Analysis
-
max time kernel
151s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:13
Static task
static1
Behavioral task
behavioral1
Sample
f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe
Resource
win10v2004-20220812-en
General
-
Target
f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe
-
Size
66KB
-
MD5
582b1b120cb451dd3473116f6f7fc5b0
-
SHA1
f46b118610d6f0aa91f06512e117048032bb94ca
-
SHA256
f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38
-
SHA512
4003dae9a7c30c2044fce07d0b5607b396b4a6a21c184fb2a1a8697886fbc988dc0aa79f3cd2939e7855ad32e36ec4fb314c641729b0226b4c5d153472482151
-
SSDEEP
1536:sr+Fum5LMI+WTJjcXnXMcpm/zOxJXKJwa:sr+Fu2II+HXXMcI/AKJd
Malware Config
Signatures
-
Drops file in Drivers directory 60 IoCs
Processes:
AE 0124 BE.exewinlogon.exewinlogon.exewinlogon.exef07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exedescription ioc process File opened for modification C:\Windows\SysWOW64\drivers\fr-FR AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\de-DE\qwavedrv.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\de-DE\scfilter.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\es-ES\qwavedrv.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\de-DE AE 0124 BE.exe File created C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\gm.dls AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\scfilter.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\es-ES\pacer.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\es-ES\scfilter.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\fr-FR\qwavedrv.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\fr-FR\bfe.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\wimmount.sys AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\tcpip.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\es-ES\ndiscap.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\es-ES\tcpip.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\fr-FR\ndiscap.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\ja-JP\pacer.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\pacer.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\de-DE\ndiscap.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\it-IT\qwavedrv.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\it-IT\scfilter.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\it-IT AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\de-DE\pacer.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\fr-FR\pacer.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\it-IT AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\ja-JP AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\qwavedrv.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\ja-JP\tcpip.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\es-ES AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\es-ES AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\fr-FR\scfilter.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\it-IT\bfe.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\it-IT\pacer.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\it-IT\tcpip.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\en-US AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\gmreadme.txt AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\fr-FR\tcpip.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\ndiscap.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\Msvbvm60.dll AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\bfe.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\es-ES\bfe.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\ja-JP\bfe.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe File opened for modification C:\Windows\SysWOW64\drivers\ja-JP\qwavedrv.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\fr-FR AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\ja-JP\scfilter.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\de-DE\bfe.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\de-DE\tcpip.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\it-IT\ndiscap.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\ja-JP\ndiscap.sys.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\ja-JP AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\drivers\de-DE AE 0124 BE.exe -
Executes dropped EXE 4 IoCs
Processes:
winlogon.exeAE 0124 BE.exewinlogon.exewinlogon.exepid process 1788 winlogon.exe 276 AE 0124 BE.exe 1692 winlogon.exe 432 winlogon.exe -
Loads dropped DLL 7 IoCs
Processes:
f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exeAE 0124 BE.exewinlogon.exewinlogon.exepid process 2024 f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe 2024 f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe 276 AE 0124 BE.exe 276 AE 0124 BE.exe 1788 winlogon.exe 1788 winlogon.exe 432 winlogon.exe -
Drops desktop.ini file(s) 35 IoCs
Processes:
AE 0124 BE.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Downloaded Program Files\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Globalization\MCT\MCT-US\Link\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Heritage\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Globalization\MCT\MCT-CA\Wallpaper\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Quirky\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Globalization\MCT\MCT-AU\Wallpaper\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Globalization\MCT\MCT-GB\Wallpaper\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Globalization\MCT\MCT-ZA\Wallpaper\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Garden\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Raga\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Festival\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Landscape\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Fonts\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Cityscape\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Globalization\MCT\MCT-US\Wallpaper\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Afternoon\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Sonata\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\assembly\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Calligraphy\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Savanna\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Globalization\MCT\MCT-GB\Link\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Characters\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Delta\Desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Offline Web Pages\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini AE 0124 BE.exe -
Drops autorun.inf file 1 TTPs 25 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
winlogon.exeAE 0124 BE.exedescription ioc process File opened for modification \??\I:\Autorun.inf winlogon.exe File opened for modification \??\M:\Autorun.inf winlogon.exe File opened for modification \??\O:\Autorun.inf winlogon.exe File opened for modification \??\U:\Autorun.inf winlogon.exe File opened for modification \??\V:\Autorun.inf winlogon.exe File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\autorun.inf AE 0124 BE.exe File opened for modification \??\P:\Autorun.inf winlogon.exe File opened for modification \??\R:\Autorun.inf winlogon.exe File opened for modification \??\E:\Autorun.inf winlogon.exe File opened for modification \??\F:\Autorun.inf winlogon.exe File opened for modification \??\H:\Autorun.inf winlogon.exe File opened for modification \??\J:\Autorun.inf winlogon.exe File opened for modification \??\L:\Autorun.inf winlogon.exe File opened for modification \??\N:\Autorun.inf winlogon.exe File opened for modification \??\S:\Autorun.inf winlogon.exe File opened for modification C:\Autorun.inf winlogon.exe File opened for modification \??\T:\Autorun.inf winlogon.exe File opened for modification \??\W:\Autorun.inf winlogon.exe File opened for modification \??\X:\Autorun.inf winlogon.exe File opened for modification \??\Y:\Autorun.inf winlogon.exe File opened for modification D:\Autorun.inf winlogon.exe File opened for modification \??\G:\Autorun.inf winlogon.exe File opened for modification \??\K:\Autorun.inf winlogon.exe File opened for modification \??\Q:\Autorun.inf winlogon.exe File opened for modification \??\Z:\Autorun.inf winlogon.exe -
Drops file in System32 directory 64 IoCs
Processes:
AE 0124 BE.exedescription ioc process File opened for modification C:\Windows\SysWOW64\d3d8thk.dll AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\dfrgui.exe AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\onex.dll AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\ticrf.rat AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\de-DE\ipconfig.exe.mui AE 0124 BE.exe File opened for modification C:\Windows\System32\DriverStore\en-US\vhdmp.inf_loc AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\timedate.cpl AE 0124 BE.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-TFTP-Client-Package~31bf3856ad364e35~amd64~it-IT~6.1.7601.17514.cat AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\P2PGraph.dll AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\UXInit.dll AE 0124 BE.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-LanguagePack-Package-wrapper~31bf3856ad364e35~amd64~en-US~6.1.7601.17514.cat AE 0124 BE.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-RecDisc-SDP-Package~31bf3856ad364e35~amd64~en-US~6.1.7601.17514.cat AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\WsmWmiPl.dll AE 0124 BE.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Win8IP-Microsoft-Windows-DownlevelApisets-WinIP-Package~31bf3856ad364e35~amd64~uk-UA~7.1.7601.16492.cat AE 0124 BE.exe File opened for modification C:\Windows\System32\DriverStore\drvindex.dat AE 0124 BE.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\mdmntt1.inf_amd64_neutral_ecf5cff2236b273a AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\KBDCR.DLL AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\write.exe AE 0124 BE.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Help-Customization-Package~31bf3856ad364e35~amd64~~6.1.7601.17514.cat AE 0124 BE.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\mdmmega.inf_amd64_neutral_f9c441ed24f00358 AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\vcamp120.dll AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\sxproxy.dll AE 0124 BE.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\ntprint.cat AE 0124 BE.exe File opened for modification C:\Windows\System32\DriverStore\de-DE\adpu320.inf_loc AE 0124 BE.exe File opened for modification C:\Windows\System32\DriverStore\de-DE\brmfcmf.inf_loc AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\de-DE\ulib.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\connect.dll AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\KBDAZEL.DLL AE 0124 BE.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Win8IP-Microsoft-Windows-DownlevelApisets-WinIP-Package~31bf3856ad364e35~amd64~sk-SK~7.1.7601.16492.cat AE 0124 BE.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\mdmtron.inf_amd64_neutral_1121c7f92e9e3001 AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\KBDINBE2.DLL AE 0124 BE.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Killbits-Package~31bf3856ad364e35~amd64~~8.0.7601.17514.cat AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\de-DE\Licenses\OEM\Professional\license.rtf AE 0124 BE.exe File opened for modification C:\Windows\System32\DriverStore\de-DE\cdrom.inf_loc AE 0124 BE.exe File opened for modification C:\Windows\System32\DriverStore\de-DE\smartcrd.inf_loc AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\dmcompos.dll AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\msshavmsg.dll AE 0124 BE.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Media-Foundation-Package~31bf3856ad364e35~amd64~it-IT~6.1.7601.17514.cat AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\de-DE\comres.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\de-DE\MMDevAPI.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\VIDRESZR.DLL AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\wer.dll AE 0124 BE.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-MobilePC-Client-Basic-Package~31bf3856ad364e35~amd64~es-ES~6.1.7601.17514.cat AE 0124 BE.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SystemRestore-Package~31bf3856ad364e35~amd64~~6.1.7601.17514.cat AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\de-DE\Winrs.exe.mui AE 0124 BE.exe File opened for modification C:\Windows\System32\DriverStore\de-DE\sbp2.inf_loc AE 0124 BE.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\digitalmediadevice.inf_amd64_neutral_6fd673519d66ab20 AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\wscui.cpl AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\de-DE\gpscript.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\de-DE\samsrv.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Win8IP-Microsoft-Windows-DownlevelApisets-Base-WinIP-Package~31bf3856ad364e35~amd64~it-IT~7.1.7601.16492.cat AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\de-DE\cliconfg.rll.mui AE 0124 BE.exe File opened for modification C:\Windows\System32\DriverStore\de-DE\prnlx003.inf_loc AE 0124 BE.exe File opened for modification C:\Windows\System32\DriverStore\es-ES\netvwififlt.inf_loc AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\mfps.dll AE 0124 BE.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-PhotoPremiumPackage~31bf3856ad364e35~amd64~en-US~6.1.7601.17514.cat AE 0124 BE.exe File opened for modification C:\Windows\System32\DriverStore\es-ES\keyboard.inf_loc AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\dxtrans.dll AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\xpsrchvw.xml AE 0124 BE.exe File opened for modification C:\Windows\System32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Backup-Package~31bf3856ad364e35~amd64~es-ES~6.1.7601.17514.cat AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\diantz.exe AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\NlsLexicons0019.dll AE 0124 BE.exe File opened for modification C:\Windows\SysWOW64\de-DE\slcext.dll.mui AE 0124 BE.exe -
Drops file in Windows directory 64 IoCs
Processes:
AE 0124 BE.exedescription ioc process File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallSqlState.sql AE 0124 BE.exe File opened for modification C:\Windows\PolicyDefinitions\es-ES\WindowsRemoteShell.adml AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine.resources\2.0.0.0_de_b03f5f7f11d50a3a\Microsoft.Build.Engine.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\Fonts\PLAYBILL.TTF AE 0124 BE.exe File opened for modification C:\Windows\Help\Windows\es-ES\fax.h1s AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_64\SMSvcHost\04d794428d635f6a82ac57dd3d6f3628\SMSvcHost.ni.exe AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\PCW\it-IT AE 0124 BE.exe File opened for modification C:\Windows\Fonts\CALIST.TTF AE 0124 BE.exe File opened for modification C:\Windows\Help\Windows\de-DE\netw.h1s AE 0124 BE.exe File opened for modification C:\Windows\servicing\Packages\Win8IP-Microsoft-Windows-Printing-Package~31bf3856ad364e35~amd64~~7.1.7601.16492.mum AE 0124 BE.exe File opened for modification C:\Windows\Speech\Engines\SR\ja-JP\p1041.ngr AE 0124 BE.exe File opened for modification C:\Windows\Help\Windows\fr-FR\restore.h1s AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\it\ServiceModelReg.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-SecureStartup-Package~31bf3856ad364e35~amd64~de-DE~6.1.7601.17514.mum AE 0124 BE.exe File opened for modification C:\Windows\servicing\Packages\Win8IP-Microsoft-Windows-Multimedia-Package~31bf3856ad364e35~amd64~ar-SA~7.1.7601.16492.cat AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Transactions\baa30f3e0869fa3e8885df044c880bbc AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Networking\DiagPackage.dll AE 0124 BE.exe File opened for modification C:\Windows\Installer\4735.msi AE 0124 BE.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-RDC-Package~31bf3856ad364e35~amd64~it-IT~6.1.7601.17514.mum AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0 AE 0124 BE.exe File opened for modification C:\Windows\Fonts\FRAMDCN.TTF AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\Security\Wizard\App_LocalResources\wizard.aspx.ja.resx AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\es\System.ServiceProcess.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\it\SMDiagnostics.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\System.Net.Security.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\MICROSOFT.VISUALBASIC.COMPATIBILITY.resources\8.0.0.0_fr_b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\Fonts\BELL.TTF AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Activities.Build AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\index\NetworkDiagnostics_1_Web.xml AE 0124 BE.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-SNMP-Package~31bf3856ad364e35~amd64~fr-FR~6.1.7601.17514.cat AE 0124 BE.exe File opened for modification C:\Windows\schemas\EAPHost\baseeapmethodusercredentials.xsd AE 0124 BE.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-PlatformUpdate-Win7-SRV08R2-Package~31bf3856ad364e35~amd64~ar-SA~7.1.7601.16492.cat AE 0124 BE.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-RasRip-Package~31bf3856ad364e35~amd64~es-ES~6.1.7601.17514.mum AE 0124 BE.exe File opened for modification C:\Windows\servicing\Packages\Package_for_KB4019990_RTM~31bf3856ad364e35~amd64~~6.1.1.2.cat AE 0124 BE.exe File opened for modification C:\Windows\servicing\Packages\Win8IP-Microsoft-Windows-Multimedia-Package~31bf3856ad364e35~amd64~hi-IN~7.1.7601.16492.cat AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_64\ISymWrapper\2.0.0.0__b03f5f7f11d50a3a\ISymWrapper.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\UIAutomationClient\eca4310274a7a6ce651b33cd4278610c AE 0124 BE.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2th1 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.MemoryMappedFiles\v4.0_4.0.0.0__b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\System.Web.Extensions.dll AE 0124 BE.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-CodecPack-Basic-Encoder-Package~31bf3856ad364e35~amd64~~6.1.7601.17514.cat AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.Services.resources\3.5.0.0_it_b77a5c561934e089\System.Data.Services.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\selectedTab_1x1.gif AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_state.exe AE 0124 BE.exe File opened for modification C:\Windows\PolicyDefinitions\en-US\UserDataBackup.adml AE 0124 BE.exe File opened for modification C:\Windows\Downloaded Program Files AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0 AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\System.IO.Log\19837bdc62b7667aba81364142e3565a\System.IO.Log.ni.dll AE 0124 BE.exe File opened for modification C:\Windows\Help\mui\0409\iscsi_init.CHM AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Presentation\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Presentation.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\NlsData0009.dll AE 0124 BE.exe File opened for modification C:\Windows\Help\Windows\de-DE\parent.h1s AE 0124 BE.exe File opened for modification C:\Windows\inf\rspndr.inf AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\System.ServiceModel.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.rsp AE 0124 BE.exe File opened for modification C:\Windows\en-US\winhlp32.exe.mui AE 0124 BE.exe File opened for modification C:\Windows\inf\net1yx64.PNF AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe AE 0124 BE.exe File opened for modification C:\Windows\PolicyDefinitions\ja-JP\LanmanServer.adml AE 0124 BE.exe File opened for modification C:\Windows\servicing\Packages\Win8IP-Microsoft-Windows-DownlevelApisets-Shell-WinIP-Package~31bf3856ad364e35~amd64~uk-UA~7.1.7601.16492.mum AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\1040 AE 0124 BE.exe File opened for modification C:\Windows\servicing\Editions\EnterpriseEdition.xml AE 0124 BE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbafda4d2839344b902c87c07ddf25a1000000000200000000001066000000010000200000004a045e649f63f7ad05360a5a1fb1d7695b8b4cab086318e4ff9917ef920a4c35000000000e80000000020000200000005ec7a21cc6c5da186926205ac160100cf93abf33171a4ff32e8e63c541fa2b85200000003238d55eae09d4af849989a1880d2b6befd6d2904bdfd1bad8f6d6568c7699a740000000271fc215eacce0eaf19a6dce3b7600d08d5c11b4fcbc581abb933be6512256d0126d402c59f71188454a55e73e0ac6b91edf6c94e3070778538997c45de7b890 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376007672" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{933A2CA1-6B7E-11ED-9E35-7AAB9C3024C2} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0537a6d8bffd801 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 872 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exeiexplore.exeIEXPLORE.EXEwinlogon.exeAE 0124 BE.exewinlogon.exewinlogon.exepid process 2024 f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe 872 iexplore.exe 872 iexplore.exe 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1788 winlogon.exe 276 AE 0124 BE.exe 1692 winlogon.exe 432 winlogon.exe 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exeiexplore.exewinlogon.exeAE 0124 BE.exedescription pid process target process PID 2024 wrote to memory of 872 2024 f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe iexplore.exe PID 2024 wrote to memory of 872 2024 f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe iexplore.exe PID 2024 wrote to memory of 872 2024 f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe iexplore.exe PID 2024 wrote to memory of 872 2024 f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe iexplore.exe PID 872 wrote to memory of 1268 872 iexplore.exe IEXPLORE.EXE PID 872 wrote to memory of 1268 872 iexplore.exe IEXPLORE.EXE PID 872 wrote to memory of 1268 872 iexplore.exe IEXPLORE.EXE PID 872 wrote to memory of 1268 872 iexplore.exe IEXPLORE.EXE PID 2024 wrote to memory of 1788 2024 f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe winlogon.exe PID 2024 wrote to memory of 1788 2024 f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe winlogon.exe PID 2024 wrote to memory of 1788 2024 f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe winlogon.exe PID 2024 wrote to memory of 1788 2024 f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe winlogon.exe PID 1788 wrote to memory of 276 1788 winlogon.exe AE 0124 BE.exe PID 1788 wrote to memory of 276 1788 winlogon.exe AE 0124 BE.exe PID 1788 wrote to memory of 276 1788 winlogon.exe AE 0124 BE.exe PID 1788 wrote to memory of 276 1788 winlogon.exe AE 0124 BE.exe PID 276 wrote to memory of 1692 276 AE 0124 BE.exe winlogon.exe PID 276 wrote to memory of 1692 276 AE 0124 BE.exe winlogon.exe PID 276 wrote to memory of 1692 276 AE 0124 BE.exe winlogon.exe PID 276 wrote to memory of 1692 276 AE 0124 BE.exe winlogon.exe PID 1788 wrote to memory of 432 1788 winlogon.exe winlogon.exe PID 1788 wrote to memory of 432 1788 winlogon.exe winlogon.exe PID 1788 wrote to memory of 432 1788 winlogon.exe winlogon.exe PID 1788 wrote to memory of 432 1788 winlogon.exe winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe"C:\Users\Admin\AppData\Local\Temp\f07321d518899920642ef12d783f600093e461afcc11c37413d3046cb53f1e38.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Windows\AE 0124 BE.gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:872 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1268 -
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops autorun.inf file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\AE 0124 BE.exe"C:\Windows\AE 0124 BE.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD5fc6a7894330bbf4f4b574f7031e56bd4
SHA1313cf528fba08228b0e9a3d02ff8b256fc265fec
SHA25695c6cd3309535ee46baed9711eed0f0f68ab2cdf95993aaecf094e9d4a9b4ca8
SHA5125370c4a597eb89b539ca440289dba1c6adc838c4853112ae70ff67b76c678b9b35e004a0b6a85fd80f487b17e6bf3b98fcbf36d3915b32cdcc4544159a7ea1e9
-
Filesize
130KB
MD54027bf9b2bf3265f1da3f5aa9e4ec2c1
SHA1c104f6f780032aa1592d9b1e309477e127f16067
SHA25682177bfcb6ee47409884d33a0c4794b8536913e4be21c7badb2c375535587a3f
SHA51232bf1999d8ad128e24b55b404a5b69102f386a1bbbec2d3077c1b28e3c90b2ea94d5ed072d3e401801c202a6f8c424fcb82ba9f3f1e9745e3f3452824c175c7e
-
Filesize
130KB
MD54027bf9b2bf3265f1da3f5aa9e4ec2c1
SHA1c104f6f780032aa1592d9b1e309477e127f16067
SHA25682177bfcb6ee47409884d33a0c4794b8536913e4be21c7badb2c375535587a3f
SHA51232bf1999d8ad128e24b55b404a5b69102f386a1bbbec2d3077c1b28e3c90b2ea94d5ed072d3e401801c202a6f8c424fcb82ba9f3f1e9745e3f3452824c175c7e
-
Filesize
66KB
MD50d357db753e66654668e939fb9414b58
SHA14fd2aa7c70d4bd74e46d0e8ff90ea5961f77ec9a
SHA256a6a20802a87d726a4b69faded5a0ee8814eceb0335ddd26401da6c88397e546c
SHA512872a8bf82a4813db78aa52edd79b86a103f0ce54260f1a06bdc19409baebde55d02e620027eb4b7d83fd0c9f74495816f3162cd390097366369b4492fbfeea70
-
Filesize
131KB
MD57751fc6df40c72feb08fa58ab5d6c7ca
SHA18846ea17927bc1f8b30566efc5185a8b9e216271
SHA256d09b2a9177500f933794d83b18e8b3ec527e61df1bb63af9dcbcb1ee8e4943bd
SHA5128f92a60d59cd20f22d1bf2a32a642fafeb6331e6e7529033e48fbbed0afe7aeb23b5fd9a3ba57a3a7e9a716f8461c4c3e3a1d90ffc5918ca4d521bc1ed8de6da
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
130KB
MD54027bf9b2bf3265f1da3f5aa9e4ec2c1
SHA1c104f6f780032aa1592d9b1e309477e127f16067
SHA25682177bfcb6ee47409884d33a0c4794b8536913e4be21c7badb2c375535587a3f
SHA51232bf1999d8ad128e24b55b404a5b69102f386a1bbbec2d3077c1b28e3c90b2ea94d5ed072d3e401801c202a6f8c424fcb82ba9f3f1e9745e3f3452824c175c7e
-
Filesize
130KB
MD54027bf9b2bf3265f1da3f5aa9e4ec2c1
SHA1c104f6f780032aa1592d9b1e309477e127f16067
SHA25682177bfcb6ee47409884d33a0c4794b8536913e4be21c7badb2c375535587a3f
SHA51232bf1999d8ad128e24b55b404a5b69102f386a1bbbec2d3077c1b28e3c90b2ea94d5ed072d3e401801c202a6f8c424fcb82ba9f3f1e9745e3f3452824c175c7e
-
Filesize
130KB
MD54027bf9b2bf3265f1da3f5aa9e4ec2c1
SHA1c104f6f780032aa1592d9b1e309477e127f16067
SHA25682177bfcb6ee47409884d33a0c4794b8536913e4be21c7badb2c375535587a3f
SHA51232bf1999d8ad128e24b55b404a5b69102f386a1bbbec2d3077c1b28e3c90b2ea94d5ed072d3e401801c202a6f8c424fcb82ba9f3f1e9745e3f3452824c175c7e
-
Filesize
130KB
MD54027bf9b2bf3265f1da3f5aa9e4ec2c1
SHA1c104f6f780032aa1592d9b1e309477e127f16067
SHA25682177bfcb6ee47409884d33a0c4794b8536913e4be21c7badb2c375535587a3f
SHA51232bf1999d8ad128e24b55b404a5b69102f386a1bbbec2d3077c1b28e3c90b2ea94d5ed072d3e401801c202a6f8c424fcb82ba9f3f1e9745e3f3452824c175c7e
-
Filesize
21B
MD59cceaa243c5d161e1ce41c7dad1903dd
SHA1e3da72675df53fffa781d4377d1d62116eafb35b
SHA256814649b436ea43dd2abb99693e06019d4079ee74d02a0395913add0ba92d0189
SHA512af9b75dc9a0b39d12d48bf6d40eb7d778eb9dd976302792271d8d4245a916027cf4e705d6cd7a5e6582ba94953346f291122f27d377b2c1a86e45f49e92efb5b
-
Filesize
21B
MD59cceaa243c5d161e1ce41c7dad1903dd
SHA1e3da72675df53fffa781d4377d1d62116eafb35b
SHA256814649b436ea43dd2abb99693e06019d4079ee74d02a0395913add0ba92d0189
SHA512af9b75dc9a0b39d12d48bf6d40eb7d778eb9dd976302792271d8d4245a916027cf4e705d6cd7a5e6582ba94953346f291122f27d377b2c1a86e45f49e92efb5b
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
130KB
MD54027bf9b2bf3265f1da3f5aa9e4ec2c1
SHA1c104f6f780032aa1592d9b1e309477e127f16067
SHA25682177bfcb6ee47409884d33a0c4794b8536913e4be21c7badb2c375535587a3f
SHA51232bf1999d8ad128e24b55b404a5b69102f386a1bbbec2d3077c1b28e3c90b2ea94d5ed072d3e401801c202a6f8c424fcb82ba9f3f1e9745e3f3452824c175c7e
-
Filesize
130KB
MD54027bf9b2bf3265f1da3f5aa9e4ec2c1
SHA1c104f6f780032aa1592d9b1e309477e127f16067
SHA25682177bfcb6ee47409884d33a0c4794b8536913e4be21c7badb2c375535587a3f
SHA51232bf1999d8ad128e24b55b404a5b69102f386a1bbbec2d3077c1b28e3c90b2ea94d5ed072d3e401801c202a6f8c424fcb82ba9f3f1e9745e3f3452824c175c7e
-
Filesize
130KB
MD54027bf9b2bf3265f1da3f5aa9e4ec2c1
SHA1c104f6f780032aa1592d9b1e309477e127f16067
SHA25682177bfcb6ee47409884d33a0c4794b8536913e4be21c7badb2c375535587a3f
SHA51232bf1999d8ad128e24b55b404a5b69102f386a1bbbec2d3077c1b28e3c90b2ea94d5ed072d3e401801c202a6f8c424fcb82ba9f3f1e9745e3f3452824c175c7e
-
Filesize
130KB
MD54027bf9b2bf3265f1da3f5aa9e4ec2c1
SHA1c104f6f780032aa1592d9b1e309477e127f16067
SHA25682177bfcb6ee47409884d33a0c4794b8536913e4be21c7badb2c375535587a3f
SHA51232bf1999d8ad128e24b55b404a5b69102f386a1bbbec2d3077c1b28e3c90b2ea94d5ed072d3e401801c202a6f8c424fcb82ba9f3f1e9745e3f3452824c175c7e
-
Filesize
130KB
MD54027bf9b2bf3265f1da3f5aa9e4ec2c1
SHA1c104f6f780032aa1592d9b1e309477e127f16067
SHA25682177bfcb6ee47409884d33a0c4794b8536913e4be21c7badb2c375535587a3f
SHA51232bf1999d8ad128e24b55b404a5b69102f386a1bbbec2d3077c1b28e3c90b2ea94d5ed072d3e401801c202a6f8c424fcb82ba9f3f1e9745e3f3452824c175c7e
-
Filesize
130KB
MD54027bf9b2bf3265f1da3f5aa9e4ec2c1
SHA1c104f6f780032aa1592d9b1e309477e127f16067
SHA25682177bfcb6ee47409884d33a0c4794b8536913e4be21c7badb2c375535587a3f
SHA51232bf1999d8ad128e24b55b404a5b69102f386a1bbbec2d3077c1b28e3c90b2ea94d5ed072d3e401801c202a6f8c424fcb82ba9f3f1e9745e3f3452824c175c7e