Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 23:55 UTC
Static task
static1
Behavioral task
behavioral1
Sample
7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe
Resource
win10v2004-20220812-en
General
-
Target
7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe
-
Size
320KB
-
MD5
71ee19737698f120d243e30eb5ee65e0
-
SHA1
cc81357948e6513fdb87c3fd174f5dc4d08316be
-
SHA256
7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034
-
SHA512
44b365e026863225d04c9d9764b81683a7f219f1cf689efd11591c725af7e1c8e79b9cd015439493e4d080a4e2d9c9999c829fbbe6209ea11c2533b5a6cd771f
-
SSDEEP
6144:sTw4o1IV3puaibGKFHi0mofhaH05kipz016580bHFMWu86JQPDHDdx/QtqR:SmgvmzFHi0mo5aH0qMzd5807FKPJQPDV
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" gutbft.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" gutbft.exe -
Adds policy Run key to start application 2 TTPs 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\fqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zyibqpxvkxvyypgcg.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\gutbft = "iitnddmlbpostldafs.exe" gutbft.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\fqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iitnddmlbpostldafs.exe" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\gutbft = "givrjlwxpfgmpjdcjyce.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\gutbft = "sqzrfdkhvhegfvlg.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\fqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vymjcfrtmdfmqlggoejma.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\gutbft = "sqzrfdkhvhegfvlg.exe" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\gutbft = "tugbstddujjoqjcagux.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\fqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sqzrfdkhvhegfvlg.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\fqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\givrjlwxpfgmpjdcjyce.exe" gutbft.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\fqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\givrjlwxpfgmpjdcjyce.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\fqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tugbstddujjoqjcagux.exe" gutbft.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gutbft.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gutbft.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe -
Executes dropped EXE 2 IoCs
pid Process 240 gutbft.exe 1380 gutbft.exe -
Loads dropped DLL 4 IoCs
pid Process 1652 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe 1652 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe 1652 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe 1652 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe -
Adds Run key to start application 2 TTPs 63 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\iyzjpfet = "givrjlwxpfgmpjdcjyce.exe ." 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiirwlj = "tugbstddujjoqjcagux.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sknzhzarzf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\givrjlwxpfgmpjdcjyce.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sknzhzarzf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iitnddmlbpostldafs.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zqsdkbbry = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tugbstddujjoqjcagux.exe ." gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vignq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tugbstddujjoqjcagux.exe ." gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vignq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\givrjlwxpfgmpjdcjyce.exe ." gutbft.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\myvb = "tugbstddujjoqjcagux.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\myvb = "sqzrfdkhvhegfvlg.exe" gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vignq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tugbstddujjoqjcagux.exe ." 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vignq = "givrjlwxpfgmpjdcjyce.exe ." gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiirwlj = "vymjcfrtmdfmqlggoejma.exe" gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\iyzjpfet = "iitnddmlbpostldafs.exe ." gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zqsdkbbry = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iitnddmlbpostldafs.exe ." 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sknzhzarzf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zyibqpxvkxvyypgcg.exe" gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\myvb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zyibqpxvkxvyypgcg.exe" gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vignq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vymjcfrtmdfmqlggoejma.exe ." gutbft.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vignq = "vymjcfrtmdfmqlggoejma.exe ." 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\iyzjpfet = "vymjcfrtmdfmqlggoejma.exe ." gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sknzhzarzf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vymjcfrtmdfmqlggoejma.exe" gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\iyzjpfet = "givrjlwxpfgmpjdcjyce.exe ." gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\myvb = "iitnddmlbpostldafs.exe" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\myvb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vymjcfrtmdfmqlggoejma.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vignq = "zyibqpxvkxvyypgcg.exe ." gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiirwlj = "givrjlwxpfgmpjdcjyce.exe" gutbft.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vignq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sqzrfdkhvhegfvlg.exe ." gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\iyzjpfet = "tugbstddujjoqjcagux.exe ." gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\iyzjpfet = "tugbstddujjoqjcagux.exe ." gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\myvb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iitnddmlbpostldafs.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\myvb = "givrjlwxpfgmpjdcjyce.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\myvb = "vymjcfrtmdfmqlggoejma.exe" gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiirwlj = "sqzrfdkhvhegfvlg.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vignq = "zyibqpxvkxvyypgcg.exe ." gutbft.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\myvb = "iitnddmlbpostldafs.exe" gutbft.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce gutbft.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sknzhzarzf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\givrjlwxpfgmpjdcjyce.exe" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vignq = "sqzrfdkhvhegfvlg.exe ." gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiirwlj = "zyibqpxvkxvyypgcg.exe" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiirwlj = "tugbstddujjoqjcagux.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vignq = "iitnddmlbpostldafs.exe ." gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vignq = "vymjcfrtmdfmqlggoejma.exe ." gutbft.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run gutbft.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiirwlj = "zyibqpxvkxvyypgcg.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zqsdkbbry = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vymjcfrtmdfmqlggoejma.exe ." gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vignq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vymjcfrtmdfmqlggoejma.exe ." gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\myvb = "givrjlwxpfgmpjdcjyce.exe" gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\myvb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iitnddmlbpostldafs.exe" gutbft.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\myvb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sqzrfdkhvhegfvlg.exe" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zqsdkbbry = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vymjcfrtmdfmqlggoejma.exe ." gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vignq = "iitnddmlbpostldafs.exe ." gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sknzhzarzf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vymjcfrtmdfmqlggoejma.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\myvb = "zyibqpxvkxvyypgcg.exe" gutbft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\myvb = "iitnddmlbpostldafs.exe" gutbft.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run gutbft.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gutbft.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gutbft.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 www.showmyipaddress.com 5 whatismyipaddress.com 10 whatismyip.everdot.org -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\myvbdpkvxxiylptctsgspvxjep.rcs gutbft.exe File created C:\Windows\SysWOW64\myvbdpkvxxiylptctsgspvxjep.rcs gutbft.exe File opened for modification C:\Windows\SysWOW64\nksjwtzvitpqodsmoyxuctgdjfsdzayncwyih.mdq gutbft.exe File created C:\Windows\SysWOW64\nksjwtzvitpqodsmoyxuctgdjfsdzayncwyih.mdq gutbft.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\myvbdpkvxxiylptctsgspvxjep.rcs gutbft.exe File created C:\Program Files (x86)\myvbdpkvxxiylptctsgspvxjep.rcs gutbft.exe File opened for modification C:\Program Files (x86)\nksjwtzvitpqodsmoyxuctgdjfsdzayncwyih.mdq gutbft.exe File created C:\Program Files (x86)\nksjwtzvitpqodsmoyxuctgdjfsdzayncwyih.mdq gutbft.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\nksjwtzvitpqodsmoyxuctgdjfsdzayncwyih.mdq gutbft.exe File opened for modification C:\Windows\myvbdpkvxxiylptctsgspvxjep.rcs gutbft.exe File created C:\Windows\myvbdpkvxxiylptctsgspvxjep.rcs gutbft.exe File opened for modification C:\Windows\nksjwtzvitpqodsmoyxuctgdjfsdzayncwyih.mdq gutbft.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 240 gutbft.exe 240 gutbft.exe 240 gutbft.exe 240 gutbft.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 240 gutbft.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1652 wrote to memory of 240 1652 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe 28 PID 1652 wrote to memory of 240 1652 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe 28 PID 1652 wrote to memory of 240 1652 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe 28 PID 1652 wrote to memory of 240 1652 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe 28 PID 1652 wrote to memory of 1380 1652 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe 29 PID 1652 wrote to memory of 1380 1652 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe 29 PID 1652 wrote to memory of 1380 1652 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe 29 PID 1652 wrote to memory of 1380 1652 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe 29 -
System policy modification 1 TTPs 39 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" gutbft.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gutbft.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" gutbft.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" gutbft.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" 7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" gutbft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" gutbft.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe"C:\Users\Admin\AppData\Local\Temp\7954b7f018f5d3ff852e1bd390d41477adacadb4d2d2a13ff45cf3b31ede5034.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\gutbft.exe"C:\Users\Admin\AppData\Local\Temp\gutbft.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:240
-
-
C:\Users\Admin\AppData\Local\Temp\gutbft.exe"C:\Users\Admin\AppData\Local\Temp\gutbft.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- System policy modification
PID:1380
-
Network
-
Remote address:8.8.8.8:53Requestwww.showmyipaddress.comIN AResponsewww.showmyipaddress.comIN A188.114.97.0www.showmyipaddress.comIN A188.114.96.0
-
Remote address:188.114.97.0:80RequestGET / HTTP/1.1
Host: www.showmyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 03:23:53 GMT
Location: https://www.showmyipaddress.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Gvbn%2F86fvQz2DnjxKVO6ULZ3CzH%2Ftr5uWv%2FEdFTo6wIjRdLpMTuwyts2HxNuCcL8fi9sx0kL%2F6dvIcSGnKS3T%2F%2FnUmuVkvAWKlZKGMdQX3NFr5AKo0NIxX93hwxzUwTbXhlQDDIADMxbSA%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 7539fa880882b8e5-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:8.8.8.8:53Requestwhatismyipaddress.comIN AResponsewhatismyipaddress.comIN A104.16.154.36whatismyipaddress.comIN A104.16.155.36
-
Remote address:104.16.154.36:80RequestGET / HTTP/1.1
Host: whatismyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=UTF-8
Content-Length: 16
Connection: close
X-Frame-Options: SAMEORIGIN
Referrer-Policy: same-origin
Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Set-Cookie: __cf_bm=1TR8P7o684qhpsfk7aFcIClyYsi78grKsrZyFMk3eOE-1664677435-0-AXjK1HpvDVuq0H8cKAsFal/Dyplpa395O4jVh/B3Sib9dSx3FmMPRBpGok4sa7n/kwYvUGYZdpbbtMQKE9lE0NE=; path=/; expires=Sun, 02-Oct-22 02:53:55 GMT; domain=.whatismyipaddress.com; HttpOnly; SameSite=None
Server: cloudflare
CF-RAY: 7539fa93f8f7b987-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:8.8.8.8:53Requestwww.whatismyip.comIN AResponsewww.whatismyip.comIN A172.67.189.152www.whatismyip.comIN A104.21.89.158
-
Remote address:172.67.189.152:80RequestGET / HTTP/1.1
Host: www.whatismyip.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 03:23:57 GMT
Location: https://www.whatismyip.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=LHs0M3%2BBYYbFVOVL0JCpHbN2uRjGa2de4IA5jNog4Q018Eo6mNsuIO%2B8ep2a%2FM2AxBE5ZietSQJN8CeTJ3T0lE3cyk3KfrOUSo09AetMZbLxHm9%2BRFzqqEwYSLFVA2xEtPF05A%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Content-Type-Options: nosniff
Server: cloudflare
CF-RAY: 7539fa9feb96b7e2-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:104.16.154.36:80RequestGET / HTTP/1.1
Host: whatismyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=UTF-8
Content-Length: 16
Connection: close
X-Frame-Options: SAMEORIGIN
Referrer-Policy: same-origin
Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Set-Cookie: __cf_bm=Fj1vi5kBl7Y_DEO6ZoTaNwuM_U5di6RgnggtjRaOsQ8-1664677439-0-AfyW3KSup8yARZZvQB8m32u8w6JpE6CZpHlRt2ydqdk7ytSImZlhLS/retUklMTNs1NG7WXtxFW4v1k92GZ6s4M=; path=/; expires=Sun, 02-Oct-22 02:53:59 GMT; domain=.whatismyipaddress.com; HttpOnly; SameSite=None
Server: cloudflare
CF-RAY: 7539faab8e1ab7be-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:8.8.8.8:53Requestwhatismyip.everdot.orgIN AResponse
-
Remote address:172.67.189.152:80RequestGET / HTTP/1.1
Host: www.whatismyip.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 03:24:03 GMT
Location: https://www.whatismyip.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=N3Mgy7oeFDzkZNx7KW1TBXBIqVOCbZ5fIJHQanx6qve68mk4gWftBaIu3by%2FxkSeISYuJPG9v80%2FJXao52YpnoROiyuO3TFvBITUFO3rsTiOlsKOW0O%2FS2tumxpu%2FZLNhXPf5g%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Content-Type-Options: nosniff
Server: cloudflare
CF-RAY: 7539fac2c887b8dc-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:104.16.154.36:80RequestGET / HTTP/1.1
Host: whatismyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=UTF-8
Content-Length: 16
Connection: close
X-Frame-Options: SAMEORIGIN
Referrer-Policy: same-origin
Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Set-Cookie: __cf_bm=PT9H5bndVjqOo66F8IDW5K7PoFNaaT8UNbkXFAc1BeQ-1664677444-0-AcDpT94xmHqs1Aj+lAec+b3znuPwaK4V/AUtTnSISx8biIrmEcNqQ07xULgVstyFav5mCICRjMUrhDq5NRpzxWE=; path=/; expires=Sun, 02-Oct-22 02:54:04 GMT; domain=.whatismyipaddress.com; HttpOnly; SameSite=None
Server: cloudflare
CF-RAY: 7539face7dcdb8e8-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:188.114.97.0:80RequestGET / HTTP/1.1
Host: www.showmyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 03:24:06 GMT
Location: https://www.showmyipaddress.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=TEMtihLS5%2BmfQk1WHm%2F21AT9qcaJXT2lYA6tUGYGsWEpG9h4vJ5%2B0%2BHrFuFhPFpOLWSXH4N%2BrVe1GAlYDpabAu2zbyf3ddr0CLDcJeiWqE8tU24TyNHjT779%2FeiPXYBuiK0sneDXFNTdDw%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 7539fada282bb734-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:8.8.8.8:53Requestwww.whatismyip.caIN AResponse
-
Remote address:188.114.97.0:80RequestGET / HTTP/1.1
Host: www.showmyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 03:24:10 GMT
Location: https://www.showmyipaddress.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=%2B9amZVIFZb0BNjVK0hMVmWnmFTXtNMuPWm7i%2FucwabmXYhcO8XGyNXjZAhclLa8AwGAbtxR%2FQTHeuT4uV2IGn4zSnr7FY4PUazir7N4N0iUp7Kmr1wC8OAPgrhE1HgxN5RMr2pOqfXJw8w%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 7539faf16d6fb76a-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:188.114.97.0:80RequestGET / HTTP/1.1
Host: www.showmyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 03:24:12 GMT
Location: https://www.showmyipaddress.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=6bEAvdkXbF3C%2F5T%2FP91BZk6C%2B3mA6A3ptAML1gd9S8U1IdD9N1QyFF8SiVLTbhiOSegmnJqlWl0Y1DrV6fs1SdBHwl9Nb6LU8O0Hhvy%2Frw5ZRF26HdnASoYm%2BJymQvEQ%2BC4JlUs2KVfWwA%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 7539fafd197db70c-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:172.67.189.152:80RequestGET / HTTP/1.1
Host: www.whatismyip.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 03:24:14 GMT
Location: https://www.whatismyip.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=xCqg75EZBixd51RZaZRvolPD0ykyEk%2FHRR11Qx8V%2FYHPAhbGuncv%2Fu8RCZkd9pIUuc9DHbhq2gUX7dYb26FuMLErZLWawwJNCXM%2FtwkYvybf%2F2TagBOb4KWEGcOksCWzpmG2eQ%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Content-Type-Options: nosniff
Server: cloudflare
CF-RAY: 7539fb08dbd941da-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:104.16.154.36:80RequestGET / HTTP/1.1
Host: whatismyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=UTF-8
Content-Length: 16
Connection: close
X-Frame-Options: SAMEORIGIN
Referrer-Policy: same-origin
Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Set-Cookie: __cf_bm=JMyB49PnofOjCMSNu31ALjLRYZl6kf4IuwsD3fssWoM-1664677457-0-Ad9ppJ8x/MndV/kWCfpiSlONCe7X7q1o6qkxaCKMtkh5v82i96cR3bat+bwOUuO39d1wHedSC1qEsKmR5TlRTck=; path=/; expires=Sun, 02-Oct-22 02:54:17 GMT; domain=.whatismyipaddress.com; HttpOnly; SameSite=None
Server: cloudflare
CF-RAY: 7539fb1f9db9b748-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:172.67.189.152:80RequestGET / HTTP/1.1
Host: www.whatismyip.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 03:24:19 GMT
Location: https://www.whatismyip.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=g1YdboY79xKgbpkZvmcWz8Y8FwYqJ0yq5vMY3FX1sehyLI0Cl1u%2FKS1xyF0glIAA1%2BsfdFoH0lDszHq6ljXORL%2BUdzsl4FH9IsHynh6%2Bh2%2ByxFhVYDxb99e9lKPWb7g77Kbvzg%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Content-Type-Options: nosniff
Server: cloudflare
CF-RAY: 7539fb2b3ce2b932-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:172.67.189.152:80RequestGET / HTTP/1.1
Host: www.whatismyip.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 03:24:21 GMT
Location: https://www.whatismyip.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=I5LWvJyd0%2BzZa34LIkCuu750lF%2BvtBVEd0s7UJpBF%2FfMr4h5T%2FjNhr8VoUzTpOo9i65639GQIyxdhu9mQW4SjYQiR%2BXjd6uAQ19PwqXwHIFbMYHdak4RdP7%2BVRxfDNMusWjRFQ%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Content-Type-Options: nosniff
Server: cloudflare
CF-RAY: 7539fb36db28b7f1-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:188.114.97.0:80RequestGET / HTTP/1.1
Host: www.showmyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 03:24:23 GMT
Location: https://www.showmyipaddress.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=a7IKAYYm0%2FbKUIcLELjkOcAtCJVqYinp9nq1SwnIf7tilm4juzQAybLTjkoS%2FzVk1TU3GoEYcNvuxbzroPsV10CkseNDMJAX1K9zI7Y0jKT8Ntk1GtUaZVNM%2BKwzlQ649uHTcv0cfeR8Hw%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 7539fb429c05b969-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:104.16.154.36:80RequestGET / HTTP/1.1
Host: whatismyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=UTF-8
Content-Length: 16
Connection: close
X-Frame-Options: SAMEORIGIN
Referrer-Policy: same-origin
Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Set-Cookie: __cf_bm=.SPLRUJgNYpjQ8_KkL3DUd3trtNtj6nDAA8zhBOkeRQ-1664677467-0-AX9j495aeZ7+VBURidd5fEFyoqwx+hLqRnozll82wHHoAiTZ7aalbtMHv+xgHgXjK6ra8N8KGorspMYxpxnemGE=; path=/; expires=Sun, 02-Oct-22 02:54:27 GMT; domain=.whatismyipaddress.com; HttpOnly; SameSite=None
Server: cloudflare
CF-RAY: 7539fb59680cb921-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:172.67.189.152:80RequestGET / HTTP/1.1
Host: www.whatismyip.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 03:24:28 GMT
Location: https://www.whatismyip.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=I%2FKWiFTDQFt3eEXekhWgpeo0hqcTeQydKZD%2F6StjbtJZzxyTnM0XMBJVmR2TW%2Fwsplw8y0eY1%2FN%2B2nwc1iNlpJtWCFbu1ESkSXaadSHSAeU142xUN9Q53uZoCVIc0%2FJ5Ettz8Q%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Content-Type-Options: nosniff
Server: cloudflare
CF-RAY: 7539fb65287cb90f-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:8.8.8.8:53Requestwww.imdb.comIN AResponsewww.imdb.comIN CNAMEtp.391b988c0-frontier.imdb.comtp.391b988c0-frontier.imdb.comIN CNAMEd2bytcopxu066p.cloudfront.netd2bytcopxu066p.cloudfront.netIN A65.9.80.206
-
Remote address:65.9.80.206:80RequestGET / HTTP/1.1
Host: www.imdb.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Date: Sun, 02 Oct 2022 02:24:32 GMT
Content-Type: text/html
Content-Length: 167
Connection: close
Location: https://www.imdb.com/
X-Cache: Redirect from cloudfront
Via: 1.1 2bf8812c27f5e451eba4aef5c1aff6ae.cloudfront.net (CloudFront)
X-Amz-Cf-Pop: AMS1-C1
Alt-Svc: h3=":443"; ma=86400
X-Amz-Cf-Id: WsubBo8il-m-Z9kz8qsGZJ67cDaK88gbPaXXh8RYeGeFDWWWX61aSg==
-
Remote address:8.8.8.8:53Requestzhniyd.infoIN AResponsezhniyd.infoIN A167.99.35.88
-
Remote address:167.99.35.88:80RequestGET / HTTP/1.1
Host: zhniyd.info
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 204 No Content
Date: Sun, 02 Oct 2022 02:24:32 GMT
Connection: close
X-Sinkhole: Malware
-
Remote address:8.8.8.8:53Requestuuslfiqz.infoIN AResponse
-
Remote address:8.8.8.8:53Requestdwscdkekw.netIN AResponsedwscdkekw.netIN A72.251.233.245
-
Remote address:72.251.233.245:80RequestGET / HTTP/1.1
Host: dwscdkekw.net
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 200 OK
Date: Sun, 02 Oct 2022 02:24:37 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Set-Cookie: btst=140f0fc19014dc27ecee347ae0073864|154.61.71.50|1664677477|1664677477|0|1|0; path=/; domain=.dwscdkekw.net; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
Set-Cookie: snkz=154.61.71.50; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
-
Remote address:8.8.8.8:53Requesthsswllivwr.netIN AResponse
-
Remote address:8.8.8.8:53Requestcmkeoo.comIN AResponsecmkeoo.comIN A173.231.189.15
-
Remote address:173.231.189.15:80RequestGET / HTTP/1.1
Host: cmkeoo.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 200 OK
Date: Sun, 02 Oct 2022 02:24:43 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Set-Cookie: btst=061ff6a4e02b11a5c6e616835c8d6674|154.61.71.50|1664677483|1664677483|0|1|0; path=/; domain=.cmkeoo.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
Set-Cookie: snkz=154.61.71.50; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
-
Remote address:8.8.8.8:53Requestvppkmfwptq.netIN AResponse
-
Remote address:8.8.8.8:53Requestfcenhk.infoIN AResponse
-
Remote address:8.8.8.8:53Requestaoyeuikawoyi.orgIN AResponse
-
Remote address:8.8.8.8:53Requestlphmgnvimw.infoIN AResponse
-
Remote address:8.8.8.8:53Requesttuhkdrkz.netIN AResponse
-
Remote address:8.8.8.8:53Requestbyrggkjz.netIN AResponse
-
Remote address:8.8.8.8:53Requestyqyukcee.comIN AResponse
-
Remote address:8.8.8.8:53Requestmczqvohyt.netIN AResponse
-
Remote address:8.8.8.8:53Requestlbhffn.netIN AResponse
-
Remote address:8.8.8.8:53Requestoakmkicm.orgIN AResponse
-
Remote address:8.8.8.8:53Requestesswqagcmm.orgIN AResponse
-
Remote address:8.8.8.8:53Requestbxuwamhalpb.netIN AResponse
-
Remote address:8.8.8.8:53Requestkxftipttnmrz.infoIN AResponse
-
Remote address:8.8.8.8:53Requestqdhpvcjurie.netIN AResponse
-
413 B 857 B 5 4
HTTP Request
GET http://www.showmyipaddress.com/HTTP Response
301 -
411 B 901 B 5 4
HTTP Request
GET http://whatismyipaddress.com/HTTP Response
403 -
408 B 873 B 5 4
HTTP Request
GET http://www.whatismyip.com/HTTP Response
301 -
365 B 861 B 4 3
HTTP Request
GET http://whatismyipaddress.com/HTTP Response
403 -
408 B 873 B 5 4
HTTP Request
GET http://www.whatismyip.com/HTTP Response
301 -
411 B 901 B 5 4
HTTP Request
GET http://whatismyipaddress.com/HTTP Response
403 -
367 B 817 B 4 3
HTTP Request
GET http://www.showmyipaddress.com/HTTP Response
301 -
413 B 851 B 5 4
HTTP Request
GET http://www.showmyipaddress.com/HTTP Response
301 -
413 B 857 B 5 4
HTTP Request
GET http://www.showmyipaddress.com/HTTP Response
301 -
408 B 875 B 5 4
HTTP Request
GET http://www.whatismyip.com/HTTP Response
301 -
411 B 901 B 5 4
HTTP Request
GET http://whatismyipaddress.com/HTTP Response
403 -
362 B 835 B 4 3
HTTP Request
GET http://www.whatismyip.com/HTTP Response
301 -
408 B 877 B 5 4
HTTP Request
GET http://www.whatismyip.com/HTTP Response
301 -
413 B 851 B 5 4
HTTP Request
GET http://www.showmyipaddress.com/HTTP Response
301 -
411 B 901 B 5 4
HTTP Request
GET http://whatismyipaddress.com/HTTP Response
403 -
408 B 877 B 5 4
HTTP Request
GET http://www.whatismyip.com/HTTP Response
301 -
402 B 758 B 5 4
HTTP Request
GET http://www.imdb.com/HTTP Response
301 -
401 B 331 B 5 5
HTTP Request
GET http://zhniyd.info/HTTP Response
204 -
403 B 621 B 5 5
HTTP Request
GET http://dwscdkekw.net/HTTP Response
200 -
400 B 618 B 5 5
HTTP Request
GET http://cmkeoo.com/HTTP Response
200
-
69 B 101 B 1 1
DNS Request
www.showmyipaddress.com
DNS Response
188.114.97.0188.114.96.0
-
67 B 99 B 1 1
DNS Request
whatismyipaddress.com
DNS Response
104.16.154.36104.16.155.36
-
64 B 96 B 1 1
DNS Request
www.whatismyip.com
DNS Response
172.67.189.152104.21.89.158
-
68 B 116 B 1 1
DNS Request
whatismyip.everdot.org
-
63 B 130 B 1 1
DNS Request
www.whatismyip.ca
-
58 B 153 B 1 1
DNS Request
www.imdb.com
DNS Response
65.9.80.206
-
57 B 73 B 1 1
DNS Request
zhniyd.info
DNS Response
167.99.35.88
-
59 B 138 B 1 1
DNS Request
uuslfiqz.info
-
59 B 75 B 1 1
DNS Request
dwscdkekw.net
DNS Response
72.251.233.245
-
60 B 133 B 1 1
DNS Request
hsswllivwr.net
-
56 B 72 B 1 1
DNS Request
cmkeoo.com
DNS Response
173.231.189.15
-
60 B 133 B 1 1
DNS Request
vppkmfwptq.net
-
57 B 136 B 1 1
DNS Request
fcenhk.info
-
62 B 144 B 1 1
DNS Request
aoyeuikawoyi.org
-
61 B 140 B 1 1
DNS Request
lphmgnvimw.info
-
58 B 131 B 1 1
DNS Request
tuhkdrkz.net
-
58 B 131 B 1 1
DNS Request
byrggkjz.net
-
58 B 131 B 1 1
DNS Request
yqyukcee.com
-
59 B 132 B 1 1
DNS Request
mczqvohyt.net
-
56 B 129 B 1 1
DNS Request
lbhffn.net
-
58 B 140 B 1 1
DNS Request
oakmkicm.org
-
60 B 142 B 1 1
DNS Request
esswqagcmm.org
-
61 B 134 B 1 1
DNS Request
bxuwamhalpb.net
-
63 B 142 B 1 1
DNS Request
kxftipttnmrz.info
-
61 B 134 B 1 1
DNS Request
qdhpvcjurie.net
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712KB
MD574ce3d4986eed31d94c20921a443bd11
SHA18eb03c80afb582d97283194e3a5b34d61f393de0
SHA256207662d4bbdc9ef1e12372284be43fe4b37697fd210a6831174010a869c185d5
SHA512fd6d32763b93f1e7893ccdf68d19193041c914dfc53305ea54e63817d3d419dcff81a61f5eeb7eee5a09e7aa4c86f6b35f6a3465f2a4c6a8fe7ecd118253ebe8
-
Filesize
712KB
MD574ce3d4986eed31d94c20921a443bd11
SHA18eb03c80afb582d97283194e3a5b34d61f393de0
SHA256207662d4bbdc9ef1e12372284be43fe4b37697fd210a6831174010a869c185d5
SHA512fd6d32763b93f1e7893ccdf68d19193041c914dfc53305ea54e63817d3d419dcff81a61f5eeb7eee5a09e7aa4c86f6b35f6a3465f2a4c6a8fe7ecd118253ebe8
-
Filesize
712KB
MD574ce3d4986eed31d94c20921a443bd11
SHA18eb03c80afb582d97283194e3a5b34d61f393de0
SHA256207662d4bbdc9ef1e12372284be43fe4b37697fd210a6831174010a869c185d5
SHA512fd6d32763b93f1e7893ccdf68d19193041c914dfc53305ea54e63817d3d419dcff81a61f5eeb7eee5a09e7aa4c86f6b35f6a3465f2a4c6a8fe7ecd118253ebe8
-
Filesize
712KB
MD574ce3d4986eed31d94c20921a443bd11
SHA18eb03c80afb582d97283194e3a5b34d61f393de0
SHA256207662d4bbdc9ef1e12372284be43fe4b37697fd210a6831174010a869c185d5
SHA512fd6d32763b93f1e7893ccdf68d19193041c914dfc53305ea54e63817d3d419dcff81a61f5eeb7eee5a09e7aa4c86f6b35f6a3465f2a4c6a8fe7ecd118253ebe8
-
Filesize
712KB
MD574ce3d4986eed31d94c20921a443bd11
SHA18eb03c80afb582d97283194e3a5b34d61f393de0
SHA256207662d4bbdc9ef1e12372284be43fe4b37697fd210a6831174010a869c185d5
SHA512fd6d32763b93f1e7893ccdf68d19193041c914dfc53305ea54e63817d3d419dcff81a61f5eeb7eee5a09e7aa4c86f6b35f6a3465f2a4c6a8fe7ecd118253ebe8
-
Filesize
712KB
MD574ce3d4986eed31d94c20921a443bd11
SHA18eb03c80afb582d97283194e3a5b34d61f393de0
SHA256207662d4bbdc9ef1e12372284be43fe4b37697fd210a6831174010a869c185d5
SHA512fd6d32763b93f1e7893ccdf68d19193041c914dfc53305ea54e63817d3d419dcff81a61f5eeb7eee5a09e7aa4c86f6b35f6a3465f2a4c6a8fe7ecd118253ebe8