Analysis
-
max time kernel
153s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 03:43
Behavioral task
behavioral1
Sample
65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf.exe
Resource
win10v2004-20220901-en
General
-
Target
65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf.exe
-
Size
324KB
-
MD5
5f1a899ba6c831657f6f77c545280ad0
-
SHA1
9daa6d5c70ff0c68e41cfac06dd6eca41a376933
-
SHA256
65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
-
SHA512
350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
SSDEEP
6144:KlZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76lBSvvazbue:KHLUMuiv9RgfSjAzRtyBN
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\fdisk.com" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\SysWOW64\\userinit.exe,C:\\Windows\\SysWOW64\\fdisk.com" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\SysWOW64\\userinit.exe,C:\\Windows\\SysWOW64\\fdisk.com" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\fdisk.com" svchost.com -
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "2" svchost.com Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "2" svchost.com -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.com Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.com -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" svchost.com Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" svchost.com -
Disables Task Manager via registry modification
-
Executes dropped EXE 4 IoCs
pid Process 240 svchost.com 912 cftmon.exe 1320 svchost.com 1704 cftmon.exe -
Sets file execution options in registry 2 TTPs 44 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGNT.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsgui.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGNT.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\USBGUARD.EXE svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctstray.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGNT.EXE svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctstray.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctstray.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\USBGUARD.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGNT.EXE svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsgui.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\USBGUARD.EXE svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsgui.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsgui.exe svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctstray.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\USBGUARD.EXE\debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com Kll_dis" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe svchost.com -
resource yara_rule behavioral1/memory/1672-55-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1672-56-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/files/0x0007000000005c50-57.dat upx behavioral1/files/0x0007000000005c50-60.dat upx behavioral1/files/0x0007000000005c50-59.dat upx behavioral1/files/0x0007000000005c50-58.dat upx behavioral1/files/0x0007000000005c50-63.dat upx behavioral1/files/0x0007000000005c50-66.dat upx behavioral1/memory/1672-65-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/240-67-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/files/0x0007000000013382-69.dat upx behavioral1/files/0x0007000000013382-72.dat upx behavioral1/files/0x0007000000013382-71.dat upx behavioral1/files/0x0007000000013382-70.dat upx behavioral1/files/0x0007000000013382-74.dat upx behavioral1/memory/912-77-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/files/0x0007000000013382-78.dat upx behavioral1/files/0x0007000000005c50-79.dat upx behavioral1/files/0x0007000000005c50-81.dat upx behavioral1/files/0x0007000000013382-83.dat upx behavioral1/files/0x0007000000013382-85.dat upx behavioral1/memory/912-87-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/files/0x00070000000133ab-88.dat upx behavioral1/files/0x0007000000013382-104.dat upx behavioral1/files/0x0007000000013382-103.dat upx behavioral1/files/0x00070000000132ee-102.dat upx behavioral1/files/0x00070000000132ee-101.dat upx behavioral1/files/0x00070000000132ee-100.dat upx behavioral1/files/0x00070000000132c1-99.dat upx behavioral1/files/0x00070000000132c1-98.dat upx behavioral1/files/0x00070000000132c1-97.dat upx behavioral1/files/0x000700000001311d-96.dat upx behavioral1/files/0x000700000001311d-95.dat upx behavioral1/files/0x000700000001311d-94.dat upx behavioral1/files/0x00070000000126ae-93.dat upx behavioral1/files/0x00070000000126ae-92.dat upx behavioral1/files/0x00070000000126ae-91.dat upx behavioral1/files/0x00070000000126ae-90.dat upx behavioral1/files/0x00070000000126ae-89.dat upx behavioral1/memory/1320-106-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1704-107-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/files/0x00070000000126ae-113.dat upx behavioral1/files/0x0007000000013382-124.dat upx behavioral1/files/0x0007000000013382-123.dat upx behavioral1/files/0x00070000000132ee-122.dat upx behavioral1/files/0x00070000000132ee-121.dat upx behavioral1/files/0x00070000000132c1-120.dat upx behavioral1/files/0x00070000000132c1-119.dat upx behavioral1/files/0x000700000001311d-118.dat upx behavioral1/files/0x000700000001311d-117.dat upx behavioral1/files/0x00070000000126ae-116.dat upx behavioral1/files/0x00070000000126ae-115.dat upx behavioral1/files/0x00070000000126ae-114.dat upx behavioral1/files/0x00070000000126ae-138.dat upx behavioral1/files/0x00070000000126ae-141.dat upx behavioral1/files/0x0007000000013382-149.dat upx behavioral1/files/0x0007000000013382-148.dat upx behavioral1/files/0x00070000000132ee-147.dat upx behavioral1/files/0x00070000000132ee-146.dat upx behavioral1/files/0x00070000000132c1-145.dat upx behavioral1/files/0x00070000000132c1-144.dat upx behavioral1/files/0x000700000001311d-143.dat upx behavioral1/files/0x000700000001311d-142.dat upx behavioral1/files/0x00070000000126ae-140.dat upx -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sndvol32.exe svchost.com File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sndvol32.exe svchost.com -
Loads dropped DLL 64 IoCs
pid Process 1672 65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf.exe 1672 65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf.exe 1672 65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf.exe 1672 65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf.exe 240 svchost.com 240 svchost.com 240 svchost.com 240 svchost.com 240 svchost.com 912 cftmon.exe 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com 1320 svchost.com -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\User Agent = "C:\\Windows\\SysWOW64\\fdisk.com" svchost.com Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\User Agent = "C:\\Windows\\SysWOW64\\fdisk.com" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HotKey = "C:\\Users\\Admin\\Templates\\cache\\SFCsrvc.pif" svchost.com Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.com Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\HotKey = "C:\\Users\\Admin\\Templates\\cache\\SFCsrvc.pif" svchost.com Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\User Agent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com" svchost.com Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HotKey = "C:\\Users\\Admin\\Templates\\cache\\SFCsrvc.pif" svchost.com Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\HotKey = "C:\\Users\\Admin\\Templates\\cache\\SFCsrvc.pif" svchost.com Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\User Agent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.com" svchost.com -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification \??\c:\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\desktop.ini svchost.com File opened for modification C:\Users\Admin\AppData\Local\Temp\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\desktop.ini 65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf.exe File opened for modification C:\Users\Admin\Templates\cache\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\desktop.ini svchost.com File opened for modification C:\Users\Admin\Templates\cache\desktop.ini svchost.com -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\m: svchost.com File opened (read-only) \??\r: svchost.com File opened (read-only) \??\t: svchost.com File opened (read-only) \??\g: svchost.com File opened (read-only) \??\v: svchost.com File opened (read-only) \??\w: svchost.com File opened (read-only) \??\b: svchost.com File opened (read-only) \??\i: svchost.com File opened (read-only) \??\z: svchost.com File opened (read-only) \??\j: svchost.com File opened (read-only) \??\p: svchost.com File opened (read-only) \??\u: svchost.com File opened (read-only) \??\a: svchost.com File opened (read-only) \??\f: svchost.com File opened (read-only) \??\k: svchost.com File opened (read-only) \??\o: svchost.com File opened (read-only) \??\b: svchost.com File opened (read-only) \??\e: svchost.com File opened (read-only) \??\i: svchost.com File opened (read-only) \??\k: svchost.com File opened (read-only) \??\a: svchost.com File opened (read-only) \??\e: svchost.com File opened (read-only) \??\o: svchost.com File opened (read-only) \??\x: svchost.com File opened (read-only) \??\h: svchost.com File opened (read-only) \??\s: svchost.com File opened (read-only) \??\n: svchost.com File opened (read-only) \??\v: svchost.com File opened (read-only) \??\y: svchost.com File opened (read-only) \??\m: svchost.com File opened (read-only) \??\n: svchost.com File opened (read-only) \??\f: svchost.com File opened (read-only) \??\l: svchost.com File opened (read-only) \??\q: svchost.com File opened (read-only) \??\t: svchost.com File opened (read-only) \??\q: svchost.com File opened (read-only) \??\w: svchost.com File opened (read-only) \??\l: svchost.com File opened (read-only) \??\j: svchost.com File opened (read-only) \??\z: svchost.com File opened (read-only) \??\u: svchost.com File opened (read-only) \??\x: svchost.com File opened (read-only) \??\h: svchost.com File opened (read-only) \??\r: svchost.com File opened (read-only) \??\s: svchost.com File opened (read-only) \??\y: svchost.com File opened (read-only) \??\g: svchost.com File opened (read-only) \??\p: svchost.com -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1672-56-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1672-65-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/240-67-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/240-76-0x0000000004EA0000-0x0000000004F62000-memory.dmp autoit_exe behavioral1/memory/912-77-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/912-87-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1320-105-0x0000000002EE0000-0x0000000002FA2000-memory.dmp autoit_exe behavioral1/memory/1320-106-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1704-107-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/240-155-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1320-162-0x0000000002EE0000-0x0000000002FA2000-memory.dmp autoit_exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\c:\autorun.inf svchost.com File opened for modification C:\\autorun.inf svchost.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\fdisk.com svchost.com File opened for modification C:\Windows\SysWOW64\fdisk.com svchost.com -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\System\cftmon.exe svchost.com -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Help\cliconf.chm svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1672 65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf.exe 240 svchost.com 240 svchost.com 240 svchost.com 240 svchost.com 240 svchost.com 240 svchost.com 240 svchost.com 240 svchost.com 240 svchost.com 240 svchost.com 240 svchost.com 240 svchost.com 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1320 svchost.com 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe 1704 cftmon.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1672 wrote to memory of 240 1672 65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf.exe 27 PID 1672 wrote to memory of 240 1672 65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf.exe 27 PID 1672 wrote to memory of 240 1672 65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf.exe 27 PID 1672 wrote to memory of 240 1672 65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf.exe 27 PID 240 wrote to memory of 912 240 svchost.com 28 PID 240 wrote to memory of 912 240 svchost.com 28 PID 240 wrote to memory of 912 240 svchost.com 28 PID 240 wrote to memory of 912 240 svchost.com 28 PID 240 wrote to memory of 1320 240 svchost.com 29 PID 240 wrote to memory of 1320 240 svchost.com 29 PID 240 wrote to memory of 1320 240 svchost.com 29 PID 240 wrote to memory of 1320 240 svchost.com 29 PID 912 wrote to memory of 1704 912 cftmon.exe 30 PID 912 wrote to memory of 1704 912 cftmon.exe 30 PID 912 wrote to memory of 1704 912 cftmon.exe 30 PID 912 wrote to memory of 1704 912 cftmon.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf.exe"C:\Users\Admin\AppData\Local\Temp\65a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\svchost.com"C:\Users\Admin\AppData\Local\Temp\svchost.com"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Program Files (x86)\Common Files\System\cftmon.exe"C:\Program Files (x86)\Common Files\System\cftmon.exe" stay_alive -in3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Program Files (x86)\Common Files\System\cftmon.exe"C:\Program Files (x86)\Common Files\System\cftmon.exe" stay_alive -r4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.comC:\Users\Admin\AppData\Local\Temp\svchost.com keep_fucking3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34
-
Filesize
324KB
MD55f1a899ba6c831657f6f77c545280ad0
SHA19daa6d5c70ff0c68e41cfac06dd6eca41a376933
SHA25665a869bfaf697958122a9f2c9754f20f8e8ba8509ab87c76f370154df919ffdf
SHA512350c023c8357daf8f153afae96ac78ac7aaf0ca6d02b48e0aac151dacf48a1f157349a790618892c95c47a8e32b92c2e001fa5bc842a53f066edebe87a8a2e34