Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.exe
-
Size
500KB
-
MD5
066d72cf2de962249f8561b63c84f1cc
-
SHA1
d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
-
SHA256
9bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
-
SHA512
53cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
SSDEEP
12288:fwgHsqmAdjxORA4GTe2Pr9hroyCMJOcddfm+YWnz:fEqmwjfz79iSJOUY0z
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yemxvem.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yemxvem.exe -
Adds policy Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sgwpvmcqktpqods = "auqpbyuoodfmqlggoeoie.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sgwpvmcqktpqods = "yqkhrmgywjjoqjcaguc.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pandguhsjpig = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nextcwpgdpostldafs.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pandguhsjpig = "C:\\Users\\Admin\\AppData\\Local\\Temp\\auqpbyuoodfmqlggoeoie.exe" vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sgwpvmcqktpqods = "auqpbyuoodfmqlggoeoie.exe" yemxvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sgwpvmcqktpqods = "xmdxewncxhegfvlg.exe" vsmxiywcfcw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pandguhsjpig = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xmdxewncxhegfvlg.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sgwpvmcqktpqods = "yqkhrmgywjjoqjcaguc.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pandguhsjpig = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lezxiezsrfgmpjdcjyha.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sgwpvmcqktpqods = "lezxiezsrfgmpjdcjyha.exe" yemxvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pandguhsjpig = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yqkhrmgywjjoqjcaguc.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pandguhsjpig = "C:\\Users\\Admin\\AppData\\Local\\Temp\\auqpbyuoodfmqlggoeoie.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pandguhsjpig = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eumhpiaqmxvyypgcg.exe" yemxvem.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yemxvem.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vsmxiywcfcw.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yemxvem.exe -
Executes dropped EXE 3 IoCs
pid Process 2008 vsmxiywcfcw.exe 848 yemxvem.exe 1212 yemxvem.exe -
Loads dropped DLL 6 IoCs
pid Process 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 2008 vsmxiywcfcw.exe 2008 vsmxiywcfcw.exe 2008 vsmxiywcfcw.exe 2008 vsmxiywcfcw.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nextcwpgdpostldafs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\auqpbyuoodfmqlggoeoie.exe ." yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\oaofjymyqxrqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eumhpiaqmxvyypgcg.exe" yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\pcrjoetgzhcczn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yqkhrmgywjjoqjcaguc.exe ." yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xmdxewncxhegfvlg = "lezxiezsrfgmpjdcjyha.exe" yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\oaofjymyqxrqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yqkhrmgywjjoqjcaguc.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oaofjymyqxrqm = "yqkhrmgywjjoqjcaguc.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nextcwpgdpostldafs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eumhpiaqmxvyypgcg.exe ." vsmxiywcfcw.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xmdxewncxhegfvlg = "auqpbyuoodfmqlggoeoie.exe" yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\oaofjymyqxrqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xmdxewncxhegfvlg.exe" yemxvem.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oaofjymyqxrqm = "xmdxewncxhegfvlg.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pcrjoetgzhcczn = "eumhpiaqmxvyypgcg.exe ." yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pcrjoetgzhcczn = "lezxiezsrfgmpjdcjyha.exe ." yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xmdxewncxhegfvlg = "eumhpiaqmxvyypgcg.exe" yemxvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run vsmxiywcfcw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\eumhpiaqmxvyypgcg = "yqkhrmgywjjoqjcaguc.exe ." yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\oaofjymyqxrqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xmdxewncxhegfvlg.exe" yemxvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yqkhrmgywjjoqjcaguc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xmdxewncxhegfvlg.exe" vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nextcwpgdpostldafs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lezxiezsrfgmpjdcjyha.exe ." yemxvem.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oaofjymyqxrqm = "nextcwpgdpostldafs.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nextcwpgdpostldafs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xmdxewncxhegfvlg.exe ." yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\oaofjymyqxrqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nextcwpgdpostldafs.exe" yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xmdxewncxhegfvlg = "lezxiezsrfgmpjdcjyha.exe" vsmxiywcfcw.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yqkhrmgywjjoqjcaguc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\auqpbyuoodfmqlggoeoie.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yqkhrmgywjjoqjcaguc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yqkhrmgywjjoqjcaguc.exe" yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\eumhpiaqmxvyypgcg = "eumhpiaqmxvyypgcg.exe ." yemxvem.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nextcwpgdpostldafs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eumhpiaqmxvyypgcg.exe ." yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xmdxewncxhegfvlg = "lezxiezsrfgmpjdcjyha.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pcrjoetgzhcczn = "auqpbyuoodfmqlggoeoie.exe ." yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oaofjymyqxrqm = "auqpbyuoodfmqlggoeoie.exe" vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yqkhrmgywjjoqjcaguc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yqkhrmgywjjoqjcaguc.exe" yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\oaofjymyqxrqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lezxiezsrfgmpjdcjyha.exe" yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\pcrjoetgzhcczn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xmdxewncxhegfvlg.exe ." yemxvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\eumhpiaqmxvyypgcg = "nextcwpgdpostldafs.exe ." yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oaofjymyqxrqm = "nextcwpgdpostldafs.exe" yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\eumhpiaqmxvyypgcg = "xmdxewncxhegfvlg.exe ." yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\eumhpiaqmxvyypgcg = "yqkhrmgywjjoqjcaguc.exe ." vsmxiywcfcw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\pcrjoetgzhcczn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lezxiezsrfgmpjdcjyha.exe ." vsmxiywcfcw.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pcrjoetgzhcczn = "lezxiezsrfgmpjdcjyha.exe ." yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yqkhrmgywjjoqjcaguc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eumhpiaqmxvyypgcg.exe" yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\oaofjymyqxrqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lezxiezsrfgmpjdcjyha.exe" vsmxiywcfcw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce yemxvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oaofjymyqxrqm = "xmdxewncxhegfvlg.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nextcwpgdpostldafs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\auqpbyuoodfmqlggoeoie.exe ." yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pcrjoetgzhcczn = "nextcwpgdpostldafs.exe ." yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yqkhrmgywjjoqjcaguc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nextcwpgdpostldafs.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pcrjoetgzhcczn = "lezxiezsrfgmpjdcjyha.exe ." vsmxiywcfcw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\eumhpiaqmxvyypgcg = "eumhpiaqmxvyypgcg.exe ." yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\pcrjoetgzhcczn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lezxiezsrfgmpjdcjyha.exe ." yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xmdxewncxhegfvlg = "yqkhrmgywjjoqjcaguc.exe" yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xmdxewncxhegfvlg = "eumhpiaqmxvyypgcg.exe" yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xmdxewncxhegfvlg = "nextcwpgdpostldafs.exe" yemxvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pcrjoetgzhcczn = "yqkhrmgywjjoqjcaguc.exe ." yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\oaofjymyqxrqm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eumhpiaqmxvyypgcg.exe" yemxvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\eumhpiaqmxvyypgcg = "xmdxewncxhegfvlg.exe ." yemxvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run yemxvem.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" vsmxiywcfcw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yemxvem.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yemxvem.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 whatismyip.everdot.org 6 whatismyipaddress.com 12 www.showmyipaddress.com -
Drops file in System32 directory 25 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\lezxiezsrfgmpjdcjyha.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\xmdxewncxhegfvlg.exe yemxvem.exe File opened for modification C:\Windows\SysWOW64\auqpbyuoodfmqlggoeoie.exe yemxvem.exe File opened for modification C:\Windows\SysWOW64\pandguhsjpigbnzqpwxivlocparxqojvhy.efq yemxvem.exe File opened for modification C:\Windows\SysWOW64\eumhpiaqmxvyypgcg.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\rmjjwurmndgotplmvmxspp.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\yqkhrmgywjjoqjcaguc.exe yemxvem.exe File opened for modification C:\Windows\SysWOW64\lezxiezsrfgmpjdcjyha.exe yemxvem.exe File opened for modification C:\Windows\SysWOW64\xmdxewncxhegfvlg.exe yemxvem.exe File opened for modification C:\Windows\SysWOW64\eumhpiaqmxvyypgcg.exe yemxvem.exe File opened for modification C:\Windows\SysWOW64\lezxiezsrfgmpjdcjyha.exe yemxvem.exe File opened for modification C:\Windows\SysWOW64\rmjjwurmndgotplmvmxspp.exe yemxvem.exe File opened for modification C:\Windows\SysWOW64\nextcwpgdpostldafs.exe vsmxiywcfcw.exe File created C:\Windows\SysWOW64\pandguhsjpigbnzqpwxivlocparxqojvhy.efq yemxvem.exe File opened for modification C:\Windows\SysWOW64\yqkhrmgywjjoqjcaguc.exe yemxvem.exe File opened for modification C:\Windows\SysWOW64\auqpbyuoodfmqlggoeoie.exe yemxvem.exe File created C:\Windows\SysWOW64\ccejbeggmhpcmnouieuuwbt.yye yemxvem.exe File opened for modification C:\Windows\SysWOW64\rmjjwurmndgotplmvmxspp.exe yemxvem.exe File opened for modification C:\Windows\SysWOW64\yqkhrmgywjjoqjcaguc.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\auqpbyuoodfmqlggoeoie.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\eumhpiaqmxvyypgcg.exe yemxvem.exe File opened for modification C:\Windows\SysWOW64\nextcwpgdpostldafs.exe yemxvem.exe File opened for modification C:\Windows\SysWOW64\nextcwpgdpostldafs.exe yemxvem.exe File opened for modification C:\Windows\SysWOW64\ccejbeggmhpcmnouieuuwbt.yye yemxvem.exe File opened for modification C:\Windows\SysWOW64\xmdxewncxhegfvlg.exe vsmxiywcfcw.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\ccejbeggmhpcmnouieuuwbt.yye yemxvem.exe File created C:\Program Files (x86)\ccejbeggmhpcmnouieuuwbt.yye yemxvem.exe File opened for modification C:\Program Files (x86)\pandguhsjpigbnzqpwxivlocparxqojvhy.efq yemxvem.exe File created C:\Program Files (x86)\pandguhsjpigbnzqpwxivlocparxqojvhy.efq yemxvem.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\yqkhrmgywjjoqjcaguc.exe vsmxiywcfcw.exe File opened for modification C:\Windows\rmjjwurmndgotplmvmxspp.exe yemxvem.exe File opened for modification C:\Windows\ccejbeggmhpcmnouieuuwbt.yye yemxvem.exe File opened for modification C:\Windows\yqkhrmgywjjoqjcaguc.exe yemxvem.exe File opened for modification C:\Windows\auqpbyuoodfmqlggoeoie.exe yemxvem.exe File opened for modification C:\Windows\eumhpiaqmxvyypgcg.exe yemxvem.exe File opened for modification C:\Windows\nextcwpgdpostldafs.exe yemxvem.exe File opened for modification C:\Windows\pandguhsjpigbnzqpwxivlocparxqojvhy.efq yemxvem.exe File opened for modification C:\Windows\xmdxewncxhegfvlg.exe vsmxiywcfcw.exe File opened for modification C:\Windows\nextcwpgdpostldafs.exe vsmxiywcfcw.exe File opened for modification C:\Windows\eumhpiaqmxvyypgcg.exe yemxvem.exe File opened for modification C:\Windows\yqkhrmgywjjoqjcaguc.exe yemxvem.exe File opened for modification C:\Windows\auqpbyuoodfmqlggoeoie.exe yemxvem.exe File opened for modification C:\Windows\rmjjwurmndgotplmvmxspp.exe yemxvem.exe File opened for modification C:\Windows\eumhpiaqmxvyypgcg.exe vsmxiywcfcw.exe File opened for modification C:\Windows\rmjjwurmndgotplmvmxspp.exe vsmxiywcfcw.exe File opened for modification C:\Windows\nextcwpgdpostldafs.exe yemxvem.exe File opened for modification C:\Windows\lezxiezsrfgmpjdcjyha.exe yemxvem.exe File opened for modification C:\Windows\xmdxewncxhegfvlg.exe yemxvem.exe File opened for modification C:\Windows\lezxiezsrfgmpjdcjyha.exe yemxvem.exe File created C:\Windows\ccejbeggmhpcmnouieuuwbt.yye yemxvem.exe File created C:\Windows\pandguhsjpigbnzqpwxivlocparxqojvhy.efq yemxvem.exe File opened for modification C:\Windows\lezxiezsrfgmpjdcjyha.exe vsmxiywcfcw.exe File opened for modification C:\Windows\auqpbyuoodfmqlggoeoie.exe vsmxiywcfcw.exe File opened for modification C:\Windows\xmdxewncxhegfvlg.exe yemxvem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 848 yemxvem.exe 848 yemxvem.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe 1648 Trojan-Ransom.Win32.Blocker.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 848 yemxvem.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2008 1648 Trojan-Ransom.Win32.Blocker.exe 28 PID 1648 wrote to memory of 2008 1648 Trojan-Ransom.Win32.Blocker.exe 28 PID 1648 wrote to memory of 2008 1648 Trojan-Ransom.Win32.Blocker.exe 28 PID 1648 wrote to memory of 2008 1648 Trojan-Ransom.Win32.Blocker.exe 28 PID 2008 wrote to memory of 848 2008 vsmxiywcfcw.exe 29 PID 2008 wrote to memory of 848 2008 vsmxiywcfcw.exe 29 PID 2008 wrote to memory of 848 2008 vsmxiywcfcw.exe 29 PID 2008 wrote to memory of 848 2008 vsmxiywcfcw.exe 29 PID 2008 wrote to memory of 1212 2008 vsmxiywcfcw.exe 30 PID 2008 wrote to memory of 1212 2008 vsmxiywcfcw.exe 30 PID 2008 wrote to memory of 1212 2008 vsmxiywcfcw.exe 30 PID 2008 wrote to memory of 1212 2008 vsmxiywcfcw.exe 30 -
System policy modification 1 TTPs 29 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" yemxvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" yemxvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" yemxvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yemxvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" yemxvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yemxvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yemxvem.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\vsmxiywcfcw.exe"C:\Users\Admin\AppData\Local\Temp\vsmxiywcfcw.exe" "c:\users\admin\appdata\local\temp\trojan-ransom.win32.blocker.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\yemxvem.exe"C:\Users\Admin\AppData\Local\Temp\yemxvem.exe" "-C:\Users\Admin\AppData\Local\Temp\xmdxewncxhegfvlg.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\yemxvem.exe"C:\Users\Admin\AppData\Local\Temp\yemxvem.exe" "-C:\Users\Admin\AppData\Local\Temp\xmdxewncxhegfvlg.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:1212
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
320KB
MD5b92314203327a733531042bc58e54f57
SHA11f3d0081f308a82c9659f4a57fc1ad551167a181
SHA256d936bfd3b4264fe1650dee22119858b9d0cc58598e7e956ebecf72fb82f7c7d3
SHA5122982559183e13830cd795c7badadb15b4dad50315155299d9713970aff034c827ade98c79d6da836aea743890aca71bc0f7d5348a32f2858b4f40884ecccf7f7
-
Filesize
320KB
MD5b92314203327a733531042bc58e54f57
SHA11f3d0081f308a82c9659f4a57fc1ad551167a181
SHA256d936bfd3b4264fe1650dee22119858b9d0cc58598e7e956ebecf72fb82f7c7d3
SHA5122982559183e13830cd795c7badadb15b4dad50315155299d9713970aff034c827ade98c79d6da836aea743890aca71bc0f7d5348a32f2858b4f40884ecccf7f7
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
696KB
MD5a0406aab8e27240d59d72bcf3abf0097
SHA1e231f073ae0bbde33d3d860ca629e07576a14cec
SHA256bc0db3dfde78ce29ae0e6c124423c579fb1a3db77882d9d64cbe099d43b0024b
SHA512cd4615a14aa5fd1c8f4e65cf5aa9c1f4d129c220d0f7e29cdca6bc128dc7838cdb869ef17ece38dac00995a8bbb2af19a459d2b641cf71b734453a48caae536c
-
Filesize
696KB
MD5a0406aab8e27240d59d72bcf3abf0097
SHA1e231f073ae0bbde33d3d860ca629e07576a14cec
SHA256bc0db3dfde78ce29ae0e6c124423c579fb1a3db77882d9d64cbe099d43b0024b
SHA512cd4615a14aa5fd1c8f4e65cf5aa9c1f4d129c220d0f7e29cdca6bc128dc7838cdb869ef17ece38dac00995a8bbb2af19a459d2b641cf71b734453a48caae536c
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
500KB
MD5066d72cf2de962249f8561b63c84f1cc
SHA1d6c60b94a4d03f0b1a9f860807c26146f7ceb35d
SHA2569bb5c1ba34c80331b301d99d55045452856f6ae8cab48707fe1eef7ea3bedcce
SHA51253cf86f17d049ad1d0c8bd390889951194ef6f9fdcd58f9ca3b52b5a9f78c464d00a0eef9aeff34b87f5a98bf3ea89210e595bcc4343a4c41f30944808f27d59
-
Filesize
320KB
MD5b92314203327a733531042bc58e54f57
SHA11f3d0081f308a82c9659f4a57fc1ad551167a181
SHA256d936bfd3b4264fe1650dee22119858b9d0cc58598e7e956ebecf72fb82f7c7d3
SHA5122982559183e13830cd795c7badadb15b4dad50315155299d9713970aff034c827ade98c79d6da836aea743890aca71bc0f7d5348a32f2858b4f40884ecccf7f7
-
Filesize
320KB
MD5b92314203327a733531042bc58e54f57
SHA11f3d0081f308a82c9659f4a57fc1ad551167a181
SHA256d936bfd3b4264fe1650dee22119858b9d0cc58598e7e956ebecf72fb82f7c7d3
SHA5122982559183e13830cd795c7badadb15b4dad50315155299d9713970aff034c827ade98c79d6da836aea743890aca71bc0f7d5348a32f2858b4f40884ecccf7f7
-
Filesize
696KB
MD5a0406aab8e27240d59d72bcf3abf0097
SHA1e231f073ae0bbde33d3d860ca629e07576a14cec
SHA256bc0db3dfde78ce29ae0e6c124423c579fb1a3db77882d9d64cbe099d43b0024b
SHA512cd4615a14aa5fd1c8f4e65cf5aa9c1f4d129c220d0f7e29cdca6bc128dc7838cdb869ef17ece38dac00995a8bbb2af19a459d2b641cf71b734453a48caae536c
-
Filesize
696KB
MD5a0406aab8e27240d59d72bcf3abf0097
SHA1e231f073ae0bbde33d3d860ca629e07576a14cec
SHA256bc0db3dfde78ce29ae0e6c124423c579fb1a3db77882d9d64cbe099d43b0024b
SHA512cd4615a14aa5fd1c8f4e65cf5aa9c1f4d129c220d0f7e29cdca6bc128dc7838cdb869ef17ece38dac00995a8bbb2af19a459d2b641cf71b734453a48caae536c
-
Filesize
696KB
MD5a0406aab8e27240d59d72bcf3abf0097
SHA1e231f073ae0bbde33d3d860ca629e07576a14cec
SHA256bc0db3dfde78ce29ae0e6c124423c579fb1a3db77882d9d64cbe099d43b0024b
SHA512cd4615a14aa5fd1c8f4e65cf5aa9c1f4d129c220d0f7e29cdca6bc128dc7838cdb869ef17ece38dac00995a8bbb2af19a459d2b641cf71b734453a48caae536c
-
Filesize
696KB
MD5a0406aab8e27240d59d72bcf3abf0097
SHA1e231f073ae0bbde33d3d860ca629e07576a14cec
SHA256bc0db3dfde78ce29ae0e6c124423c579fb1a3db77882d9d64cbe099d43b0024b
SHA512cd4615a14aa5fd1c8f4e65cf5aa9c1f4d129c220d0f7e29cdca6bc128dc7838cdb869ef17ece38dac00995a8bbb2af19a459d2b641cf71b734453a48caae536c