Analysis
-
max time kernel
294s -
max time network
263s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07/09/2022, 19:58
General
-
Target
Document.exe
-
Size
14.1MB
-
MD5
5210735409235c1aaf674fefddd33e35
-
SHA1
7c75657618cdeb21eedd587d960a608c4ead60f1
-
SHA256
053e7603d2776f39c17d74cd5a095d2fa4727ce019cb91274c135be4b9732358
-
SHA512
e382f86366f1a5dc7f665dd19e48410e69614cced4b5cb2deabec58e4b948906d34df42195010ea3a58e5c63579f042b0b6eb8e2f70c99d9b013d776f098985d
-
SSDEEP
393216:HlCtPYZxlHOFyCEDmlh2pNH2ciIrHWiCecGa9+L9:HPBzCEDUQpNkILexGog
Malware Config
Signatures
-
Loads dropped DLL 44 IoCs
pid Process 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe 1620 Document.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\Documents\desktop.ini Document.exe File created C:\Users\Admin\Documents\Desktop.ini Document.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 api.ipify.org 2 api.ipify.org -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri firefox.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri Taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri Taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell firefox.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\NodeSlot = "2" notepad.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} notepad.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots firefox.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" notepad.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance firefox.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Documents" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" notepad.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} notepad.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 notepad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance notepad.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" notepad.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance firefox.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" notepad.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e803accbfb42cdb4c42b0297fe99a87c6410000 firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff firefox.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 14002e80922b16d365937a46956b92703aca08af0000 notepad.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" notepad.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0000000001000000ffffffff notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" firefox.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 notepad.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4904 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4980 firefox.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4980 firefox.exe Token: SeDebugPrivilege 4716 Taskmgr.exe Token: SeSystemProfilePrivilege 4716 Taskmgr.exe Token: SeCreateGlobalPrivilege 4716 Taskmgr.exe Token: 33 4716 Taskmgr.exe Token: SeIncBasePriorityPrivilege 4716 Taskmgr.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 4980 firefox.exe 4980 firefox.exe 4980 firefox.exe 4980 firefox.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe -
Suspicious use of SendNotifyMessage 50 IoCs
pid Process 4980 firefox.exe 4980 firefox.exe 4980 firefox.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe 4716 Taskmgr.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4980 firefox.exe 4980 firefox.exe 4980 firefox.exe 4980 firefox.exe 4980 firefox.exe 3692 notepad.exe 4980 firefox.exe 4980 firefox.exe 4980 firefox.exe 4980 firefox.exe 1060 msconfig.exe 1060 msconfig.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 1620 4616 Document.exe 67 PID 4616 wrote to memory of 1620 4616 Document.exe 67 PID 1620 wrote to memory of 1244 1620 Document.exe 69 PID 1620 wrote to memory of 1244 1620 Document.exe 69 PID 1620 wrote to memory of 3004 1620 Document.exe 70 PID 1620 wrote to memory of 3004 1620 Document.exe 70 PID 1620 wrote to memory of 4072 1620 Document.exe 71 PID 1620 wrote to memory of 4072 1620 Document.exe 71 PID 1620 wrote to memory of 1444 1620 Document.exe 72 PID 1620 wrote to memory of 1444 1620 Document.exe 72 PID 1620 wrote to memory of 4244 1620 Document.exe 74 PID 1620 wrote to memory of 4244 1620 Document.exe 74 PID 4256 wrote to memory of 4980 4256 firefox.exe 77 PID 4256 wrote to memory of 4980 4256 firefox.exe 77 PID 4256 wrote to memory of 4980 4256 firefox.exe 77 PID 4256 wrote to memory of 4980 4256 firefox.exe 77 PID 4256 wrote to memory of 4980 4256 firefox.exe 77 PID 4256 wrote to memory of 4980 4256 firefox.exe 77 PID 4256 wrote to memory of 4980 4256 firefox.exe 77 PID 4256 wrote to memory of 4980 4256 firefox.exe 77 PID 4256 wrote to memory of 4980 4256 firefox.exe 77 PID 4980 wrote to memory of 4368 4980 firefox.exe 79 PID 4980 wrote to memory of 4368 4980 firefox.exe 79 PID 1620 wrote to memory of 3692 1620 Document.exe 81 PID 1620 wrote to memory of 3692 1620 Document.exe 81 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82 PID 4980 wrote to memory of 2944 4980 firefox.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Document.exe"C:\Users\Admin\AppData\Local\Temp\Document.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\Document.exe"C:\Users\Admin\AppData\Local\Temp\Document.exe"2⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SYSTEM32\notepad.exenotepad.exe RANSOM_NOTE.txt3⤵PID:1244
-
-
C:\Windows\SYSTEM32\notepad.exenotepad.exe RANSOM_NOTE.txt3⤵PID:3004
-
-
C:\Windows\SYSTEM32\notepad.exenotepad.exe RANSOM_NOTE.txt3⤵PID:4072
-
-
C:\Windows\SYSTEM32\notepad.exenotepad.exe RANSOM_NOTE.txt3⤵PID:1444
-
-
C:\Windows\SYSTEM32\notepad.exenotepad.exe RANSOM_NOTE.txt3⤵PID:4244
-
-
C:\Windows\SYSTEM32\notepad.exenotepad.exe RANSOM_NOTE.txt3⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3692
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\EMAIL_ME.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4904
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4980.0.1515061044\858530978" -parentBuildID 20200403170909 -prefsHandle 1548 -prefMapHandle 1540 -prefsLen 1 -prefMapSize 220115 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4980 "\\.\pipe\gecko-crash-server-pipe.4980" 1628 gpu3⤵PID:4368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4980.3.1949736731\2058551850" -childID 1 -isForBrowser -prefsHandle 2272 -prefMapHandle 2268 -prefsLen 122 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4980 "\\.\pipe\gecko-crash-server-pipe.4980" 2284 tab3⤵PID:2944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4980.13.1133452852\1835744423" -childID 2 -isForBrowser -prefsHandle 3472 -prefMapHandle 3468 -prefsLen 6904 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4980 "\\.\pipe\gecko-crash-server-pipe.4980" 3484 tab3⤵PID:1016
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4700
-
C:\Windows\system32\msconfig.exe"C:\Windows\system32\msconfig.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:1060 -
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe" /7 /Startup2⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4716
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5ff9b1e03922361e0a8be65e5e1421aac
SHA1d4d674fb4e0214903e341e98613328d51aff9054
SHA2562a5ab7f23554f497693ca81a5e5f21647b10fd8b9e00b8377d8385dc15a9c4df
SHA5128cbbbbdc9a3d9e866dc88a655a75317f58cb4a49cb262975ff8c4ae5d47c344b86f69f6d2fc369dd7aa8ad7fcaa40d1937320e7e4f5923a03a39459b7bb247c0
-
Filesize
13KB
MD506358818f111a1c8e1b76d60a650c997
SHA15bbaf40aeb932766346631df25d887264aad7ac2
SHA256b5438682a4c6bf57dcaad2835a9a293f712284fbe1af4ba6059011396cdbd180
SHA512f954b4e56e3ace2c8e0961149cb5bd433f35530bc1c5e38ec5d2223ec3591df0998903b3928668c5d8c05f16eaa1c2adf41fc999690c42dafa794800fc4b193e
-
Filesize
14KB
MD56adf70fd22d5ca90269466e5fc2aca2b
SHA11d4cdf2b08154b33738c5244a8886284c71693b9
SHA2562f9dfa9de351bfe553dde60ae891e9b54a2e08546d723c7165234fd41c3ceed4
SHA512efbd7133e5b5ef035f5a09d92b3b12d3ad367d6c35856a842536102d36a1ef53afe62ea3c3a5a4ae641bb28b6caaed18afa3519a637aa36f71f71979d4f61239
-
Filesize
10KB
MD564f6350fc1145db6337a9e3dfb83222f
SHA1fea799c3f2a655d5104a46b788d98ea272557ae5
SHA256821a86630238beaf4e303196ce26a250ef873f7a98b92644566b3c7d683d400e
SHA51258f90099630b98a632db38d7cc4a2f44c70bb012f55b3b5a69dffc3a76f6a2b30ab81d678b95e807c135b96633a0d8ed83428924a1c9d1dfdb7f2a3962a44d31
-
Filesize
12KB
MD5670c2baf75e559b89435283298f75bef
SHA1be1e5a0711c6c0bb1e2aef4ed18a15ed5759b027
SHA256236650fc42b347b9caa5e3a84a13da9e40586d97762f87730c9016dcb81abf06
SHA51252554fe5308f7b758b66b48262aae1c180191358e15fdd85b7d5ef47a35677e079c3ef6a54e63d1520038bbfc79bad5b2534b1c2808217ffb53c55b7e8862fdb
-
Filesize
13KB
MD59098b9c8340047c6434825e18826cc18
SHA185dde191f6549aca0813d8a723d39b83c61002db
SHA256825039711c334e169432a482f8b71ae735d7a1bd56552e501f6f3eca87cf272e
SHA512defc6852291b568793a48124184342272f4bc424f88de82a35335d5596dfacc93a52afc33c43337e4ceb800c5bd998493a7ba7f52c02a6027a4434d7e608fcae
-
Filesize
17KB
MD5d2ef20fe88c483dc2588c03876058afd
SHA186a7a9e71df94fec73dd90a9a4cf5b7901ce622d
SHA2566cc9cfa3c9739b545808e814a661b5b54e9127b057ce503024e515648b7a4a33
SHA512d1ea9f01ea1a16b23b6219492b3d2a27b017ea8d5511549c82fe3a58da988b890e52d144630c55fd845b8d079c4b6d3fd2172020cecc5f6dd6a05b1495d18c71
-
Filesize
21KB
MD5363b8e9f9a119ee0a52d8e75083f3f5d
SHA1e0f4316f5afd2abc31047b50fdd7910d148a7611
SHA2561b36afc5b2f6f46d1a2457d56f276f5b5ffed066955acec911b9b7973d1e92b3
SHA5123862436b88dae084993772d6ebdd3c7a892a562045ce448bc6419c7c21c797c806ef6030157c8daf2e85a36b13ed0ce4475eb00e61ee0cbec4db2677e780f177
-
Filesize
32KB
MD5e090f1e75f20b893c28df77017fa2443
SHA1464185bc218e3ee0af434279203ecd6eb2893078
SHA256c9539856c55f64851a5a9c7d5f7cd224751d746289ed44894847d5022ec6fece
SHA512b220c51a0be25866b0d0b97f2afab3cb6e338e21202c3eaa134bb356669c5e654840633de60a350e8f880031faeb582391a42ab1609a8d69dfe95020e9866084
-
Filesize
10KB
MD5db1f79a96a1390028df325dd183ff9f1
SHA18373b6c44fdbece2c1ee5327a2bb5e5b0a719ed4
SHA2566429928799a5eea9e090224a2d7083b469892d725a28ea9dcc2a95f94286b0da
SHA512dad71f250340e529883e3347e90e66a445641f019351e745940c6700145c6c923a9d5575efaf42436823bd8f1db44e9b00c99eb1cc41dc49425ea9db9847590e
-
Filesize
94KB
MD518049f6811fc0f94547189a9e104f5d2
SHA1dc127fa1ff0aab71abd76b89fc4b849ad3cf43a6
SHA256c865c3366a98431ec3a5959cb5ac3966081a43b82dfcd8bfefafe0146b1508db
SHA51238fa01debdb8c5369b3be45b1384434acb09a6afe75a50a31b3f0babb7bc0550261a5376dd7e5beac74234ec1722967a33fc55335b1809c0b64db42f7e56cdf7
-
Filesize
84KB
MD5a991152fd5b8f2a0eb6c34582adf7111
SHA13589342abea22438e28aa0a0a86e2e96e08421a1
SHA2567301fc2447e7e6d599472d2c52116fbe318a9ff9259b8a85981c419bfd20e3ef
SHA512f039ac9473201d27882c0c11e5628a10bdbe5b4c9b78ead246fd53f09d25e74c984e9891fccbc27c63edc8846d5e70f765ca7b77847a45416675d2e7c04964fc
-
Filesize
179KB
MD551740b093592af2fbeb5d675af5edc73
SHA15918e99a8c64c5abb915e7a998136ab514b828f3
SHA25683ed202214d28d14125fdb760b7c6439f79c59c02bb3a39e7812f8d622c97ada
SHA512877028a87653e4f46434f874018b400439456c9255da7d5e8919579a0bd2dcdc11974710089a671b9d7aa651ddf670ccaacab7612ce23876b44f13c73e4866f7
-
Filesize
124KB
MD57322f8245b5c8551d67c337c0dc247c9
SHA15f4cb918133daa86631211ae7fa65f26c23fcc98
SHA2564fcf4c9c98b75a07a7779c52e1f7dff715ae8a2f8a34574e9dac66243fb86763
SHA51252748b59ce5d488d2a4438548963eb0f2808447c563916e2917d08e5f4aab275e4769c02b63012b3d2606fdb5a8baa9eb5942ba5c5e11b7678f5f4187b82b0c2
-
Filesize
64KB
MD588e2bf0a590791891fb5125ffcf5a318
SHA139f96abbabf3fdd46844ba5190d2043fb8388696
SHA256e7aecb61a54dcc77b6d9cafe9a51fd1f8d78b2194cc3baf6304bbd1edfd0aee6
SHA5127d91d2fa95bb0ffe92730679b9a82e13a3a6b9906b2c7f69bc9065f636a20be65e1d6e7a557bfd6e4b80edd0f00db92eb7fea06345c2c9b98176c65d18c4bdbf
-
Filesize
159KB
MD5cdd13b537dad6a910cb9cbb932770dc9
SHA1b37706590d5b6f18c042119d616df6ff8ce3ad46
SHA256638cd8c336f90629a6260e67827833143939497d542838846f4fc94b2475bb3e
SHA512c375fb6914cda3ae7829d016d3084f3b5b9f78f200a62f076ec1646576f87694eec7fa6f1c99cbe30824f2fe6e2d61ecdeb50061383b12143cd2678004703199
-
Filesize
28KB
MD5f19d9a56df14aea465e7ead84751ea5f
SHA1f170ccbeb8fb4a1e0fe56f9a7c20ae4c1a48e4a9
SHA25617ccd37dfba38bba706189d12ed28ca32c7330cc60db7bf203bf7198287073e4
SHA5122b69a11026bf4fe3792082d57eaf3b24713e7bd44dfd61ccaa6e5adb6771e49b6c81c1b542fbb159c9055db9739b9c4473a856914c72683a2a4cf658d6d7a469
-
Filesize
78KB
MD5478abd499eefeba3e50cfc4ff50ec49d
SHA1fe1aae16b411a9c349b0ac1e490236d4d55b95b2
SHA256fdb14859efee35e105f21a64f7afdf50c399ffa0fa8b7fcc76dae4b345d946cb
SHA512475b8d533599991b4b8bfd27464b379d78e51c41f497e81698b4e7e871f82b5f6b2bfec70ec2c0a1a8842611c8c2591133eaef3f7fc4bc7625e18fc4189c914e
-
Filesize
151KB
MD5cf7886b3ac590d2ea1a6efe4ee47dc20
SHA18157a0c614360162588f698a2b0a4efe321ea427
SHA2563d183c1b3a24d634387cce3835f58b8e1322bf96ab03f9fe9f02658fb17d1f8c
SHA512b171f7d683621fdab5989bfed20c3f6479037035f334ea9a19feb1184f46976095a7666170a06f1258c6ddf2c1f8bdb4e31cbfd33d3b8fa4b330f097d1c09d81
-
Filesize
763KB
MD5c6b38adf85add9f9a7ea0b67eea508b4
SHA123a398ffdae6047d9777919f7b6200dd2a132887
SHA25677479f65578cf9710981255a3ad5495d45f8367b2f43c2f0680fce0fed0e90fb
SHA512d6abc793a7b6cc6138b50305a8c1cad10fa1628ca01a2284d82222db9bd1569959b05bdf4581d433ff227438131e43eec98bf265e746b17e76b1c9e9e21d447d
-
Filesize
13KB
MD54054e5a3334d18ef458076ca479ece5a
SHA1c4613d2432e6f1d27017d4430a163dd11b72c950
SHA256f9cf98f1102ace4c2faa261887ad1726000f7f70871f0b932408cf527a7c23f3
SHA512715559a5d892f4b850b66aab8589c5b5a0d1ebb1f5d12aff4fb0079dd726c7a5b8cecbc47d73a015947b39284317d27c12642b177d629c0c44ca376634e8b075
-
Filesize
3.2MB
MD589511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
674KB
MD550bcfb04328fec1a22c31c0e39286470
SHA13a1b78faf34125c7b8d684419fa715c367db3daa
SHA256fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9
SHA512370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685
-
Filesize
188KB
MD5498c8acaf06860fe29ecc27dd0901f89
SHA1cebd6c886fca3c915d3a21382ea1c11a86738a3e
SHA256e338df1432d8e23c0399f48fa2019fbaa3051fae6e7d214c731a0b8de7d0388e
SHA512b84ea694feb4f5d13d53dd928603e744b29bc611357ac9350b460bd9f8876f3f0489d289ab2cf53e86dc497e98ebf60cfe4fbe08a5e3320505a191d23de035ee
-
Filesize
58KB
MD5ea3cd6ac4992ce465ee33dd168a9aad1
SHA1158d9f8935c2bd20c90175164e6ca861a1dfeedb
SHA256201f32a2492b18956969dc0417e2ef0ff14fdbf57fb07d77864ed36286170710
SHA512ebae7c4d134a2db79938c219fa0156b32ec2b9a57a92877e9283ce19d36b40bf7048ca4d9743e1a1d811f6cb1c7339a6dd53c48df81838e5c962be39bf6d5d3b
-
Filesize
4.3MB
MD51d5e4c20a20740f38f061bdf48aaca4f
SHA1de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0
SHA256f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366
SHA5129df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397
-
Filesize
543KB
MD526ebff360b70ca5de0a81fccbae0b02c
SHA12415d8c46eb188648225f55a26bd19a9fb225749
SHA2564077005b6ae8272d82892d183cbc972780e3aa80f848c447626761a6c244d3a3
SHA51209645c61421f245df7a2f62683bc90b5e3d51607b5dd9b1e7af9d54d93bccad132d6ff8aa4ba7d083da443f2b6220302178f9a120fecce661876cbab6d90a3df
-
Filesize
139KB
MD5d658ffb571a541e9e21a6b859a67e112
SHA1d9e7f54eb92ce32ff4d02fedd5c9b738dabbfbdb
SHA2560cc26e2acaa1933647f885b47ac6da6625be7a4cd93fae220fb172906ff22091
SHA5120040b19841d2d19ab5506cefc3186813cc92f57144b7b3f0bfec45638eebc053ddb8a40f2843cafe5d0ae5c6dc7f5db646a6441d34e02d749eb9563edbe5c7b9
-
Filesize
28KB
MD5fed3dae56f7c9ea35d2e896fede29581
SHA1ae5b2ef114138c4d8a6479d6441967c170c5aa23
SHA256d56542143775d02c70ad713ac36f295d473329ef3ad7a2999811d12151512931
SHA5123128c57724b0609cfcaca430568d79b0e6abd13e5bba25295493191532dba24af062d4e0340d0ed68a885c24fbbf36b7a3d650add2f47f7c2364eab6a0b5faff
-
Filesize
1.1MB
MD5cd12c15c6eef60d9ea058cd4092e5d1b
SHA157a7c0b0468f0be8e824561b45f86e0aa0db28dd
SHA256e3ab6e5749a64e04ee8547f71748303ba159dd68dfc402cb69356f35e645badd
SHA512514e76174f977cc73300bc40ff170007a444e743a39947d5e2f76e60b2a149c16d57b42b6a82a7fea8dd4e9addb3e876d8ab50ea1898ee896c1907667277cf00
-
Filesize
131KB
MD58ccfec535f312418015bcd067fe32208
SHA179aa4bc6d681972afadfa4b2bae230ce06570a56
SHA2569157829433f0bd8a12b1a1cf2fb90301e20ecf43802eb0ac85525ebcc53d0e30
SHA512698b3a57338ffa47e2afecf9e8f8f709061e5cb56d82d8e10e48c6d4c8d26d2e0a21f2dcedc599a1b605ee2026dc2af7bd79d9f8b035c5c6fd9bd9fc817673b8
-
Filesize
223KB
MD56b671bc3676e868789caca8671f4f963
SHA10f464c7dcca0f3d6590286a9c240ea369e155e8c
SHA25623074dc90395366a8e9653d1b7ee32f61ed8b4c95bbafed2a25d6f2e17a550ce
SHA51269b42d227d53f789126c5e61d4d3140b3f7b3d8ba13116f266dd01da4e5f9b0bbe942973c98c85edac390cde4f7b9b3be349ef4401ff93fe2979bf5f3d237ee5
-
Filesize
12KB
MD5ff9b1e03922361e0a8be65e5e1421aac
SHA1d4d674fb4e0214903e341e98613328d51aff9054
SHA2562a5ab7f23554f497693ca81a5e5f21647b10fd8b9e00b8377d8385dc15a9c4df
SHA5128cbbbbdc9a3d9e866dc88a655a75317f58cb4a49cb262975ff8c4ae5d47c344b86f69f6d2fc369dd7aa8ad7fcaa40d1937320e7e4f5923a03a39459b7bb247c0
-
Filesize
13KB
MD506358818f111a1c8e1b76d60a650c997
SHA15bbaf40aeb932766346631df25d887264aad7ac2
SHA256b5438682a4c6bf57dcaad2835a9a293f712284fbe1af4ba6059011396cdbd180
SHA512f954b4e56e3ace2c8e0961149cb5bd433f35530bc1c5e38ec5d2223ec3591df0998903b3928668c5d8c05f16eaa1c2adf41fc999690c42dafa794800fc4b193e
-
Filesize
14KB
MD56adf70fd22d5ca90269466e5fc2aca2b
SHA11d4cdf2b08154b33738c5244a8886284c71693b9
SHA2562f9dfa9de351bfe553dde60ae891e9b54a2e08546d723c7165234fd41c3ceed4
SHA512efbd7133e5b5ef035f5a09d92b3b12d3ad367d6c35856a842536102d36a1ef53afe62ea3c3a5a4ae641bb28b6caaed18afa3519a637aa36f71f71979d4f61239
-
Filesize
10KB
MD564f6350fc1145db6337a9e3dfb83222f
SHA1fea799c3f2a655d5104a46b788d98ea272557ae5
SHA256821a86630238beaf4e303196ce26a250ef873f7a98b92644566b3c7d683d400e
SHA51258f90099630b98a632db38d7cc4a2f44c70bb012f55b3b5a69dffc3a76f6a2b30ab81d678b95e807c135b96633a0d8ed83428924a1c9d1dfdb7f2a3962a44d31
-
Filesize
12KB
MD5670c2baf75e559b89435283298f75bef
SHA1be1e5a0711c6c0bb1e2aef4ed18a15ed5759b027
SHA256236650fc42b347b9caa5e3a84a13da9e40586d97762f87730c9016dcb81abf06
SHA51252554fe5308f7b758b66b48262aae1c180191358e15fdd85b7d5ef47a35677e079c3ef6a54e63d1520038bbfc79bad5b2534b1c2808217ffb53c55b7e8862fdb
-
Filesize
13KB
MD59098b9c8340047c6434825e18826cc18
SHA185dde191f6549aca0813d8a723d39b83c61002db
SHA256825039711c334e169432a482f8b71ae735d7a1bd56552e501f6f3eca87cf272e
SHA512defc6852291b568793a48124184342272f4bc424f88de82a35335d5596dfacc93a52afc33c43337e4ceb800c5bd998493a7ba7f52c02a6027a4434d7e608fcae
-
Filesize
17KB
MD5d2ef20fe88c483dc2588c03876058afd
SHA186a7a9e71df94fec73dd90a9a4cf5b7901ce622d
SHA2566cc9cfa3c9739b545808e814a661b5b54e9127b057ce503024e515648b7a4a33
SHA512d1ea9f01ea1a16b23b6219492b3d2a27b017ea8d5511549c82fe3a58da988b890e52d144630c55fd845b8d079c4b6d3fd2172020cecc5f6dd6a05b1495d18c71
-
Filesize
32KB
MD5e090f1e75f20b893c28df77017fa2443
SHA1464185bc218e3ee0af434279203ecd6eb2893078
SHA256c9539856c55f64851a5a9c7d5f7cd224751d746289ed44894847d5022ec6fece
SHA512b220c51a0be25866b0d0b97f2afab3cb6e338e21202c3eaa134bb356669c5e654840633de60a350e8f880031faeb582391a42ab1609a8d69dfe95020e9866084
-
Filesize
10KB
MD5db1f79a96a1390028df325dd183ff9f1
SHA18373b6c44fdbece2c1ee5327a2bb5e5b0a719ed4
SHA2566429928799a5eea9e090224a2d7083b469892d725a28ea9dcc2a95f94286b0da
SHA512dad71f250340e529883e3347e90e66a445641f019351e745940c6700145c6c923a9d5575efaf42436823bd8f1db44e9b00c99eb1cc41dc49425ea9db9847590e
-
Filesize
94KB
MD518049f6811fc0f94547189a9e104f5d2
SHA1dc127fa1ff0aab71abd76b89fc4b849ad3cf43a6
SHA256c865c3366a98431ec3a5959cb5ac3966081a43b82dfcd8bfefafe0146b1508db
SHA51238fa01debdb8c5369b3be45b1384434acb09a6afe75a50a31b3f0babb7bc0550261a5376dd7e5beac74234ec1722967a33fc55335b1809c0b64db42f7e56cdf7
-
Filesize
84KB
MD5a991152fd5b8f2a0eb6c34582adf7111
SHA13589342abea22438e28aa0a0a86e2e96e08421a1
SHA2567301fc2447e7e6d599472d2c52116fbe318a9ff9259b8a85981c419bfd20e3ef
SHA512f039ac9473201d27882c0c11e5628a10bdbe5b4c9b78ead246fd53f09d25e74c984e9891fccbc27c63edc8846d5e70f765ca7b77847a45416675d2e7c04964fc
-
Filesize
179KB
MD551740b093592af2fbeb5d675af5edc73
SHA15918e99a8c64c5abb915e7a998136ab514b828f3
SHA25683ed202214d28d14125fdb760b7c6439f79c59c02bb3a39e7812f8d622c97ada
SHA512877028a87653e4f46434f874018b400439456c9255da7d5e8919579a0bd2dcdc11974710089a671b9d7aa651ddf670ccaacab7612ce23876b44f13c73e4866f7
-
Filesize
124KB
MD57322f8245b5c8551d67c337c0dc247c9
SHA15f4cb918133daa86631211ae7fa65f26c23fcc98
SHA2564fcf4c9c98b75a07a7779c52e1f7dff715ae8a2f8a34574e9dac66243fb86763
SHA51252748b59ce5d488d2a4438548963eb0f2808447c563916e2917d08e5f4aab275e4769c02b63012b3d2606fdb5a8baa9eb5942ba5c5e11b7678f5f4187b82b0c2
-
Filesize
64KB
MD588e2bf0a590791891fb5125ffcf5a318
SHA139f96abbabf3fdd46844ba5190d2043fb8388696
SHA256e7aecb61a54dcc77b6d9cafe9a51fd1f8d78b2194cc3baf6304bbd1edfd0aee6
SHA5127d91d2fa95bb0ffe92730679b9a82e13a3a6b9906b2c7f69bc9065f636a20be65e1d6e7a557bfd6e4b80edd0f00db92eb7fea06345c2c9b98176c65d18c4bdbf
-
Filesize
159KB
MD5cdd13b537dad6a910cb9cbb932770dc9
SHA1b37706590d5b6f18c042119d616df6ff8ce3ad46
SHA256638cd8c336f90629a6260e67827833143939497d542838846f4fc94b2475bb3e
SHA512c375fb6914cda3ae7829d016d3084f3b5b9f78f200a62f076ec1646576f87694eec7fa6f1c99cbe30824f2fe6e2d61ecdeb50061383b12143cd2678004703199
-
Filesize
28KB
MD5f19d9a56df14aea465e7ead84751ea5f
SHA1f170ccbeb8fb4a1e0fe56f9a7c20ae4c1a48e4a9
SHA25617ccd37dfba38bba706189d12ed28ca32c7330cc60db7bf203bf7198287073e4
SHA5122b69a11026bf4fe3792082d57eaf3b24713e7bd44dfd61ccaa6e5adb6771e49b6c81c1b542fbb159c9055db9739b9c4473a856914c72683a2a4cf658d6d7a469
-
Filesize
78KB
MD5478abd499eefeba3e50cfc4ff50ec49d
SHA1fe1aae16b411a9c349b0ac1e490236d4d55b95b2
SHA256fdb14859efee35e105f21a64f7afdf50c399ffa0fa8b7fcc76dae4b345d946cb
SHA512475b8d533599991b4b8bfd27464b379d78e51c41f497e81698b4e7e871f82b5f6b2bfec70ec2c0a1a8842611c8c2591133eaef3f7fc4bc7625e18fc4189c914e
-
Filesize
151KB
MD5cf7886b3ac590d2ea1a6efe4ee47dc20
SHA18157a0c614360162588f698a2b0a4efe321ea427
SHA2563d183c1b3a24d634387cce3835f58b8e1322bf96ab03f9fe9f02658fb17d1f8c
SHA512b171f7d683621fdab5989bfed20c3f6479037035f334ea9a19feb1184f46976095a7666170a06f1258c6ddf2c1f8bdb4e31cbfd33d3b8fa4b330f097d1c09d81
-
Filesize
13KB
MD54054e5a3334d18ef458076ca479ece5a
SHA1c4613d2432e6f1d27017d4430a163dd11b72c950
SHA256f9cf98f1102ace4c2faa261887ad1726000f7f70871f0b932408cf527a7c23f3
SHA512715559a5d892f4b850b66aab8589c5b5a0d1ebb1f5d12aff4fb0079dd726c7a5b8cecbc47d73a015947b39284317d27c12642b177d629c0c44ca376634e8b075
-
Filesize
3.2MB
MD589511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
674KB
MD550bcfb04328fec1a22c31c0e39286470
SHA13a1b78faf34125c7b8d684419fa715c367db3daa
SHA256fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9
SHA512370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685
-
Filesize
188KB
MD5498c8acaf06860fe29ecc27dd0901f89
SHA1cebd6c886fca3c915d3a21382ea1c11a86738a3e
SHA256e338df1432d8e23c0399f48fa2019fbaa3051fae6e7d214c731a0b8de7d0388e
SHA512b84ea694feb4f5d13d53dd928603e744b29bc611357ac9350b460bd9f8876f3f0489d289ab2cf53e86dc497e98ebf60cfe4fbe08a5e3320505a191d23de035ee
-
Filesize
58KB
MD5ea3cd6ac4992ce465ee33dd168a9aad1
SHA1158d9f8935c2bd20c90175164e6ca861a1dfeedb
SHA256201f32a2492b18956969dc0417e2ef0ff14fdbf57fb07d77864ed36286170710
SHA512ebae7c4d134a2db79938c219fa0156b32ec2b9a57a92877e9283ce19d36b40bf7048ca4d9743e1a1d811f6cb1c7339a6dd53c48df81838e5c962be39bf6d5d3b
-
Filesize
4.3MB
MD51d5e4c20a20740f38f061bdf48aaca4f
SHA1de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0
SHA256f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366
SHA5129df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397
-
Filesize
543KB
MD526ebff360b70ca5de0a81fccbae0b02c
SHA12415d8c46eb188648225f55a26bd19a9fb225749
SHA2564077005b6ae8272d82892d183cbc972780e3aa80f848c447626761a6c244d3a3
SHA51209645c61421f245df7a2f62683bc90b5e3d51607b5dd9b1e7af9d54d93bccad132d6ff8aa4ba7d083da443f2b6220302178f9a120fecce661876cbab6d90a3df
-
Filesize
139KB
MD5d658ffb571a541e9e21a6b859a67e112
SHA1d9e7f54eb92ce32ff4d02fedd5c9b738dabbfbdb
SHA2560cc26e2acaa1933647f885b47ac6da6625be7a4cd93fae220fb172906ff22091
SHA5120040b19841d2d19ab5506cefc3186813cc92f57144b7b3f0bfec45638eebc053ddb8a40f2843cafe5d0ae5c6dc7f5db646a6441d34e02d749eb9563edbe5c7b9
-
Filesize
28KB
MD5fed3dae56f7c9ea35d2e896fede29581
SHA1ae5b2ef114138c4d8a6479d6441967c170c5aa23
SHA256d56542143775d02c70ad713ac36f295d473329ef3ad7a2999811d12151512931
SHA5123128c57724b0609cfcaca430568d79b0e6abd13e5bba25295493191532dba24af062d4e0340d0ed68a885c24fbbf36b7a3d650add2f47f7c2364eab6a0b5faff
-
Filesize
1.1MB
MD5cd12c15c6eef60d9ea058cd4092e5d1b
SHA157a7c0b0468f0be8e824561b45f86e0aa0db28dd
SHA256e3ab6e5749a64e04ee8547f71748303ba159dd68dfc402cb69356f35e645badd
SHA512514e76174f977cc73300bc40ff170007a444e743a39947d5e2f76e60b2a149c16d57b42b6a82a7fea8dd4e9addb3e876d8ab50ea1898ee896c1907667277cf00
-
Filesize
131KB
MD58ccfec535f312418015bcd067fe32208
SHA179aa4bc6d681972afadfa4b2bae230ce06570a56
SHA2569157829433f0bd8a12b1a1cf2fb90301e20ecf43802eb0ac85525ebcc53d0e30
SHA512698b3a57338ffa47e2afecf9e8f8f709061e5cb56d82d8e10e48c6d4c8d26d2e0a21f2dcedc599a1b605ee2026dc2af7bd79d9f8b035c5c6fd9bd9fc817673b8
-
Filesize
223KB
MD56b671bc3676e868789caca8671f4f963
SHA10f464c7dcca0f3d6590286a9c240ea369e155e8c
SHA25623074dc90395366a8e9653d1b7ee32f61ed8b4c95bbafed2a25d6f2e17a550ce
SHA51269b42d227d53f789126c5e61d4d3140b3f7b3d8ba13116f266dd01da4e5f9b0bbe942973c98c85edac390cde4f7b9b3be349ef4401ff93fe2979bf5f3d237ee5