Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe
Resource
win10v2004-20220901-en
General
-
Target
28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe
-
Size
496KB
-
MD5
6568d24c2f87f29d0070084286e82730
-
SHA1
06794f7754c4c66842eefb5d3bc5a8299cecf0ff
-
SHA256
28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
-
SHA512
964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
SSDEEP
6144:Ixj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdrionrp:Ih6onxOp8FySpE5zvIdtU+Ymef
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" bakrr.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bakrr.exe -
Adds policy Run key to start application 2 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vsmxiywcfcw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qwnbixeziqig = "mazvkhwzqggmpjdcjyiw.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\fiwhlxbtz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bqqndbrvnefmqlggoepee.exe" bakrr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qwnbixeziqig = "mazvkhwzqggmpjdcjyiw.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qwnbixeziqig = "zmkftpdfvkjoqjcagud.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qwnbixeziqig = "fqmfrlxxlyvyypgcg.exe" vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\fiwhlxbtz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oaxrezmncqostldafs.exe" vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qwnbixeziqig = "bqqndbrvnefmqlggoepee.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\fiwhlxbtz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mazvkhwzqggmpjdcjyiw.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\fiwhlxbtz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mazvkhwzqggmpjdcjyiw.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qwnbixeziqig = "fqmfrlxxlyvyypgcg.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\fiwhlxbtz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zmkftpdfvkjoqjcagud.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\fiwhlxbtz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bqqndbrvnefmqlggoepee.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\fiwhlxbtz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oaxrezmncqostldafs.exe" bakrr.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vsmxiywcfcw.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bakrr.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bakrr.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vsmxiywcfcw.exe -
Executes dropped EXE 3 IoCs
pid Process 1552 vsmxiywcfcw.exe 1200 bakrr.exe 1980 bakrr.exe -
Loads dropped DLL 6 IoCs
pid Process 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 1552 vsmxiywcfcw.exe 1552 vsmxiywcfcw.exe 1552 vsmxiywcfcw.exe 1552 vsmxiywcfcw.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tyobhvbvdkb = "bqqndbrvnefmqlggoepee.exe ." bakrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ycrdivatag = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yidvgzkjwiegfvlg.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tyobhvbvdkb = "zmkftpdfvkjoqjcagud.exe ." bakrr.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ycrdivatag = "mazvkhwzqggmpjdcjyiw.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tyobhvbvdkb = "bqqndbrvnefmqlggoepee.exe ." bakrr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tyobhvbvdkb = "mazvkhwzqggmpjdcjyiw.exe ." bakrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pwodlbjfpyrqm = "bqqndbrvnefmqlggoepee.exe" vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yidvgzkjwiegfvlg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fqmfrlxxlyvyypgcg.exe" vsmxiywcfcw.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yidvgzkjwiegfvlg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fqmfrlxxlyvyypgcg.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tcwnxpzxjupqods = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bqqndbrvnefmqlggoepee.exe ." bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yidvgzkjwiegfvlg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fqmfrlxxlyvyypgcg.exe" bakrr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ycrdivatag = "oaxrezmncqostldafs.exe" bakrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pwodlbjfpyrqm = "oaxrezmncqostldafs.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yidvgzkjwiegfvlg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yidvgzkjwiegfvlg.exe" bakrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qyrhqhqnyicczn = "oaxrezmncqostldafs.exe ." vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tyobhvbvdkb = "zmkftpdfvkjoqjcagud.exe ." bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ycrdivatag = "fqmfrlxxlyvyypgcg.exe" bakrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qyrhqhqnyicczn = "yidvgzkjwiegfvlg.exe ." bakrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ycrdivatag = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mazvkhwzqggmpjdcjyiw.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tcwnxpzxjupqods = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bqqndbrvnefmqlggoepee.exe ." bakrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pwodlbjfpyrqm = "yidvgzkjwiegfvlg.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ycrdivatag = "zmkftpdfvkjoqjcagud.exe" bakrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pwodlbjfpyrqm = "oaxrezmncqostldafs.exe" bakrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qyrhqhqnyicczn = "oaxrezmncqostldafs.exe ." bakrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qyrhqhqnyicczn = "bqqndbrvnefmqlggoepee.exe ." bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ycrdivatag = "bqqndbrvnefmqlggoepee.exe" vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tyobhvbvdkb = "mazvkhwzqggmpjdcjyiw.exe ." vsmxiywcfcw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\tyobhvbvdkb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yidvgzkjwiegfvlg.exe ." vsmxiywcfcw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qyrhqhqnyicczn = "fqmfrlxxlyvyypgcg.exe ." bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tcwnxpzxjupqods = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zmkftpdfvkjoqjcagud.exe ." bakrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ycrdivatag = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fqmfrlxxlyvyypgcg.exe" vsmxiywcfcw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\tyobhvbvdkb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oaxrezmncqostldafs.exe ." bakrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qyrhqhqnyicczn = "yidvgzkjwiegfvlg.exe ." bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ycrdivatag = "fqmfrlxxlyvyypgcg.exe" bakrr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run bakrr.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run bakrr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run bakrr.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run bakrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ycrdivatag = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bqqndbrvnefmqlggoepee.exe" bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tcwnxpzxjupqods = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zmkftpdfvkjoqjcagud.exe ." vsmxiywcfcw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pwodlbjfpyrqm = "bqqndbrvnefmqlggoepee.exe" bakrr.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce bakrr.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tcwnxpzxjupqods = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oaxrezmncqostldafs.exe ." bakrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pwodlbjfpyrqm = "bqqndbrvnefmqlggoepee.exe" bakrr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce bakrr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\tyobhvbvdkb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oaxrezmncqostldafs.exe ." bakrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yidvgzkjwiegfvlg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mazvkhwzqggmpjdcjyiw.exe" bakrr.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" vsmxiywcfcw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bakrr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bakrr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bakrr.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 whatismyip.everdot.org 6 www.showmyipaddress.com 8 whatismyipaddress.com -
Drops file in System32 directory 25 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\oaxrezmncqostldafs.exe bakrr.exe File opened for modification C:\Windows\SysWOW64\bqqndbrvnefmqlggoepee.exe bakrr.exe File opened for modification C:\Windows\SysWOW64\fqmfrlxxlyvyypgcg.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\oaxrezmncqostldafs.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\zmkftpdfvkjoqjcagud.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\yidvgzkjwiegfvlg.exe bakrr.exe File opened for modification C:\Windows\SysWOW64\fqmfrlxxlyvyypgcg.exe bakrr.exe File opened for modification C:\Windows\SysWOW64\yidvgzkjwiegfvlg.exe bakrr.exe File created C:\Windows\SysWOW64\cwbdybwfcyeqzzzermcwbd.bwf bakrr.exe File opened for modification C:\Windows\SysWOW64\tyobhvbvdkbysdoecijoerxlrltaroite.syz bakrr.exe File opened for modification C:\Windows\SysWOW64\bqqndbrvnefmqlggoepee.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\sijhyxotmegotplmvmyopn.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\zmkftpdfvkjoqjcagud.exe bakrr.exe File opened for modification C:\Windows\SysWOW64\zmkftpdfvkjoqjcagud.exe bakrr.exe File opened for modification C:\Windows\SysWOW64\sijhyxotmegotplmvmyopn.exe bakrr.exe File opened for modification C:\Windows\SysWOW64\yidvgzkjwiegfvlg.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\sijhyxotmegotplmvmyopn.exe bakrr.exe File opened for modification C:\Windows\SysWOW64\fqmfrlxxlyvyypgcg.exe bakrr.exe File created C:\Windows\SysWOW64\tyobhvbvdkbysdoecijoerxlrltaroite.syz bakrr.exe File opened for modification C:\Windows\SysWOW64\mazvkhwzqggmpjdcjyiw.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\oaxrezmncqostldafs.exe bakrr.exe File opened for modification C:\Windows\SysWOW64\mazvkhwzqggmpjdcjyiw.exe bakrr.exe File opened for modification C:\Windows\SysWOW64\bqqndbrvnefmqlggoepee.exe bakrr.exe File opened for modification C:\Windows\SysWOW64\mazvkhwzqggmpjdcjyiw.exe bakrr.exe File opened for modification C:\Windows\SysWOW64\cwbdybwfcyeqzzzermcwbd.bwf bakrr.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\cwbdybwfcyeqzzzermcwbd.bwf bakrr.exe File created C:\Program Files (x86)\cwbdybwfcyeqzzzermcwbd.bwf bakrr.exe File opened for modification C:\Program Files (x86)\tyobhvbvdkbysdoecijoerxlrltaroite.syz bakrr.exe File created C:\Program Files (x86)\tyobhvbvdkbysdoecijoerxlrltaroite.syz bakrr.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\oaxrezmncqostldafs.exe bakrr.exe File opened for modification C:\Windows\cwbdybwfcyeqzzzermcwbd.bwf bakrr.exe File opened for modification C:\Windows\fqmfrlxxlyvyypgcg.exe bakrr.exe File opened for modification C:\Windows\bqqndbrvnefmqlggoepee.exe bakrr.exe File opened for modification C:\Windows\tyobhvbvdkbysdoecijoerxlrltaroite.syz bakrr.exe File opened for modification C:\Windows\yidvgzkjwiegfvlg.exe vsmxiywcfcw.exe File opened for modification C:\Windows\bqqndbrvnefmqlggoepee.exe bakrr.exe File opened for modification C:\Windows\sijhyxotmegotplmvmyopn.exe bakrr.exe File opened for modification C:\Windows\yidvgzkjwiegfvlg.exe bakrr.exe File opened for modification C:\Windows\zmkftpdfvkjoqjcagud.exe bakrr.exe File opened for modification C:\Windows\mazvkhwzqggmpjdcjyiw.exe bakrr.exe File opened for modification C:\Windows\zmkftpdfvkjoqjcagud.exe bakrr.exe File opened for modification C:\Windows\sijhyxotmegotplmvmyopn.exe bakrr.exe File opened for modification C:\Windows\zmkftpdfvkjoqjcagud.exe vsmxiywcfcw.exe File opened for modification C:\Windows\mazvkhwzqggmpjdcjyiw.exe vsmxiywcfcw.exe File opened for modification C:\Windows\bqqndbrvnefmqlggoepee.exe vsmxiywcfcw.exe File opened for modification C:\Windows\oaxrezmncqostldafs.exe bakrr.exe File opened for modification C:\Windows\fqmfrlxxlyvyypgcg.exe bakrr.exe File opened for modification C:\Windows\mazvkhwzqggmpjdcjyiw.exe bakrr.exe File created C:\Windows\cwbdybwfcyeqzzzermcwbd.bwf bakrr.exe File created C:\Windows\tyobhvbvdkbysdoecijoerxlrltaroite.syz bakrr.exe File opened for modification C:\Windows\fqmfrlxxlyvyypgcg.exe vsmxiywcfcw.exe File opened for modification C:\Windows\oaxrezmncqostldafs.exe vsmxiywcfcw.exe File opened for modification C:\Windows\sijhyxotmegotplmvmyopn.exe vsmxiywcfcw.exe File opened for modification C:\Windows\yidvgzkjwiegfvlg.exe bakrr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 1200 bakrr.exe 1200 bakrr.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1200 bakrr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 900 wrote to memory of 1552 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 27 PID 900 wrote to memory of 1552 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 27 PID 900 wrote to memory of 1552 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 27 PID 900 wrote to memory of 1552 900 28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe 27 PID 1552 wrote to memory of 1200 1552 vsmxiywcfcw.exe 28 PID 1552 wrote to memory of 1200 1552 vsmxiywcfcw.exe 28 PID 1552 wrote to memory of 1200 1552 vsmxiywcfcw.exe 28 PID 1552 wrote to memory of 1200 1552 vsmxiywcfcw.exe 28 PID 1552 wrote to memory of 1980 1552 vsmxiywcfcw.exe 29 PID 1552 wrote to memory of 1980 1552 vsmxiywcfcw.exe 29 PID 1552 wrote to memory of 1980 1552 vsmxiywcfcw.exe 29 PID 1552 wrote to memory of 1980 1552 vsmxiywcfcw.exe 29 -
System policy modification 1 TTPs 38 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" vsmxiywcfcw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bakrr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bakrr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" bakrr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer bakrr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" bakrr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer bakrr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" vsmxiywcfcw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe"C:\Users\Admin\AppData\Local\Temp\28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\vsmxiywcfcw.exe"C:\Users\Admin\AppData\Local\Temp\vsmxiywcfcw.exe" "c:\users\admin\appdata\local\temp\28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\bakrr.exe"C:\Users\Admin\AppData\Local\Temp\bakrr.exe" "-c:\users\admin\appdata\local\temp\28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1200
-
-
C:\Users\Admin\AppData\Local\Temp\bakrr.exe"C:\Users\Admin\AppData\Local\Temp\bakrr.exe" "-c:\users\admin\appdata\local\temp\28c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:1980
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
700KB
MD5f6cb01a2625cf10336cc6f88bb3ad395
SHA14422fb148187afac7239fa01c92fea0373ef9f69
SHA256a21cdd1bed282145217806e1bbdcb1cbe234346944bf9142f2a324df76678cd2
SHA51276f165d44534e464f48a2c356f868a8485c6afa50a7e13aad886d00b5d4842a7e9564362c05ef221d58c3d1059b70a90cfaf6c13d8c04da5da562bece608b4bd
-
Filesize
700KB
MD5f6cb01a2625cf10336cc6f88bb3ad395
SHA14422fb148187afac7239fa01c92fea0373ef9f69
SHA256a21cdd1bed282145217806e1bbdcb1cbe234346944bf9142f2a324df76678cd2
SHA51276f165d44534e464f48a2c356f868a8485c6afa50a7e13aad886d00b5d4842a7e9564362c05ef221d58c3d1059b70a90cfaf6c13d8c04da5da562bece608b4bd
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
496KB
MD56568d24c2f87f29d0070084286e82730
SHA106794f7754c4c66842eefb5d3bc5a8299cecf0ff
SHA25628c073986d1533b0caa69656d84b6db80ae20f114be14f95ab523196e27618d4
SHA512964b187dc71ee6ccff31b42e01cb6bfeaa31cc57678a04c67261a064bef9969ec8ead198fbe2db88c3cfa50eef4f2fad806984e4fb2a70dd309a421edada699f
-
Filesize
700KB
MD5f6cb01a2625cf10336cc6f88bb3ad395
SHA14422fb148187afac7239fa01c92fea0373ef9f69
SHA256a21cdd1bed282145217806e1bbdcb1cbe234346944bf9142f2a324df76678cd2
SHA51276f165d44534e464f48a2c356f868a8485c6afa50a7e13aad886d00b5d4842a7e9564362c05ef221d58c3d1059b70a90cfaf6c13d8c04da5da562bece608b4bd
-
Filesize
700KB
MD5f6cb01a2625cf10336cc6f88bb3ad395
SHA14422fb148187afac7239fa01c92fea0373ef9f69
SHA256a21cdd1bed282145217806e1bbdcb1cbe234346944bf9142f2a324df76678cd2
SHA51276f165d44534e464f48a2c356f868a8485c6afa50a7e13aad886d00b5d4842a7e9564362c05ef221d58c3d1059b70a90cfaf6c13d8c04da5da562bece608b4bd
-
Filesize
700KB
MD5f6cb01a2625cf10336cc6f88bb3ad395
SHA14422fb148187afac7239fa01c92fea0373ef9f69
SHA256a21cdd1bed282145217806e1bbdcb1cbe234346944bf9142f2a324df76678cd2
SHA51276f165d44534e464f48a2c356f868a8485c6afa50a7e13aad886d00b5d4842a7e9564362c05ef221d58c3d1059b70a90cfaf6c13d8c04da5da562bece608b4bd
-
Filesize
700KB
MD5f6cb01a2625cf10336cc6f88bb3ad395
SHA14422fb148187afac7239fa01c92fea0373ef9f69
SHA256a21cdd1bed282145217806e1bbdcb1cbe234346944bf9142f2a324df76678cd2
SHA51276f165d44534e464f48a2c356f868a8485c6afa50a7e13aad886d00b5d4842a7e9564362c05ef221d58c3d1059b70a90cfaf6c13d8c04da5da562bece608b4bd
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471