Analysis
-
max time kernel
120s -
max time network
102s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2025, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
En-Setup.v.exe
Resource
win11-20250410-en
General
-
Target
En-Setup.v.exe
-
Size
8.6MB
-
MD5
be6e079bfe85c0c008b9d4ae21b3479d
-
SHA1
b94fdf95b80e919d81ea4fde3c822b25df99502b
-
SHA256
e6addc21723a1414a3fb0ef5a1371a9b38ed1ea7ccca849fc1c1e9d1f94914e5
-
SHA512
5716d2793fbd350dd2ee6cf590a34470f5b78643601c641764e9f9abd7ccda594ea1eeac6fef8e092dda50f940b6022cac946c6630c7df115e398a5051416d3d
-
SSDEEP
196608:urFMnQitYpY2wD32tGs1TvjFQeO1AWKbdx:uJMnFtYpkDQ/51+vKbD
Malware Config
Extracted
vidar
https://t.me/v00rd
https://steamcommunity.com/profiles/76561199846773220
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Extracted
vidar
13.5
0d80c60d314e504eeb06c12f83f4aeb6
https://t.me/v00rd
https://steamcommunity.com/profiles/76561199846773220
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Signatures
-
Detect Vidar Stealer 42 IoCs
resource yara_rule behavioral1/memory/5036-438-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-439-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-440-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-437-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-449-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-450-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-455-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-456-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-459-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-463-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-464-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-465-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-469-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-470-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-500-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-501-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-502-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-503-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-506-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-510-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-511-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-512-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-516-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-519-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-877-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-908-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-911-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-914-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-915-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-916-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-917-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-921-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-922-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-923-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-927-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-928-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-944-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-945-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-949-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-950-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-963-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 behavioral1/memory/5036-964-0x0000000003CB0000-0x0000000003CD9000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5720 chrome.exe 4516 chrome.exe 4480 chrome.exe 5112 chrome.exe 5456 msedge.exe 1744 msedge.exe 3240 msedge.exe 856 chrome.exe -
Executes dropped EXE 1 IoCs
pid Process 5036 Sigma.com -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2880 tasklist.exe 3012 tasklist.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\TechnologicalResponse En-Setup.v.exe File opened for modification C:\Windows\PhotographersGourmet En-Setup.v.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp msedge.exe File opened for modification C:\Windows\EmailSix En-Setup.v.exe File opened for modification C:\Windows\ChessToner En-Setup.v.exe File opened for modification C:\Windows\WeekendColony En-Setup.v.exe File opened for modification C:\Windows\ToldScuba En-Setup.v.exe File opened for modification C:\Windows\MexicoSussex En-Setup.v.exe File opened for modification C:\Windows\HhPhysiology En-Setup.v.exe File opened for modification C:\Windows\HazardFranklin En-Setup.v.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sigma.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language En-Setup.v.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Sigma.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Sigma.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1796 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133893593371038707" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2627618461-2240074273-3604016983-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsTerminal_8wekyb3d8bbwe\StartTerminalOnLoginTask taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 856 chrome.exe 856 chrome.exe 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 5456 msedge.exe 5456 msedge.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 2880 tasklist.exe Token: SeDebugPrivilege 3012 tasklist.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeDebugPrivilege 4492 taskmgr.exe Token: SeSystemProfilePrivilege 4492 taskmgr.exe Token: SeCreateGlobalPrivilege 4492 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 5456 msedge.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe -
Suspicious use of SendNotifyMessage 54 IoCs
pid Process 5036 Sigma.com 5036 Sigma.com 5036 Sigma.com 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2916 2492 En-Setup.v.exe 78 PID 2492 wrote to memory of 2916 2492 En-Setup.v.exe 78 PID 2492 wrote to memory of 2916 2492 En-Setup.v.exe 78 PID 2916 wrote to memory of 2880 2916 cmd.exe 80 PID 2916 wrote to memory of 2880 2916 cmd.exe 80 PID 2916 wrote to memory of 2880 2916 cmd.exe 80 PID 2916 wrote to memory of 2868 2916 cmd.exe 81 PID 2916 wrote to memory of 2868 2916 cmd.exe 81 PID 2916 wrote to memory of 2868 2916 cmd.exe 81 PID 2916 wrote to memory of 3012 2916 cmd.exe 83 PID 2916 wrote to memory of 3012 2916 cmd.exe 83 PID 2916 wrote to memory of 3012 2916 cmd.exe 83 PID 2916 wrote to memory of 5848 2916 cmd.exe 84 PID 2916 wrote to memory of 5848 2916 cmd.exe 84 PID 2916 wrote to memory of 5848 2916 cmd.exe 84 PID 2916 wrote to memory of 1208 2916 cmd.exe 85 PID 2916 wrote to memory of 1208 2916 cmd.exe 85 PID 2916 wrote to memory of 1208 2916 cmd.exe 85 PID 2916 wrote to memory of 1052 2916 cmd.exe 86 PID 2916 wrote to memory of 1052 2916 cmd.exe 86 PID 2916 wrote to memory of 1052 2916 cmd.exe 86 PID 2916 wrote to memory of 4520 2916 cmd.exe 87 PID 2916 wrote to memory of 4520 2916 cmd.exe 87 PID 2916 wrote to memory of 4520 2916 cmd.exe 87 PID 2916 wrote to memory of 5060 2916 cmd.exe 88 PID 2916 wrote to memory of 5060 2916 cmd.exe 88 PID 2916 wrote to memory of 5060 2916 cmd.exe 88 PID 2916 wrote to memory of 1020 2916 cmd.exe 89 PID 2916 wrote to memory of 1020 2916 cmd.exe 89 PID 2916 wrote to memory of 1020 2916 cmd.exe 89 PID 2916 wrote to memory of 5036 2916 cmd.exe 90 PID 2916 wrote to memory of 5036 2916 cmd.exe 90 PID 2916 wrote to memory of 5036 2916 cmd.exe 90 PID 2916 wrote to memory of 2756 2916 cmd.exe 91 PID 2916 wrote to memory of 2756 2916 cmd.exe 91 PID 2916 wrote to memory of 2756 2916 cmd.exe 91 PID 5036 wrote to memory of 856 5036 Sigma.com 94 PID 5036 wrote to memory of 856 5036 Sigma.com 94 PID 856 wrote to memory of 1928 856 chrome.exe 95 PID 856 wrote to memory of 1928 856 chrome.exe 95 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96 PID 856 wrote to memory of 2876 856 chrome.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\En-Setup.v.exe"C:\Users\Admin\AppData\Local\Temp\En-Setup.v.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Arrangement.psd Arrangement.psd.bat & Arrangement.psd.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"3⤵
- System Location Discovery: System Language Discovery
PID:5848
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1547233⤵
- System Location Discovery: System Language Discovery
PID:1208
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Staying.psd3⤵
- System Location Discovery: System Language Discovery
PID:1052
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Margin" Implementing3⤵
- System Location Discovery: System Language Discovery
PID:4520
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 154723\Sigma.com + Jennifer + Evaluating + Player + Resorts + Graduated + Dem + Paypal + Interracial + Intranet 154723\Sigma.com3⤵
- System Location Discovery: System Language Discovery
PID:5060
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Vp.psd + ..\Stripes.psd + ..\Pillow.psd + ..\Clients.psd s3⤵
- System Location Discovery: System Language Discovery
PID:1020
-
-
C:\Users\Admin\AppData\Local\Temp\154723\Sigma.comSigma.com s3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xe4,0x108,0x7ffd7b2bdcf8,0x7ffd7b2bdd04,0x7ffd7b2bdd105⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1956,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=1960 /prefetch:25⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2216,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2228 /prefetch:115⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2368,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2384 /prefetch:135⤵PID:3224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3268,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3312 /prefetch:15⤵
- Uses browser remote debugging
PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3276,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3340 /prefetch:15⤵
- Uses browser remote debugging
PID:5720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4252,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2420 /prefetch:95⤵
- Uses browser remote debugging
PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4768,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4752 /prefetch:15⤵
- Uses browser remote debugging
PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5308,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5296 /prefetch:145⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5504,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5512 /prefetch:145⤵PID:4928
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x250,0x7ffd7b29f208,0x7ffd7b29f214,0x7ffd7b29f2205⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1844,i,15235996133205116600,4791057867536916263,262144 --variations-seed-version --mojo-platform-channel-handle=2236 /prefetch:115⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2208,i,15235996133205116600,4791057867536916263,262144 --variations-seed-version --mojo-platform-channel-handle=2204 /prefetch:25⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2480,i,15235996133205116600,4791057867536916263,262144 --variations-seed-version --mojo-platform-channel-handle=2652 /prefetch:135⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3424,i,15235996133205116600,4791057867536916263,262144 --variations-seed-version --mojo-platform-channel-handle=3504 /prefetch:15⤵
- Uses browser remote debugging
PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3432,i,15235996133205116600,4791057867536916263,262144 --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:15⤵
- Uses browser remote debugging
PID:1744
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & del /f /q "C:\Users\Admin\AppData\Local\Temp\154723\Sigma.com" & rd /s /q "C:\ProgramData\kfcjw" & exit4⤵
- System Location Discovery: System Language Discovery
PID:1824 -
C:\Windows\SysWOW64\timeout.exetimeout /t 115⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1796
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:448
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:6024
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2428
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3576
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2772
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4492
Network
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD59efc7b850853ee518964dd7e5351286d
SHA1bb797c87b17a9dab355b1b3db8eaeab3bd8d703b
SHA2561372b3fb7c047ba7f07270ac4e68ff3316d21e9596a126f0071c00393eb36e3a
SHA512502606b8d566b56a142760cc6a94bb4ad55b14511fb64e0dd67d8a3d6df36e2b4861296d04b8b4a6cffc164258df9b518b063609b6e71a20d77db5884eef0b8d
-
Filesize
512KB
MD559071590099d21dd439896592338bf95
SHA16a521e1d2a632c26e53b83d2cc4b0edecfc1e68c
SHA25607854d2fef297a06ba81685e660c332de36d5d18d546927d30daad6d7fda1541
SHA512eedb6cadbceb2c991fc6f68dccb80463b3f660c5358acd7d705398ae2e3df2b4327f0f6c6746486848bd2992b379776483a98063ae96edb45877bb0314874668
-
Filesize
64KB
MD5ea087e09d744196d7cd248139123abda
SHA13ae0fa0affd701477eb7fb2c61afe3374c3b5fa4
SHA256e2156834e223f80007dd8086a33cd8e6b3c8bdb92cd386805997826550a9cc01
SHA5127b5ee77323931329589817e786b63c4d0679a808e849bd2b8032360e0ea327f5aed2f70c0f6c18747e59c8807c752c6758c34a039e609393db2c1c61604b64cc
-
Filesize
414B
MD5bc39ef2353690e4a80886866ceffa38d
SHA174da1f0f1bb3718eafed552aa8e47c20f571ad6d
SHA256ee625e8a2080ad7985e3f6a2a961f131140f39adb8183a3e04aa674e3170ee24
SHA51297aa9355a09f511a7133d2988c376cbe1b05826b92cca4eee551bf29303a31405c359c3c27b1810c4c2dd0ed967189a2e3793e61e6b1edc2747ed471d9b64e4b
-
Filesize
78KB
MD5b840fb0b2902e8f4ef2a50e13d59c347
SHA1ac21f7134c1590d344cb811c1c96d9d508a79409
SHA25675ecb47bc7e0fc5203506d1235c9dfe664063b6f46cd6262ccc255418cae84a7
SHA5120330e8e4533ac577dec5ddb6316d87bab0717c610b99898f04a762e02b690904cc4545ff4e6036fea5b3aafb415995e88cef22d113bfe79d1016f39a30b972e5
-
Filesize
280B
MD50c45ee0655e29b0a935a305e66bba8cf
SHA1ad52868d94ba826e1f0b9db56d8fb7ff1c8fff2e
SHA256d23f3010a3dd3688741250e254dd07d508883c099e1911c3e7d0854be85ca599
SHA512479b8d020e5f818a452c050f27488928faed74c6d329ab58befc860f5bf76878efcdd03bd0eb7b83f22afb4e74aa40c7a0d6bb29677cb4cc03ff4dbd2687bb2d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\21cadfbf-a7e3-4662-88e0-29f664fa1dcc\index-dir\the-real-index
Filesize2KB
MD5e43aac4f37017cbd5271772f5824f582
SHA1ad5f30808d6c8d41b796b639c82fe6a0e77a15c7
SHA256e926bf5da31b7570172d2edb1292b6b324204d74baae60277410427bd3c92367
SHA512e24d2d829f319a65da61638edd5db3db3bd3d2466eac6e8ac8e173789dab732b10353de0fb8cf20a1969372146fd2e52d40113c8136400c482882b39df481e1d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\21cadfbf-a7e3-4662-88e0-29f664fa1dcc\index-dir\the-real-index~RFe581e51.TMP
Filesize2KB
MD502365a80fccbe9d654caf48c62fda5fa
SHA1e426d0898a22b9d25e77398d1a93c75ec03ca625
SHA256ccb84dab175ba7c8852a5f8631d913b69924fc08096ea49a6e3a1928870431f2
SHA512758a3f0a3dd0debd991e7641556e69b0bf7268e9feea52705520a08b4908bec35776f228d2a75a0bda1245a0628b7c7212cc593aca0a951c746f1830dfef6f02
-
Filesize
40KB
MD538e803eb02447120d7bf157f02435b00
SHA1302bc7b55628dc4006901ec4696d941088cf8ce3
SHA256e962f62ce96407ea3bd0c02601d576d8cd6b54a42f0abada48049bd1da526de9
SHA5122d24261819905befb0d4c2a47e2d0bf417cb2bbe62412f2bc2c0cdd669356b2adabcef52aa0916231f561bb74c773975424ea162e7666d7ddd091dd9d3c14cd5
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
264KB
MD5a2d8c1190659760ca229784325e5d4e8
SHA160982e848b3b8809772970b38f2ccec0e9707d07
SHA25685177eaf073e8c7216ce06a8be39b6951864a9b6d8c226fc1493a795a24c7951
SHA512c358720963d1ae3771cc2fbcd08e03191ccebf53fb185524cdd9e8abceb3cea20b4394e2927864a8859c1bc5d24471dcb355ffd7c9071f97d4c277aafdd5659b
-
Filesize
17KB
MD559f22b8777394031b7922f06b731354e
SHA12df54e2ccfdcba08967155381578f19c4ce2cde3
SHA2562d15a810bd0ae9fb2e96e8eaba68ec46d74d47937cf1fa83c9768297296c14b4
SHA5120d6b911cf75118567e66f83c8eda462378115a4978b5b2683069c0c4b166623cee9ef17c7779afd3545703350d8a9b4bba462dd9998b8fc4a9c569232b24ed66
-
Filesize
39KB
MD5be18d9adeb2b11ac850cda3935599a1d
SHA129d4d198480431e0f9afec9b4642b80aa35d00f2
SHA256c0cc9737fff5fda8438b9e068707066f29f46e716c6368df9c629855f108373b
SHA5127b4fd5ab5f55b7ec1900ad6d9a0918c1d3314711256453708a404f98be9a3d554914e851eed99fadabb18dfdb96a747b4854e9508bd1bbac5f0dcd4c5e85904a
-
Filesize
149KB
MD5711f46a515ccdbc546b1c2b38e7e56c2
SHA1464df67250c5faee6c4b18874c620b16eb911667
SHA256eed9dccbfd4e0e1342bc33e369b386a2ae8c786c603209c73343a478ce7142d5
SHA512fef57b76db57817e5449e7000726b07c7700d8c099f901170356268be16ea27132278cfd0b54df49da1ceeedc07d138468e048ebe4049e293a3095fbf6b10f5b
-
Filesize
52KB
MD511d1084471a398c1fc16ba16c3d97c8f
SHA121e29e6db32494c7104e92bd804864ee4e8f01ac
SHA2564c2201c19aad032761603d98a9efa126435ab2b8c11738acaa050898ebfd674b
SHA51215e29c9bd71ac1b24b61956697858ef9c6bc257cb748be1a10fe6bf9489fdc49ac460b663a4351ab1ad8223beff2c9e6391d14855dabe3aa6605b2dea7d94176
-
Filesize
100KB
MD5fc03a6660588f9b3385e848f6cd0056c
SHA18cd3f9df8e86c06a8b48fae8e808094b22b36765
SHA256c6d3d80a211ce89ff2619ac65cd3cd70518d3b2db501a7204df9f75b6a1e1849
SHA5122519bd54e1f9d7a428267bc878f31c4502f358f5f1fef3e0e09e7ab17d1d5dd134647f9679ecb8d6117708fba8390ecd59a25aac6f2d31c6598896fbe47ce266
-
Filesize
1KB
MD50764bdc31e68d68b104cbf15607fbf6e
SHA142d38abcf810cdf6fa5606006c03f2704c817cad
SHA256140d6a94377b499d462d222cf83853de19336c7de1880347cf2bc9d505836b3a
SHA512e3bb25ae503368172c7b542b1ff420c53c3196a167fe4660b347740e9131ae41ac02b2a39176e4b8f1e15aaf4ccfb3c120ad5f01f7cd23a4f07d7b670073339f
-
Filesize
74KB
MD5f9f5cac82344a2a8e0161c3db016d1ab
SHA1cece8585b8735f65a86c74a0b285a18b7cc3bb18
SHA2565fceac0e7920e1416fdef7ee05156dcf9069a9851eb4aa33e7288b8c916a8806
SHA5121db7e46fc1c9531759ace97ffa72273c1edabf2a7b7a2b35a59d73443c77ae9d433cf7d84440b8a8c8bdfc319e08de769472cc1b438712e51f97f6e8fb9d7c68
-
Filesize
133KB
MD5959fde9361d0a1dd0de9609049c109a9
SHA10c1a4a58f79e03dc21866daacf61086e3a706a50
SHA2565d72ed02bb21accb5c9448d9ba7b83e67bb904dcd2c97a2316cd9137f466bd6c
SHA51213fecea4532e7d3e575fd3d82e2fb17827faa05c552858dff4523c18a91b80d07203c78589fb14c3dc84530b2c8720305048ca05feea89500543a74ac5e984ea
-
Filesize
88KB
MD559d440c3e91766f5fd8dae8c1db494ba
SHA19f728dc537f62ebb9dd3de27cd9337c4022f073b
SHA256e6baa5c72a90d8647b538f71df2820258bf94d1f08c1d763249fece1318c3735
SHA512579cf1eca92a0851fea64f39de36ebd9f7dc1dd667a3da36d474e7c0de011f728f426b2c015c70ee443465bc5e4c683f87c0066f6b94cb681dbcc2a1b963b648
-
Filesize
53KB
MD553429cceb778c71f22314d295682d45c
SHA11c180b4fd39f469b318ed032a800fc12566d6bb1
SHA256068bb1461aafc63e6089231fe86fd428faacd53a841b1fac849f0e1b85032f67
SHA512a1299e5699fdab4044a7eff988ee348f12d65d259edcc2320dbe80e8e7a77914286f5a4526a3b11e4165ad7c5506fe8f51b7027c2cd78dc9c47107b414d05d43
-
Filesize
73KB
MD55af7681994d86ffda109f1a92ced0ee0
SHA1859913d36e8d3637dbc108dab41037370797b8e5
SHA2565f80e592e77d2ac1ab3576893d6b110380f53ab75a221f29bc448561e9e0838d
SHA51240907b9a066d0fea4206e083d8a75bae8b16dce5d869f38df5f07775167274f25992e39b399a1b3a4ea2557b60f1b481a8f142a481a9c7cd6916735ebdd43573
-
Filesize
128KB
MD552bc12227550c0e894113e2552dff82a
SHA12305155178f20a2505fbf29c7e6f6d8785310185
SHA256931597efcad5fe656f28967697590ae684dbdecbda0421f36bc3fb72bd43e2c1
SHA5129aef39cfb614a61cf5ea6cc24aa1d5fe8c0690a16b4efa8ef049b4441d3a2d44364fc42d4faaef2d059603d7c5badbc95634d3401f5ac886c0c9ab1fb4f8cb1f
-
Filesize
146KB
MD563723d5cd52217259c3a2083621b1e76
SHA1621da11b656224f879644152842135e871d58f99
SHA25635704e8585755ac25d6e0a01077820ecb58e5b7ff2ee04a3a344dca15615f61c
SHA51270ab6167fa38a3022f45ccd5a5253db0e25245987c13f0f375b1d31a31a6324bfa88fba6d34e32502e403a370833713923313b97f5fe2bd760936a6cc03f91ab
-
Filesize
476KB
MD584e94fcf7db165dc08891a0eab8a9e7f
SHA1dac7bb482c67dfb94f3101cf6bac4f644833c9cd
SHA2567c10a7ac70e8ff1213312cd9bb45afa35b030ff78ea4781fe900c6d6a496b574
SHA512c4e24d802be8992366a74890954a312cab32cfad7fb5454b2fdc12d9439787e648208ce9fe9f084f81ca0d8434f17b568cf859417bb1201f6d16cea11e2e1d57
-
Filesize
87KB
MD5f6874fe0b63fd0774feaa8bcd3466ca2
SHA1123343f5dafb972796ef832e6c20b592aa4dc422
SHA2560368930e0ee37d40fe154ba522dfceaa12da03493c7f32ee20f7d016cf51f871
SHA5128839f935a3d1c3517792e1080bd6c4de02c754d30971fe14ce6305d16a0e494d4464f8a8b4bb1a04c67fb15586f65561978b5c8c87b82a5c07d41edae260c39b
-
Filesize
65KB
MD5bc636b825e5b5c6ca5c316de61183ef8
SHA10fdd3bdd860bb478524946c0251ec76b34f33ba0
SHA256e6237034f8287b0a860a8b670ba45311e22d3e618313f14dcdc97f95bb4fe0fa
SHA51244245ea8d738f4fea15dd452ebe6aaf9537c758318daf185f3f1f7da930d006f61aa22c4c9062521aaf9fa1a32077ee625f0449a73040f8c7b6aa0fb3fe66eea