245bb9b38fd365e71dc
SHA5122f9dc1583f41f407ac87f694de5bc3762e9b8475fcfa9b0459bb2f97ae56416631423f3dfd0bd2fe3c0eaf9507f1f83c6be4b80e32e1b31fcc577fda70e2c4cf
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641