Analysis
-
max time kernel
153s -
max time network
153s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29-08-2021 19:42
Static task
static1
Behavioral task
behavioral1
Sample
dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe
Resource
win10v20210408
General
-
Target
dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe
-
Size
140KB
-
MD5
27923d58a1326ee7f05aea88dfd0ef09
-
SHA1
cb807ea8b07f677dfacde25724ab02d1a4a99f72
-
SHA256
dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696
-
SHA512
fbadfd8293b00ccc8c8b6c6b7efdafcef125d67db5bcfb259b5fd5f1a1e897c24ef158f25adb9f41a95f2eb698571b7e17acb7b1e535f84345a7c9982bb83a51
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
raccoon
d02c5d65069fc7ce1993e7c52edf0c9c4c195c81
-
url4cnc
https://telete.in/open3entershift
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid Process procid_target PID 1376 created 4048 1376 WerFault.exe 79 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 7 IoCs
Processes:
DC3C.exeDD95.exeE19D.exevgcjjbrsvchost.exesvchost.exevgcjjbrpid Process 4048 DC3C.exe 2660 DD95.exe 4116 E19D.exe 1776 vgcjjbr 2624 svchost.exe 3108 svchost.exe 4664 vgcjjbr -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
E19D.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion E19D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion E19D.exe -
Deletes itself 1 IoCs
Processes:
pid Process 3048 -
Loads dropped DLL 1 IoCs
Processes:
DC3C.exepid Process 4048 DC3C.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/files/0x0004000000015534-125.dat themida behavioral1/files/0x0004000000015534-127.dat themida behavioral1/memory/4116-171-0x00000000008B0000-0x00000000008B1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
DD95.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run DD95.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\svchost.exe\" -start" DD95.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
E19D.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA E19D.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exedescription ioc Process File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\A: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\G: svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 25 geoiptool.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
E19D.exepid Process 4116 E19D.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exevgcjjbrdescription pid Process procid_target PID 4648 set thread context of 4228 4648 dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe 77 PID 1776 set thread context of 4664 1776 vgcjjbr 123 -
Drops file in Program Files directory 64 IoCs
Processes:
svchost.exedescription ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1702.312.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-60.png svchost.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\eu-es\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\cardview-addtotable-dark.png svchost.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1702.301.0_neutral_split.scale-200_8wekyb3d8bbwe\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLENDS\BLENDS.INF svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ECLIPSE\PREVIEW.GIF.payfast.F8E-03F-6FC svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_neutral_split.scale-100_kzf8qxf38zg5c\SkypeApp\Assets\SkypeLargeTile.scale-100_contrast-black.png svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_neutral_~_kzf8qxf38zg5c\AppxBlockMap.xml svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\large\er_60x42.png svchost.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-spi-quicksearch.jar svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_KMS_Automation-ul-oob.xrm-ms.payfast.F8E-03F-6FC svchost.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Awards\challenge\Strive_for_Perfection_Unearned_small.png svchost.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailAppList.scale-100.png svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\editpdf.svg.payfast.F8E-03F-6FC svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\desktop.js.payfast.F8E-03F-6FC svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp-ul-oob.xrm-ms.payfast.F8E-03F-6FC svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\75.jpg svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Emoticons\large\blushing.png svchost.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxA-Advanced-Light.scale-100.png svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\fi-fi\ui-strings.js.payfast.F8E-03F-6FC svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019DemoR_BypassTrial180-ul-oob.xrm-ms svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\BillingStatement.xltx svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1702.333.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-16.png svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Retail-pl.xrm-ms svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.scale-140.png.payfast.F8E-03F-6FC svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp2-ul-oob.xrm-ms svchost.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-white\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_sortedby_up_18.svg.payfast.F8E-03F-6FC svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\masterix.gif svchost.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\ext\localedata.jar.payfast.F8E-03F-6FC svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\pt-br\ui-strings.js svchost.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\6416_20x20x32.png svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\themes\dark\example_icons.png svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\s_empty_folder_state.svg svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Retail-ul-oob.xrm-ms svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\LiveTile\1px.png svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Sticker_DogNose.png svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11701.1001.87.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\StoreAppList.targetsize-30.png svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-common_zh_CN.jar svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Unlock.png.payfast.F8E-03F-6FC svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.scale-140.png svchost.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\OpenSSL64.DllA\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\MedTile.scale-125.png svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-256_altform-unplated.png svchost.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.15.2003.0_neutral_~_8wekyb3d8bbwe\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_listview_selected.svg.payfast.F8E-03F-6FC svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdXC2RVL_KMS_ClientC2R-ppd.xrm-ms.payfast.F8E-03F-6FC svchost.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.16112.11601.0_neutral_resources.scale-125_8wekyb3d8bbwe\Assets\contrast-white\WideLogo.scale-125_contrast-white.png svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\Catalog\shuttle.3mf svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\HowToPlay\FreeCell\Goal_6.jpg svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_1.4.101.0_x64__8wekyb3d8bbwe\AppxSignature.p7x svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ca-es\ui-strings.js.payfast.F8E-03F-6FC svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\dark\[email protected] svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp_5.5.0.165303.jar svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Send2Fluent.White.png.payfast.F8E-03F-6FC svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pubs.exe.payfast.F8E-03F-6FC svchost.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1702.333.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AlarmsLargeTile.scale-125.png svchost.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarAppList.targetsize-36_altform-unplated.png svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 13 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 2504 4048 WerFault.exe 79 4308 4048 WerFault.exe 79 3540 4048 WerFault.exe 79 4372 4048 WerFault.exe 79 4332 4048 WerFault.exe 79 4496 4048 WerFault.exe 79 4408 4048 WerFault.exe 79 3928 4048 WerFault.exe 79 4612 4048 WerFault.exe 79 2896 4048 WerFault.exe 79 208 4048 WerFault.exe 79 4460 4048 WerFault.exe 79 1376 4048 WerFault.exe 79 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exevgcjjbrdescription ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vgcjjbr Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vgcjjbr Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vgcjjbr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 3096 vssadmin.exe -
Processes:
DD95.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 DD95.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 DD95.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exepid Process 4228 dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe 4228 dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid Process 3048 -
Suspicious behavior: MapViewOfSection 20 IoCs
Processes:
dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exevgcjjbrpid Process 4228 dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 4664 vgcjjbr -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWMIC.exevssvc.exedescription pid Process Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeRestorePrivilege 2504 WerFault.exe Token: SeBackupPrivilege 2504 WerFault.exe Token: SeDebugPrivilege 2504 WerFault.exe Token: SeDebugPrivilege 4308 WerFault.exe Token: SeDebugPrivilege 3540 WerFault.exe Token: SeDebugPrivilege 4372 WerFault.exe Token: SeDebugPrivilege 4332 WerFault.exe Token: SeDebugPrivilege 4496 WerFault.exe Token: SeDebugPrivilege 4408 WerFault.exe Token: SeDebugPrivilege 3928 WerFault.exe Token: SeDebugPrivilege 4612 WerFault.exe Token: SeDebugPrivilege 2896 WerFault.exe Token: SeDebugPrivilege 208 WerFault.exe Token: SeDebugPrivilege 4460 WerFault.exe Token: SeDebugPrivilege 1376 WerFault.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeIncreaseQuotaPrivilege 1616 WMIC.exe Token: SeSecurityPrivilege 1616 WMIC.exe Token: SeTakeOwnershipPrivilege 1616 WMIC.exe Token: SeLoadDriverPrivilege 1616 WMIC.exe Token: SeSystemProfilePrivilege 1616 WMIC.exe Token: SeSystemtimePrivilege 1616 WMIC.exe Token: SeProfSingleProcessPrivilege 1616 WMIC.exe Token: SeIncBasePriorityPrivilege 1616 WMIC.exe Token: SeCreatePagefilePrivilege 1616 WMIC.exe Token: SeBackupPrivilege 1616 WMIC.exe Token: SeRestorePrivilege 1616 WMIC.exe Token: SeShutdownPrivilege 1616 WMIC.exe Token: SeDebugPrivilege 1616 WMIC.exe Token: SeSystemEnvironmentPrivilege 1616 WMIC.exe Token: SeRemoteShutdownPrivilege 1616 WMIC.exe Token: SeUndockPrivilege 1616 WMIC.exe Token: SeManageVolumePrivilege 1616 WMIC.exe Token: 33 1616 WMIC.exe Token: 34 1616 WMIC.exe Token: 35 1616 WMIC.exe Token: 36 1616 WMIC.exe Token: SeBackupPrivilege 2312 vssvc.exe Token: SeRestorePrivilege 2312 vssvc.exe Token: SeAuditPrivilege 2312 vssvc.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeIncreaseQuotaPrivilege 1616 WMIC.exe Token: SeSecurityPrivilege 1616 WMIC.exe Token: SeTakeOwnershipPrivilege 1616 WMIC.exe Token: SeLoadDriverPrivilege 1616 WMIC.exe Token: SeSystemProfilePrivilege 1616 WMIC.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3048 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exeDD95.exesvchost.exedescription pid Process procid_target PID 4648 wrote to memory of 4228 4648 dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe 77 PID 4648 wrote to memory of 4228 4648 dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe 77 PID 4648 wrote to memory of 4228 4648 dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe 77 PID 4648 wrote to memory of 4228 4648 dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe 77 PID 4648 wrote to memory of 4228 4648 dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe 77 PID 4648 wrote to memory of 4228 4648 dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe 77 PID 3048 wrote to memory of 4048 3048 79 PID 3048 wrote to memory of 4048 3048 79 PID 3048 wrote to memory of 4048 3048 79 PID 3048 wrote to memory of 2660 3048 80 PID 3048 wrote to memory of 2660 3048 80 PID 3048 wrote to memory of 2660 3048 80 PID 3048 wrote to memory of 4116 3048 81 PID 3048 wrote to memory of 4116 3048 81 PID 3048 wrote to memory of 4116 3048 81 PID 3048 wrote to memory of 640 3048 83 PID 3048 wrote to memory of 640 3048 83 PID 3048 wrote to memory of 640 3048 83 PID 3048 wrote to memory of 640 3048 83 PID 3048 wrote to memory of 1004 3048 84 PID 3048 wrote to memory of 1004 3048 84 PID 3048 wrote to memory of 1004 3048 84 PID 3048 wrote to memory of 1076 3048 85 PID 3048 wrote to memory of 1076 3048 85 PID 3048 wrote to memory of 1076 3048 85 PID 3048 wrote to memory of 1076 3048 85 PID 3048 wrote to memory of 1276 3048 86 PID 3048 wrote to memory of 1276 3048 86 PID 3048 wrote to memory of 1276 3048 86 PID 3048 wrote to memory of 1588 3048 87 PID 3048 wrote to memory of 1588 3048 87 PID 3048 wrote to memory of 1588 3048 87 PID 3048 wrote to memory of 1588 3048 87 PID 3048 wrote to memory of 1860 3048 89 PID 3048 wrote to memory of 1860 3048 89 PID 3048 wrote to memory of 1860 3048 89 PID 2660 wrote to memory of 2624 2660 DD95.exe 92 PID 2660 wrote to memory of 2624 2660 DD95.exe 92 PID 2660 wrote to memory of 2624 2660 DD95.exe 92 PID 3048 wrote to memory of 2688 3048 93 PID 3048 wrote to memory of 2688 3048 93 PID 3048 wrote to memory of 2688 3048 93 PID 3048 wrote to memory of 2688 3048 93 PID 3048 wrote to memory of 3632 3048 94 PID 3048 wrote to memory of 3632 3048 94 PID 3048 wrote to memory of 3632 3048 94 PID 3048 wrote to memory of 4344 3048 97 PID 3048 wrote to memory of 4344 3048 97 PID 3048 wrote to memory of 4344 3048 97 PID 3048 wrote to memory of 4344 3048 97 PID 2624 wrote to memory of 1336 2624 svchost.exe 108 PID 2624 wrote to memory of 1336 2624 svchost.exe 108 PID 2624 wrote to memory of 1336 2624 svchost.exe 108 PID 2624 wrote to memory of 4504 2624 svchost.exe 109 PID 2624 wrote to memory of 4504 2624 svchost.exe 109 PID 2624 wrote to memory of 4504 2624 svchost.exe 109 PID 2624 wrote to memory of 1544 2624 svchost.exe 110 PID 2624 wrote to memory of 1544 2624 svchost.exe 110 PID 2624 wrote to memory of 1544 2624 svchost.exe 110 PID 2624 wrote to memory of 4368 2624 svchost.exe 117 PID 2624 wrote to memory of 4368 2624 svchost.exe 117 PID 2624 wrote to memory of 4368 2624 svchost.exe 117 PID 2624 wrote to memory of 2088 2624 svchost.exe 112 PID 2624 wrote to memory of 2088 2624 svchost.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe"C:\Users\Admin\AppData\Local\Temp\dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe"C:\Users\Admin\AppData\Local\Temp\dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4228
-
-
C:\Users\Admin\AppData\Local\Temp\DC3C.exeC:\Users\Admin\AppData\Local\Temp\DC3C.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 7362⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 7482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 8482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 8842⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 11882⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 12242⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 11962⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 11642⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 12042⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 12122⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 12562⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 12642⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 11882⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\DD95.exeC:\Users\Admin\AppData\Local\Temp\DD95.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:1336
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:4504
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:1544
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:2088
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:3096
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:4368
-
-
-
C:\Users\Admin\AppData\Local\Temp\E19D.exeC:\Users\Admin\AppData\Local\Temp\E19D.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4116
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:640
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1004
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1076
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1276
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1588
-
C:\Users\Admin\AppData\Roaming\vgcjjbrC:\Users\Admin\AppData\Roaming\vgcjjbr1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1776 -
C:\Users\Admin\AppData\Roaming\vgcjjbrC:\Users\Admin\AppData\Roaming\vgcjjbr2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4664
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1860
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2688
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3632
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4344
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2312
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
MD55703edef7cb0f99305a6b18845e0443e
SHA1fb6f022ebde210306e1a6575462d6451e98af454
SHA256e4ce02059eb175c30879041d610db7b8798cdf57a4c67afc83c125c2db36e883
SHA5124631853bda1498ff3cace6a348fd2d6770edd0fec166707c3afebff09644f34e29a7a6dd3e9cb167c40e8b5fa1fbbc80ba26d80b4d939daf56278c276b07ada4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
MD5888f7457c332ac5e1897316e159f58c1
SHA1a3047c6e978158dfae29b5735e8131ec1b30703d
SHA256c2c14652875bfeb1ed529202da6d45eb974acab193c005908cf90b8c5cf3dd41
SHA5120abdc5f78ade2f56b0f1954adc0479b5dcc88d401bfac95754e7dd80adefe7375a426fd89f81b657ebe9c113092524dcbd1e80c39a4bec51ccd93bc0bc3a5aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD5939460925953ce88e1086341b8a11bda
SHA106249b891050a9fac128ccfee943aeb5bede1c7b
SHA256d4da3c5ff04a3b677eb77b1bfedc14e29ebd0d01c476d44a0b1a2366447ab016
SHA512a8dc3eb58a4a550cc2551463a3d813396caf3f2b65f5b13c8e339a4a32652895ee15c23eb5ba833eca4e7c22331a622657cf5bd64098f0c54e43b4e92fe65f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
MD5b85d70165d4a704286cfd0078308fd8d
SHA135d6a82a8a249231cced33f3d657f9774852c5ee
SHA256e3f3be4ae8c9d4212245c05e6df9f1f272a3bb2e685bd184a21442cf98e72475
SHA5124dc2a03ff01df0bf01f12ae3d8a0557e1c04aa7b842ba716e2dcb90f50530a91b1bc7c3624accb973d95851f60c58b4c2fc2c7acd4803cc2559bfd4c59427f55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
MD50e768f39e8b50f753d1609735d1142bb
SHA1b3d97ab1280b39ce526668e3be9e7dde5775a7f0
SHA256d55169c6b886d0b77bb17d73821646bfd2854a441aa7ce17be0ca54db6e3df61
SHA512adbdc09fabfe17cce4779ddc82c32984b60c0fc37b9bc1f96d2fac350d42f8cf5ca1f0ccb5c24146a9bcee713a1d2b79277c796e0b82b1cb2f209be28f634372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD56f8b6386b81b8c3b8e91d668531f1024
SHA18b5e26ce8b2212d58d5c78abff4318174db3e442
SHA256f05ae1a0d9e16225851e72e1452fa2e77fb5a8063628ca4d521e86391cc72bb2
SHA5120af59555c17c7b8b5fd8fedc28775e512fb95e013ee3c4986f62d3f0d6c798cdc3797caf1fda61ea1c0d41f45ae74b6459ee6a179ead2e43c8d8f93d26229f00
-
MD5
b1cd7c031debba3a5c77b39b6791c1a7
SHA1e5d91e14e9c685b06f00e550d9e189deb2075f76
SHA25657ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa
SHA512d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72
-
MD5
e99afcbb149ba6dfbdd90c034b88fe73
SHA1be974111ad0a8f3870d09706ea07b5438f418798
SHA256924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353
SHA512bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9
-
MD5
e99afcbb149ba6dfbdd90c034b88fe73
SHA1be974111ad0a8f3870d09706ea07b5438f418798
SHA256924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353
SHA512bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9
-
MD5
e70ceaf1fc7771d3d791aedc0c2068a7
SHA197912679527c910bdf4c97265656f4c2527245db
SHA2560e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5
SHA5126a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58
-
MD5
e70ceaf1fc7771d3d791aedc0c2068a7
SHA197912679527c910bdf4c97265656f4c2527245db
SHA2560e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5
SHA5126a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58
-
MD5
146018469ce8690f4da893e0269a1ae7
SHA194ec664dff33827c42cce634dea676b56e4cfb89
SHA25601c0aadd0d9b47985b070d6ab49bc0e7977c632a3c5843efe249a6586f951e09
SHA5128a03bd9719f39f6f99a1f522783cda64680609602c8571dd664c10d73f6336a09ddc3d3d242a1b6f7183f21766b6529a2ea2dd7d6ff54eab07dbe418dfc0c0f4
-
MD5
146018469ce8690f4da893e0269a1ae7
SHA194ec664dff33827c42cce634dea676b56e4cfb89
SHA25601c0aadd0d9b47985b070d6ab49bc0e7977c632a3c5843efe249a6586f951e09
SHA5128a03bd9719f39f6f99a1f522783cda64680609602c8571dd664c10d73f6336a09ddc3d3d242a1b6f7183f21766b6529a2ea2dd7d6ff54eab07dbe418dfc0c0f4
-
MD5
e70ceaf1fc7771d3d791aedc0c2068a7
SHA197912679527c910bdf4c97265656f4c2527245db
SHA2560e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5
SHA5126a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58
-
MD5
e70ceaf1fc7771d3d791aedc0c2068a7
SHA197912679527c910bdf4c97265656f4c2527245db
SHA2560e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5
SHA5126a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58
-
MD5
e70ceaf1fc7771d3d791aedc0c2068a7
SHA197912679527c910bdf4c97265656f4c2527245db
SHA2560e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5
SHA5126a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58
-
MD5
27923d58a1326ee7f05aea88dfd0ef09
SHA1cb807ea8b07f677dfacde25724ab02d1a4a99f72
SHA256dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696
SHA512fbadfd8293b00ccc8c8b6c6b7efdafcef125d67db5bcfb259b5fd5f1a1e897c24ef158f25adb9f41a95f2eb698571b7e17acb7b1e535f84345a7c9982bb83a51
-
MD5
27923d58a1326ee7f05aea88dfd0ef09
SHA1cb807ea8b07f677dfacde25724ab02d1a4a99f72
SHA256dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696
SHA512fbadfd8293b00ccc8c8b6c6b7efdafcef125d67db5bcfb259b5fd5f1a1e897c24ef158f25adb9f41a95f2eb698571b7e17acb7b1e535f84345a7c9982bb83a51
-
MD5
27923d58a1326ee7f05aea88dfd0ef09
SHA1cb807ea8b07f677dfacde25724ab02d1a4a99f72
SHA256dff9da898a68e7e3f22e992e55d0b45cbe1625b9bf5f4a148e76fe0d6d654696
SHA512fbadfd8293b00ccc8c8b6c6b7efdafcef125d67db5bcfb259b5fd5f1a1e897c24ef158f25adb9f41a95f2eb698571b7e17acb7b1e535f84345a7c9982bb83a51
-
MD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4