Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
31-08-2021 16:15
Static task
static1
Behavioral task
behavioral1
Sample
389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe
Resource
win10v20210408
General
-
Target
389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe
-
Size
271KB
-
MD5
465332d74b980baf4b1addc8f0a22f00
-
SHA1
cafa9267dceff6593a01a69a13da760d55fdb281
-
SHA256
389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70
-
SHA512
08b647afe383f55acc0c50d94a977fed9c7ac156932f96a3d6bda23c7ca17d45a0dd1ba209dc899efcc1427c2125f09313d11fa3e4520065a0905f7c9bebc311
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 6 IoCs
Processes:
AFD.exeE3A.exeexplorer.exesbtwfctsbtwfctexplorer.exepid Process 1220 AFD.exe 1952 E3A.exe 3156 explorer.exe 3732 sbtwfct 2144 sbtwfct 580 explorer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
E3A.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion E3A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion E3A.exe -
Deletes itself 1 IoCs
Processes:
pid Process 8 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/files/0x0004000000015534-122.dat themida behavioral1/files/0x0004000000015534-123.dat themida behavioral1/memory/1952-132-0x0000000000E90000-0x0000000000E91000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
AFD.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run AFD.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\explorer.exe\" -start" AFD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
E3A.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA E3A.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc Process File opened (read-only) \??\Q: explorer.exe File opened (read-only) \??\H: explorer.exe File opened (read-only) \??\G: explorer.exe File opened (read-only) \??\B: explorer.exe File opened (read-only) \??\A: explorer.exe File opened (read-only) \??\X: explorer.exe File opened (read-only) \??\U: explorer.exe File opened (read-only) \??\T: explorer.exe File opened (read-only) \??\P: explorer.exe File opened (read-only) \??\O: explorer.exe File opened (read-only) \??\K: explorer.exe File opened (read-only) \??\Z: explorer.exe File opened (read-only) \??\V: explorer.exe File opened (read-only) \??\S: explorer.exe File opened (read-only) \??\N: explorer.exe File opened (read-only) \??\J: explorer.exe File opened (read-only) \??\I: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\Y: explorer.exe File opened (read-only) \??\R: explorer.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\L: explorer.exe File opened (read-only) \??\E: explorer.exe File opened (read-only) \??\W: explorer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 26 geoiptool.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
E3A.exepid Process 1952 E3A.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exesbtwfctdescription pid Process procid_target PID 900 set thread context of 764 900 389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe 75 PID 3732 set thread context of 2144 3732 sbtwfct 95 -
Drops file in Program Files directory 64 IoCs
Processes:
explorer.exedescription ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.services.nl_ja_4.4.0.v20140623020002.jar.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial4-ppd.xrm-ms explorer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.OneConnect_2.1701.277.0_x64__8wekyb3d8bbwe\Assets\OneConnectAppList.targetsize-20.png explorer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1702.312.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-72_altform-colorize.png explorer.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2017.125.40.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT explorer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT explorer.exe File opened for modification C:\Program Files\DenySelect.ADT.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\MANIFEST.MF.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\dark\dd_arrow_small2x.png explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-gb\ui-strings.js.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\CENTEURO.TXT.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\bg\msipc.dll.mui.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] explorer.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\unpack200.exe explorer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Themes\Jumbo\jumbo_13h.png explorer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\large\lc_60x42.png explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\dark\rhp_world_icon_2x.png.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\license.html.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\cloud_icon.png explorer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\AppTiles\StoreLogo.scale-150.png explorer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_2015.7906.42257.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml explorer.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLUEPRNT\BLUEPRNT.ELM explorer.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\luac.luac explorer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1702.333.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\resources.b93b0697.pri explorer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\2875_24x24x32.png explorer.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\config.ini.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail3-ul-phn.xrm-ms explorer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxCalendarWideTile.scale-200.png explorer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\RunningLate.scale-64.png explorer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\models\es-ES.PhoneNumber.ot explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\export.svg explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ui-strings.js explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\en-ae\ui-strings.js explorer.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.nl_zh_4.4.0.v20140623020002.jar explorer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_neutral_split.scale-140_8wekyb3d8bbwe\Assets\Office\Rotate.scale-140.png explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\fr-fr\ui-strings.js explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\fi-fi\ui-strings.js explorer.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\bookbig.gif.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-text.xml explorer.exe File opened for modification C:\Program Files\Microsoft Office\root\vreg\powerpointmui.msi.16.en-us.vreg.dat.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\vlc.mo.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\SharpDXEngine\Rendering\Shaders\Builtin\Bin\LightedTextured_PixelLighting_VS.fxo explorer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\large\gy_60x42.png explorer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\TXP_Flight.png explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\cs-cz\ui-strings.js.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019MSDNR_Retail-ul-oob.xrm-ms.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\ESEN\WT61ES.LEX.payfast290.B7E-2E1-DD3 explorer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-fr\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT explorer.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\toc.gif.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\ads_win10_300x250.scale-200.jpg explorer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\ExchangeLargeTile.scale-150.png explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\fr-ma\ui-strings.js explorer.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Retail-ul-oob.xrm-ms.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\vlc.mo.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarBadge.scale-100.png explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\acrobat_pdf.svg explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themeless\S_ThumbUpOutline_22_N.svg explorer.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Retail-ul-phn.xrm-ms.payfast290.B7E-2E1-DD3 explorer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\casual.dotx.payfast290.B7E-2E1-DD3 explorer.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\Attribution\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT explorer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1.10531.0_x64__8wekyb3d8bbwe\resources.pri explorer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1702.333.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-80_altform-unplated.png explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ko-kr\ui-strings.js.payfast290.B7E-2E1-DD3 explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
sbtwfct389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exedescription ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sbtwfct Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sbtwfct Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sbtwfct -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid Process 4056 vssadmin.exe 1300 vssadmin.exe -
Modifies registry class 2 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Processes:
AFD.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 AFD.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 AFD.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exepid Process 764 389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe 764 389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid Process 8 -
Suspicious behavior: MapViewOfSection 20 IoCs
Processes:
389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exesbtwfctpid Process 764 389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 2144 sbtwfct -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
AFD.exeE3A.exeWMIC.exeWMIC.exedescription pid Process Token: SeShutdownPrivilege 8 Token: SeCreatePagefilePrivilege 8 Token: SeShutdownPrivilege 8 Token: SeCreatePagefilePrivilege 8 Token: SeShutdownPrivilege 8 Token: SeCreatePagefilePrivilege 8 Token: SeShutdownPrivilege 8 Token: SeCreatePagefilePrivilege 8 Token: SeDebugPrivilege 1220 AFD.exe Token: SeDebugPrivilege 1220 AFD.exe Token: SeDebugPrivilege 1952 E3A.exe Token: SeShutdownPrivilege 8 Token: SeCreatePagefilePrivilege 8 Token: SeShutdownPrivilege 8 Token: SeCreatePagefilePrivilege 8 Token: SeShutdownPrivilege 8 Token: SeCreatePagefilePrivilege 8 Token: SeShutdownPrivilege 8 Token: SeCreatePagefilePrivilege 8 Token: SeShutdownPrivilege 8 Token: SeCreatePagefilePrivilege 8 Token: SeShutdownPrivilege 8 Token: SeCreatePagefilePrivilege 8 Token: SeShutdownPrivilege 8 Token: SeCreatePagefilePrivilege 8 Token: SeShutdownPrivilege 8 Token: SeCreatePagefilePrivilege 8 Token: SeShutdownPrivilege 8 Token: SeCreatePagefilePrivilege 8 Token: SeIncreaseQuotaPrivilege 2628 WMIC.exe Token: SeSecurityPrivilege 2628 WMIC.exe Token: SeTakeOwnershipPrivilege 2628 WMIC.exe Token: SeLoadDriverPrivilege 2628 WMIC.exe Token: SeSystemProfilePrivilege 2628 WMIC.exe Token: SeSystemtimePrivilege 2628 WMIC.exe Token: SeProfSingleProcessPrivilege 2628 WMIC.exe Token: SeIncBasePriorityPrivilege 2628 WMIC.exe Token: SeCreatePagefilePrivilege 2628 WMIC.exe Token: SeBackupPrivilege 2628 WMIC.exe Token: SeRestorePrivilege 2628 WMIC.exe Token: SeShutdownPrivilege 2628 WMIC.exe Token: SeDebugPrivilege 2628 WMIC.exe Token: SeSystemEnvironmentPrivilege 2628 WMIC.exe Token: SeRemoteShutdownPrivilege 2628 WMIC.exe Token: SeUndockPrivilege 2628 WMIC.exe Token: SeManageVolumePrivilege 2628 WMIC.exe Token: 33 2628 WMIC.exe Token: 34 2628 WMIC.exe Token: 35 2628 WMIC.exe Token: 36 2628 WMIC.exe Token: SeIncreaseQuotaPrivilege 3708 WMIC.exe Token: SeSecurityPrivilege 3708 WMIC.exe Token: SeTakeOwnershipPrivilege 3708 WMIC.exe Token: SeLoadDriverPrivilege 3708 WMIC.exe Token: SeSystemProfilePrivilege 3708 WMIC.exe Token: SeSystemtimePrivilege 3708 WMIC.exe Token: SeProfSingleProcessPrivilege 3708 WMIC.exe Token: SeIncBasePriorityPrivilege 3708 WMIC.exe Token: SeCreatePagefilePrivilege 3708 WMIC.exe Token: SeBackupPrivilege 3708 WMIC.exe Token: SeRestorePrivilege 3708 WMIC.exe Token: SeShutdownPrivilege 3708 WMIC.exe Token: SeDebugPrivilege 3708 WMIC.exe Token: SeSystemEnvironmentPrivilege 3708 WMIC.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 8 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exeAFD.exesbtwfctexplorer.exedescription pid Process procid_target PID 900 wrote to memory of 764 900 389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe 75 PID 900 wrote to memory of 764 900 389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe 75 PID 900 wrote to memory of 764 900 389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe 75 PID 900 wrote to memory of 764 900 389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe 75 PID 900 wrote to memory of 764 900 389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe 75 PID 900 wrote to memory of 764 900 389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe 75 PID 8 wrote to memory of 1220 8 79 PID 8 wrote to memory of 1220 8 79 PID 8 wrote to memory of 1220 8 79 PID 8 wrote to memory of 1952 8 80 PID 8 wrote to memory of 1952 8 80 PID 8 wrote to memory of 1952 8 80 PID 8 wrote to memory of 1676 8 82 PID 8 wrote to memory of 1676 8 82 PID 8 wrote to memory of 1676 8 82 PID 8 wrote to memory of 1676 8 82 PID 8 wrote to memory of 2196 8 83 PID 8 wrote to memory of 2196 8 83 PID 8 wrote to memory of 2196 8 83 PID 8 wrote to memory of 4000 8 84 PID 8 wrote to memory of 4000 8 84 PID 8 wrote to memory of 4000 8 84 PID 8 wrote to memory of 4000 8 84 PID 8 wrote to memory of 3892 8 85 PID 8 wrote to memory of 3892 8 85 PID 8 wrote to memory of 3892 8 85 PID 8 wrote to memory of 3952 8 86 PID 8 wrote to memory of 3952 8 86 PID 8 wrote to memory of 3952 8 86 PID 8 wrote to memory of 3952 8 86 PID 1220 wrote to memory of 3156 1220 AFD.exe 87 PID 1220 wrote to memory of 3156 1220 AFD.exe 87 PID 1220 wrote to memory of 3156 1220 AFD.exe 87 PID 1220 wrote to memory of 3932 1220 AFD.exe 88 PID 1220 wrote to memory of 3932 1220 AFD.exe 88 PID 1220 wrote to memory of 3932 1220 AFD.exe 88 PID 1220 wrote to memory of 3932 1220 AFD.exe 88 PID 1220 wrote to memory of 3932 1220 AFD.exe 88 PID 1220 wrote to memory of 3932 1220 AFD.exe 88 PID 8 wrote to memory of 692 8 89 PID 8 wrote to memory of 692 8 89 PID 8 wrote to memory of 692 8 89 PID 8 wrote to memory of 500 8 90 PID 8 wrote to memory of 500 8 90 PID 8 wrote to memory of 500 8 90 PID 8 wrote to memory of 500 8 90 PID 8 wrote to memory of 4028 8 91 PID 8 wrote to memory of 4028 8 91 PID 8 wrote to memory of 4028 8 91 PID 8 wrote to memory of 2724 8 92 PID 8 wrote to memory of 2724 8 92 PID 8 wrote to memory of 2724 8 92 PID 8 wrote to memory of 2724 8 92 PID 3732 wrote to memory of 2144 3732 sbtwfct 95 PID 3732 wrote to memory of 2144 3732 sbtwfct 95 PID 3732 wrote to memory of 2144 3732 sbtwfct 95 PID 3732 wrote to memory of 2144 3732 sbtwfct 95 PID 3732 wrote to memory of 2144 3732 sbtwfct 95 PID 3732 wrote to memory of 2144 3732 sbtwfct 95 PID 3156 wrote to memory of 60 3156 explorer.exe 96 PID 3156 wrote to memory of 60 3156 explorer.exe 96 PID 3156 wrote to memory of 60 3156 explorer.exe 96 PID 3156 wrote to memory of 736 3156 explorer.exe 97 PID 3156 wrote to memory of 736 3156 explorer.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe"C:\Users\Admin\AppData\Local\Temp\389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe"C:\Users\Admin\AppData\Local\Temp\389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:764
-
-
C:\Users\Admin\AppData\Local\Temp\AFD.exeC:\Users\Admin\AppData\Local\Temp\AFD.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:60
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:736
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:3700
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:192
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:4056
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:2860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵PID:1220
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1300
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:580
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:2180
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\E3A.exeC:\Users\Admin\AppData\Local\Temp\E3A.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1676
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2196
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4000
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3892
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3952
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:692
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:500
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4028
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2724
-
C:\Users\Admin\AppData\Roaming\sbtwfctC:\Users\Admin\AppData\Roaming\sbtwfct1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Roaming\sbtwfctC:\Users\Admin\AppData\Roaming\sbtwfct2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2144
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2172
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
MD5bc382383b6c90d20dba3f58aa0f40ade
SHA1b626e4d049d88702236910b302c955eecc8c7d5f
SHA256bf25937b534e738f02e5ec01592dd9a72d79e67bc32f3a5e157a0608f5bbd117
SHA512651e85acf56ec7bffdc10941ba3bcebea5aede44d479e4db5d61160de2b975c484499a95564adaf90f350d6a1bf3aa97774019f1464045114cbb97806fc76c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
MD5a2981517afbb3ebe48d2168b07274f47
SHA178e0fa382ca97436ec5c43209a2e391b41d356ab
SHA256f5ef795d1577213ce930034afc93387232cc95dfe53db40db0ed65fbb44bcfae
SHA5124e939a2270036ebf0eaec96ba231eb38cb4e2389064a30e5f3b9e5e5581d363ab934431e69978e015f25f3352d17e3b3242d02357aa034838a94912fa8d6ba15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD50465994d32988b4ff5811340c4905188
SHA17b4043cbd9509bc78b08863ad22b720632686785
SHA256b33b95c79ca7fc2da4e43282f29ec14db42bdafd53c8888de793cea52caa20bb
SHA51204654263a6391c84e0fd230a992dbd107f905599a066d124055591ce19a9d74b61627bb9d4dc9df89f396b12f795b649f0331e4aad39304a5ad0e0bccc36ad43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
MD52bb3242b7872fd21893eb6be521e1a52
SHA16bf43f7f3135d462b2c6eb9812b14f931bc17b54
SHA2569ff6689c92b962ef911a24911cf4ac5a2f5ffc152898e7ad440e30c42d7f5e80
SHA512427d56556eeb1f8fd458960c2af984c50a2a436d281cd896ea0267a9e743795e90ac7ab2cb7c7b37ce3a1831d7d37ac8712519ffa8225b0aca7aabbe460bf7a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
MD50144ffd79878c926ddbaee46eb99603e
SHA16067e3ac23545c6a555117c1f9655fd843fd3a13
SHA256bbbb5dcf77923a428b481c873bec0fe59bea35213428be989dbd39bfa6b190e2
SHA51257a11b74dd15b1e5606a61eed2f63f13011d5bc5ba1672fb0fb74416d12e37dd268910da25b9caa0313780f25d534a0c92d4f9e0edb142bdeb00bf05dca9a657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD5b8a33b6347c4ecf75e9257a5ce6afe48
SHA1f44c1494ce56e211eed869eb58ccdc7e5d26a359
SHA25646c77db87979b4f8d599c84f4d020016268b33f0018d52f335750259395dcda5
SHA5126742118e5afd3e3c3aac45d09ff862895dfffe368054d7d58f27f728ff1a935f39868eb42afe5bd322333420fcfff0289d1f237a0bc29c0b36f317313527c1ec
-
MD5
b1cd7c031debba3a5c77b39b6791c1a7
SHA1e5d91e14e9c685b06f00e550d9e189deb2075f76
SHA25657ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa
SHA512d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72
-
MD5
8615e70875c2cc0b9db16027b9adf11d
SHA14ed62cf405311c0ff562a3c59334a15ddc4f1bf9
SHA256da96949ba6b0567343f144486505c8c8fa1d892fd88c9cbc3ef3d751a570724d
SHA512cd9dfc88dc2af9438b7d6b618d1b62029b3bdf739fc4daa5b37397afd12c4528561b3bf2fc3f3f2adf3fd1f582d5524332441fd30248fcd078e41aa91e17cb73
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
47a68cf6b107308db52aa7335cfe44a4
SHA1ffcc95c0e88766768e1eb0eed3388f48ce6306f7
SHA25652d699631ae78b87cc151948a6626394d0a428f8d99004ef5c747c8cc9a56735
SHA512a46a607a5130b23ed000d585458918e6933f016eb20b916f01e9e3aa065e2ae720ea5922ae2a5b1baf6f890f85c04f69638248e15614815c78355d88c6e61702
-
MD5
47a68cf6b107308db52aa7335cfe44a4
SHA1ffcc95c0e88766768e1eb0eed3388f48ce6306f7
SHA25652d699631ae78b87cc151948a6626394d0a428f8d99004ef5c747c8cc9a56735
SHA512a46a607a5130b23ed000d585458918e6933f016eb20b916f01e9e3aa065e2ae720ea5922ae2a5b1baf6f890f85c04f69638248e15614815c78355d88c6e61702
-
MD5
ef572e2c7b1bbd57654b36e8dcfdc37a
SHA1b84c4db6d0dfd415c289d0c8ae099aea4001e3b7
SHA256e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64
SHA512b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
465332d74b980baf4b1addc8f0a22f00
SHA1cafa9267dceff6593a01a69a13da760d55fdb281
SHA256389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70
SHA51208b647afe383f55acc0c50d94a977fed9c7ac156932f96a3d6bda23c7ca17d45a0dd1ba209dc899efcc1427c2125f09313d11fa3e4520065a0905f7c9bebc311
-
MD5
465332d74b980baf4b1addc8f0a22f00
SHA1cafa9267dceff6593a01a69a13da760d55fdb281
SHA256389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70
SHA51208b647afe383f55acc0c50d94a977fed9c7ac156932f96a3d6bda23c7ca17d45a0dd1ba209dc899efcc1427c2125f09313d11fa3e4520065a0905f7c9bebc311
-
MD5
465332d74b980baf4b1addc8f0a22f00
SHA1cafa9267dceff6593a01a69a13da760d55fdb281
SHA256389080a33305c9ae736daa068edd380c5c0cd7af03529cda8f852c6b2353cd70
SHA51208b647afe383f55acc0c50d94a977fed9c7ac156932f96a3d6bda23c7ca17d45a0dd1ba209dc899efcc1427c2125f09313d11fa3e4520065a0905f7c9bebc311
-
MD5
0150c23884b1d283d7d41c595d4d068a
SHA1aef5d38753d33628985ee363c26b5dd96a03b394
SHA2569e801ae843951a08be95aa354738c995b09d42267ff0c7b20e7cefcf628fe00b
SHA5120317cf1aebd2976707f722077686556dfbfba07f3c70721077835ac50310cb868f510dd4b46f79a25e071d47307f58d5178bc7ca5ec191e4cdb1213d519e4d31
-
MD5
f4e8981b1bbafd666f9fbf43aba8c2d7
SHA10f9a73283a0817bfef40f3b1fae355228c6d82a8
SHA2563917311af39c97167921676b8111a8264a03fa10ecb1d29d37b4951251c3816f
SHA512a541311656fa366fb86aeb218dca32fd9bae79c45d694b127de1ba979a06db2c47572dc08d077f7732a25e26f632c62a6d0aa8cacbd87a62b59c538ea6de6e44
-
MD5
ae0a9728f7b7385c4a5354adc673ce30
SHA164b1feae0aae94badb4e30e262ce1dcf1b807110
SHA25677c11e83511a46b1621f82494031f15dfe71607906de9f74192a7273c5a2416f
SHA512f39d09ccfa29da900073c05e9c41557edd7f1882a65f41c847eca665623388f926ad0b6a5510571e09094c586f48cbc83ae750819520311a0979393ba6fbf335
-
MD5
b1b133f58da08fd466bce7d8855aa3aa
SHA19e3c22652c118e33e43fe6c95c750c7d4b25d742
SHA2560387cdcae1212e3894a35448b9508dd96ff8c01f2c2ea1a73c4797dd78158af6
SHA512b534497a481a7d7d98683b5e4d9db5cce9b7f037b0a92510a646f4a4c6e4d7f7eb75d6a79418142e21770ab90b2c15cca7c1e543e9c6ee9db93079e099b10898
-
MD5
0dc73c15d61384e476c4ae4cfb3aa602
SHA1a233a4acbaf3dbd1c639fa9f9c42c030d8ee87bc
SHA2569dc64886a785d976cfe6c4e61dff876f28335da66f42d1d19ff8dde22e436525
SHA51219aacba57bd68a1b716bc84fdb86e03574b02829ca284a4cc66b536072ae8359a6232a2a7e6deb7a1a77703840bdcbeb300862cc9a31039cf109c16fba9b6a14
-
MD5
0957f18954eb834518affc60e63fff55
SHA1b8c79a5d9ac6bf1f9ce7ef3b48ac0568274b64a9
SHA256a3fd25dedf9af2fa49a42d2c6e5f7273a5555cc362f1de06bff974468111a7ca
SHA51231559d5295b4aedd6cf75607ab8388950ea9e7960c22cf101f4b374999fc04c299a81d33647c1a0d315b535ec997dde8823b72b7bf11aa0be79fbcae3318b654
-
MD5
5f67c2ea816b96c45c5827396c45e2da
SHA1b60bc9ac4676363dda59da469fc19dfbcd8c53cb
SHA256d987418f3b23351ea4fc17d1e94548f54b7e19eccf16961db26afad810af44bd
SHA5120b6ee4770276a2a3c3549424204a6fe33180c3a69602099430b9725f31c1ec50b4a5ffe4d9004a8a8cffdf51ecd2742d7093bc2959baddbc30d139cc2e89c372
-
MD5
59519124f20a305b8e55fb1e68972e74
SHA1d9102155b057d7f90e856edaf45bf53e476ac71c
SHA2564f376feb698f65d0f3dff0d4bf1d0336facca13a6ce4950f4029ad6a5fa87cef
SHA512168652cfffe2f0e8998f9bcf55533666ecc8487c91e971ffdbfaef9a3c1d9608b1147ae4058932b07abe893f81605f98f84a994b67fbd9024ffb31cab38c00e4
-
MD5
117143c593ff735a8822c81dff2c8177
SHA1b167f14e9f3e2fc73132058256c26c550dc369b9
SHA256b20d2cfa9d2f1e9c421784eda3e99f710df348cec7c29043b1f87f2e0c8d33d3
SHA5122596b81c571af1f2cd0fe33f47bf7ec45b9906e44fbf8ed9649ca5d9573971e7cbf725b412778615cb7a191d25468ad709a4b874ccfa4c70b3803274559aa547
-
MD5
16fc8c19d6eafc39eadbc7a5fdbc5ca5
SHA1bee8fab4c195de761eb8556b6b27f7449e702851
SHA25692e325f1018911c6a840773e46c182a719f0c6d2dfc7246f51c19e312e8d3feb
SHA512dae22e4fd20bfe850ac6e201c1f07bf512e6d9b9f74b88cc0e47752925e90db95bc531e5773a02bf03c3fb7169abdcc79caf4884b22c8a9f7875cb891bcd8122
-
MD5
720f6c35e9c0bf35bbc015d4fb56fd2e
SHA1d687952ccbe05d0e0915b97d1ff22132bcb5b47b
SHA256feb6977f8b7b92ea241a39a35200b245e3f3219e7eb93dc19699b546a3afb841
SHA51235e0ea0a9fa94609852c6660cbfa777ab5fafdd6a5a25d7f99c1443526fb99d550227a42712cae01636f106e6468d606604a58274f78c573992ee73c16bd5c1d
-
MD5
29423a0e84d2b964e1940d572a56ab1b
SHA15a0a8fe6fb509f44d60c67aeba8d8ef54987d30d
SHA256c9c8165f5c26da782969669a1d5d65e62902ffe50cb5951b1c4e9f0bcda14bc7
SHA512eaddf651da979ac778d5293ddb4163a8aafdbfc3ef059750a3dc735c9e6d8fab82e22cb7e6e3694e37801efb9f405a88d7a14940b85cd77fe6ffd0a981db0bd1
-
MD5
ae87acab8e8b9ff9c25948de5f03a4e5
SHA1cdf75d293c6614aa6b90ecd549d403d8d27e4235
SHA2560a44f711209e13fcc82c4fa1d25f3e0435d4ca7a3bdd12995cc62112f8081545
SHA5120fae5d15f8253de48cdec3e18ad19c99510429aac30bf8c27edf0acf8be7a0fe6307302c2756bea3f2b839807b8076ac55860f51edb046139aa0990ec09748d1
-
MD5
a648a36f846fab45d2436fef6a6617c0
SHA187d6551a263cb73f5fa49273049687ecd044d4e5
SHA256e42dc59f4858e54c838f8ff218e5699dbea6323d3e37d3bddcde12547aefafe7
SHA512b0ee0fb53cb4afeffd65a041a487e7b1161e175f83ced193fca2b36d2813cc6bf67e3e32f639e893d139343bc6cf28229e3824bddee4fe90caf61ba4d028b43b
-
MD5
7934d8fa0b741d63a7dbe4e056565f77
SHA1cde9fa4808bd39a5a09b4aac6bca01f8abb60091
SHA25626aa0398347efecd8e19d59e81a88b30d11e2327481452f5d4397b37c00d3e05
SHA512f9112a3e92a3dc95b77c84328bc18df227b4beef56b114abad210cfe57a17979a589a84fb70a16f75f6e1e2dfb1eeed266629658814cbec910313143d56d84e1
-
MD5
c30c91092e401795dd2e928e171effcb
SHA19c5b062aef8512ba1fb2f29224be3ffc91556ff6
SHA256f6d7fc36ba458087cd770bfb11dc37858d45c5062cabed1c2be968128a89db3f
SHA512f71ae81d2fddc4bc95d079e13614148cc2a0afd8a915f5db646f294f0c7fec0ab0cfcb8c2601656780de840781a6ed7afc0f23d409d3ff55865669d02c64eb98
-
MD5
f4eebf1bdb2f9d8e42bcdc28a21c2ea0
SHA1060e38dc8b78734fd28991c3f688631b0ff69bd2
SHA25665abefd86ca90c4170a3e18fab3fd3fc998515823516110e2cce2d8e439210f7
SHA51224f271c72eb42919640834648802391ed36ed5166ee8e6f2488e3f8708849d8162e42f29368a1b66f8a1c2daa09389ef27e6825c6f394a40f18a25085d415814
-
MD5
1da78b783289d538b1270267205a2a63
SHA1152f558403c8280ed2fd66c4830a730bc7b99e88
SHA256c7ac432a624f9e39bfd339665689c4116be723645718ff0278d3e2c13b79e7ff
SHA51267c319d4f5aff5b72fc19fe49d7fa239ed879bdebf1f5e0a0e8030d34e834795c5695bfe1b795f2a572fbeeb573e919602a894237e36cf5a2144dc1b31d1df5b
-
MD5
3813bbf224363877ccf7bf3a39956a26
SHA13df941bb9355fbc0ba7beff96b9b31bbec179938
SHA256caad992a19e6212cf8ea88076be1cb2d97046fcf407872409422be2a6e4c62c9
SHA512c91a7a29da8b2f32aa6fed338028e1cb4442aa545cfd71174ba4271f80f7876de495fde631f4f33346ddb9216bc4f3c5269d67deb13c8454a091466176c308b0
-
MD5
ac8984d5b9d7e6405fd919346f7f164e
SHA1c672e09d12b2b4be6aa693570ebece290a9985e3
SHA2562ea4d197de56f61da96b61512de48b050600b1cb501aef4e92923bea715098c4
SHA512a4cb6cc0c8076e62dacad92d6fe850aa2f2037dbd87478e4b22c56692dce58ac35a79b555520e31484b79559445a2d3640e7d4b1c1a32104e7f598f011cac490
-
MD5
66fbb37522240de858770bd8e90da3e1
SHA13c7a2a4855ad5c96d74afa368595358b84e7eed1
SHA25688d841eaceccedf03bd10f70df982e414e4f6ff267c8d7754c0e02513d6a002f
SHA512939c24821417720331682992530b4ed0128b66f31f6848fe3d0d9f038089add25c975754db74336aa74233f910265e8a68940ebbb6b800db3221c91750d0739e
-
MD5
d5a995f58024f263c7ab4cc892e67240
SHA1e29df69d5570697c08afd56415282e3efc55d460
SHA256b4df2de1f2c1561292312894191cae9d4cb223ff3f60f2adbaf73b7fe535cefe
SHA512a5d8c69f33ee00bb1354faf1dc2abb01e6360c78261c36b16a07e2ba86bba7914bf48623718d1e06203306c9de811e9eabdcab3a5690feb5ad6ea3c184095a3c
-
MD5
80158abea0af3da35edd4ee4fb9275ec
SHA14af67dc0b1484c4c9895379d718a0c4a863b37dd
SHA256f5d8cd20b48faf7920896016b74cb3f58ef4d12d62dfd376caa093d48dcdfc94
SHA512bab14077b0759c8cdf8ad5e4ecb4061c0666a4ca7f9ecb592507f7eea8629b20a4ee31124b0c82b592e50a705e8cfdcba3b7075a008954135c7a65d03c21a99c
-
MD5
037fcc5ca04a0bcc8696151d401bb337
SHA1e6938a928e2c71534ecde73ffd2ecfbcbcad19cc
SHA256b68619d560fe8eaeb13430cfe7f4a9d046d63f3a94750c75eb651701a208ee64
SHA512b663389197c0360b84c972ae42a7e7d906f5b115e2d814ca9bab6ec4c8d3045635baac7b87922187da6e00347dd6d90de77b5f3017150beabb6fcd31fe3eec9f
-
MD5
e9da0ccb006faf735ffbb504bf34ace5
SHA16c60be5476872a6503727737346d9abe553b6af2
SHA2566008911ff52debfcdb488b68ef4aaf7ec70a14099a0924693c5246422ce64f68
SHA5125518cba0f289acd132f6c96a9f6f1ad0000d83e8b45aa9d2f727f7f3bc2c0dcb4c47516d8d599a63d64e4aeb32e9bab5947f21e9768ec1e19abf034321e0ffa1
-
MD5
33441314c51dbffde2aa7e996af13d84
SHA11a12ad6d2660dd58c9d855c9681d2044519c3935
SHA25694b1ff7ace37cb86bfea9e9aa828a9dd006682978d5571518ca3a86f6c2df2fb
SHA512908c8ec52af10a9d2cec83de28a987a60007e9a89addfb0fa665a4a7731d7698ea53854c03a3e577b3bca1f66c50631060c61a3031143be795cb94f77d1b6dbf