Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe
Resource
win10v2004-20220812-en
General
-
Target
766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe
-
Size
516KB
-
MD5
a1a52e3e5151070fcd007d8383c95da8
-
SHA1
b924a17678d70f324a169f5704c9e6530843dd86
-
SHA256
766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
-
SHA512
d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
SSDEEP
12288:ImDNhOPnxBnHkapLjTn/rhlUy1WsnBcbc:I9BnHZpLHrtWsic
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" xaqwail.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xaqwail.exe -
Adds policy Run key to start application 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xaqwail.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rysckwdvdqn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wihwjamjwoqpfvqt.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rysckwdvdqn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dqqgumzxlehhyplpb.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oyvitisnyoolzn = "mabshaoncwabtlinag.exe" vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oyvitisnyoolzn = "kadwniyzqmsvpjipemcf.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rysckwdvdqn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kadwniyzqmsvpjipemcf.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oyvitisnyoolzn = "dqqgumzxlehhyplpb.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rysckwdvdqn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dqqgumzxlehhyplpb.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rysckwdvdqn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wihwjamjwoqpfvqt.exe" xaqwail.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rysckwdvdqn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xmogwqffvqvxqjhnbix.exe" vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oyvitisnyoolzn = "dqqgumzxlehhyplpb.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oyvitisnyoolzn = "kadwniyzqmsvpjipemcf.exe" xaqwail.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xaqwail.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vsmxiywcfcw.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xaqwail.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xaqwail.exe -
Executes dropped EXE 3 IoCs
pid Process 1176 vsmxiywcfcw.exe 2024 xaqwail.exe 1984 xaqwail.exe -
Loads dropped DLL 6 IoCs
pid Process 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1176 vsmxiywcfcw.exe 1176 vsmxiywcfcw.exe 1176 vsmxiywcfcw.exe 1176 vsmxiywcfcw.exe -
Adds Run key to start application 2 TTPs 57 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nwseoclfpedzm = "dqqgumzxlehhyplpb.exe ." vsmxiywcfcw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rcaoaqbxjabzodx = "zquogctvnkrvqlltjsjnh.exe" vsmxiywcfcw.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\owrclygziwup = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mabshaoncwabtlinag.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\owrclygziwup = "kadwniyzqmsvpjipemcf.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nwseoclfpedzm = "mabshaoncwabtlinag.exe ." xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dqqgumzxlehhyplpb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kadwniyzqmsvpjipemcf.exe ." vsmxiywcfcw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\owrclygziwup = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kadwniyzqmsvpjipemcf.exe" vsmxiywcfcw.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dqqgumzxlehhyplpb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mabshaoncwabtlinag.exe ." xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\owrclygziwup = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wihwjamjwoqpfvqt.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dqqgumzxlehhyplpb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wihwjamjwoqpfvqt.exe ." xaqwail.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\owrclygziwup = "zquogctvnkrvqlltjsjnh.exe" vsmxiywcfcw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wihwjamjwoqpfvqt = "zquogctvnkrvqlltjsjnh.exe ." xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dqqgumzxlehhyplpb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mabshaoncwabtlinag.exe ." xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mabshaoncwabtlinag = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kadwniyzqmsvpjipemcf.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dqqgumzxlehhyplpb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kadwniyzqmsvpjipemcf.exe ." xaqwail.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run vsmxiywcfcw.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\owrclygziwup = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kadwniyzqmsvpjipemcf.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\owrclygziwup = "kadwniyzqmsvpjipemcf.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mabshaoncwabtlinag = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mabshaoncwabtlinag.exe" xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wihwjamjwoqpfvqt = "xmogwqffvqvxqjhnbix.exe ." xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nwseoclfpedzm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dqqgumzxlehhyplpb.exe ." vsmxiywcfcw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nwseoclfpedzm = "zquogctvnkrvqlltjsjnh.exe ." xaqwail.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce vsmxiywcfcw.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nwseoclfpedzm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xmogwqffvqvxqjhnbix.exe ." xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wihwjamjwoqpfvqt = "zquogctvnkrvqlltjsjnh.exe ." vsmxiywcfcw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rcaoaqbxjabzodx = "wihwjamjwoqpfvqt.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nwseoclfpedzm = "xmogwqffvqvxqjhnbix.exe ." xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rcaoaqbxjabzodx = "zquogctvnkrvqlltjsjnh.exe" xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nwseoclfpedzm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dqqgumzxlehhyplpb.exe ." xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wihwjamjwoqpfvqt = "mabshaoncwabtlinag.exe ." xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nwseoclfpedzm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xmogwqffvqvxqjhnbix.exe ." xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mabshaoncwabtlinag = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kadwniyzqmsvpjipemcf.exe" xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wihwjamjwoqpfvqt = "kadwniyzqmsvpjipemcf.exe ." xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dqqgumzxlehhyplpb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dqqgumzxlehhyplpb.exe ." xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\owrclygziwup = "dqqgumzxlehhyplpb.exe" xaqwail.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\owrclygziwup = "xmogwqffvqvxqjhnbix.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nwseoclfpedzm = "dqqgumzxlehhyplpb.exe ." xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rcaoaqbxjabzodx = "wihwjamjwoqpfvqt.exe" xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wihwjamjwoqpfvqt = "dqqgumzxlehhyplpb.exe ." xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mabshaoncwabtlinag = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mabshaoncwabtlinag.exe" vsmxiywcfcw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\owrclygziwup = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dqqgumzxlehhyplpb.exe" xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rcaoaqbxjabzodx = "dqqgumzxlehhyplpb.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nwseoclfpedzm = "zquogctvnkrvqlltjsjnh.exe ." xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rcaoaqbxjabzodx = "kadwniyzqmsvpjipemcf.exe" xaqwail.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce xaqwail.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wihwjamjwoqpfvqt = "dqqgumzxlehhyplpb.exe ." xaqwail.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce vsmxiywcfcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\owrclygziwup = "mabshaoncwabtlinag.exe" xaqwail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mabshaoncwabtlinag = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xmogwqffvqvxqjhnbix.exe" xaqwail.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xaqwail.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xaqwail.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" vsmxiywcfcw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vsmxiywcfcw.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 whatismyip.everdot.org 18 whatismyipaddress.com 2 www.showmyipaddress.com -
Drops file in System32 directory 25 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dqqgumzxlehhyplpb.exe xaqwail.exe File opened for modification C:\Windows\SysWOW64\mabshaoncwabtlinag.exe xaqwail.exe File opened for modification C:\Windows\SysWOW64\dqqgumzxlehhyplpb.exe xaqwail.exe File opened for modification C:\Windows\SysWOW64\mabshaoncwabtlinag.exe xaqwail.exe File opened for modification C:\Windows\SysWOW64\qinibyqtmksxtpqzqasxsl.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\xmogwqffvqvxqjhnbix.exe xaqwail.exe File opened for modification C:\Windows\SysWOW64\xmogwqffvqvxqjhnbix.exe xaqwail.exe File opened for modification C:\Windows\SysWOW64\kadwniyzqmsvpjipemcf.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\zquogctvnkrvqlltjsjnh.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\xmogwqffvqvxqjhnbix.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\wihwjamjwoqpfvqt.exe xaqwail.exe File opened for modification C:\Windows\SysWOW64\kadwniyzqmsvpjipemcf.exe xaqwail.exe File opened for modification C:\Windows\SysWOW64\qinibyqtmksxtpqzqasxsl.exe xaqwail.exe File opened for modification C:\Windows\SysWOW64\qinibyqtmksxtpqzqasxsl.exe xaqwail.exe File created C:\Windows\SysWOW64\byiigifnloblmnthdspzzxz.ecf xaqwail.exe File opened for modification C:\Windows\SysWOW64\dqqgumzxlehhyplpb.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\mabshaoncwabtlinag.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\owrclygziwupbnedkksnyhucvesqlxjazg.oju xaqwail.exe File created C:\Windows\SysWOW64\owrclygziwupbnedkksnyhucvesqlxjazg.oju xaqwail.exe File opened for modification C:\Windows\SysWOW64\wihwjamjwoqpfvqt.exe xaqwail.exe File opened for modification C:\Windows\SysWOW64\kadwniyzqmsvpjipemcf.exe xaqwail.exe File opened for modification C:\Windows\SysWOW64\zquogctvnkrvqlltjsjnh.exe xaqwail.exe File opened for modification C:\Windows\SysWOW64\byiigifnloblmnthdspzzxz.ecf xaqwail.exe File opened for modification C:\Windows\SysWOW64\wihwjamjwoqpfvqt.exe vsmxiywcfcw.exe File opened for modification C:\Windows\SysWOW64\zquogctvnkrvqlltjsjnh.exe xaqwail.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\owrclygziwupbnedkksnyhucvesqlxjazg.oju xaqwail.exe File opened for modification C:\Program Files (x86)\byiigifnloblmnthdspzzxz.ecf xaqwail.exe File created C:\Program Files (x86)\byiigifnloblmnthdspzzxz.ecf xaqwail.exe File opened for modification C:\Program Files (x86)\owrclygziwupbnedkksnyhucvesqlxjazg.oju xaqwail.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\kadwniyzqmsvpjipemcf.exe xaqwail.exe File opened for modification C:\Windows\mabshaoncwabtlinag.exe xaqwail.exe File created C:\Windows\byiigifnloblmnthdspzzxz.ecf xaqwail.exe File opened for modification C:\Windows\owrclygziwupbnedkksnyhucvesqlxjazg.oju xaqwail.exe File opened for modification C:\Windows\xmogwqffvqvxqjhnbix.exe vsmxiywcfcw.exe File opened for modification C:\Windows\qinibyqtmksxtpqzqasxsl.exe vsmxiywcfcw.exe File opened for modification C:\Windows\dqqgumzxlehhyplpb.exe xaqwail.exe File opened for modification C:\Windows\xmogwqffvqvxqjhnbix.exe xaqwail.exe File created C:\Windows\owrclygziwupbnedkksnyhucvesqlxjazg.oju xaqwail.exe File opened for modification C:\Windows\wihwjamjwoqpfvqt.exe xaqwail.exe File opened for modification C:\Windows\qinibyqtmksxtpqzqasxsl.exe xaqwail.exe File opened for modification C:\Windows\wihwjamjwoqpfvqt.exe xaqwail.exe File opened for modification C:\Windows\dqqgumzxlehhyplpb.exe xaqwail.exe File opened for modification C:\Windows\byiigifnloblmnthdspzzxz.ecf xaqwail.exe File opened for modification C:\Windows\zquogctvnkrvqlltjsjnh.exe vsmxiywcfcw.exe File opened for modification C:\Windows\zquogctvnkrvqlltjsjnh.exe xaqwail.exe File opened for modification C:\Windows\kadwniyzqmsvpjipemcf.exe xaqwail.exe File opened for modification C:\Windows\qinibyqtmksxtpqzqasxsl.exe xaqwail.exe File opened for modification C:\Windows\mabshaoncwabtlinag.exe xaqwail.exe File opened for modification C:\Windows\xmogwqffvqvxqjhnbix.exe xaqwail.exe File opened for modification C:\Windows\zquogctvnkrvqlltjsjnh.exe xaqwail.exe File opened for modification C:\Windows\wihwjamjwoqpfvqt.exe vsmxiywcfcw.exe File opened for modification C:\Windows\dqqgumzxlehhyplpb.exe vsmxiywcfcw.exe File opened for modification C:\Windows\mabshaoncwabtlinag.exe vsmxiywcfcw.exe File opened for modification C:\Windows\kadwniyzqmsvpjipemcf.exe vsmxiywcfcw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1984 xaqwail.exe 1984 xaqwail.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1984 xaqwail.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1532 wrote to memory of 1176 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 27 PID 1532 wrote to memory of 1176 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 27 PID 1532 wrote to memory of 1176 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 27 PID 1532 wrote to memory of 1176 1532 766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe 27 PID 1176 wrote to memory of 2024 1176 vsmxiywcfcw.exe 28 PID 1176 wrote to memory of 2024 1176 vsmxiywcfcw.exe 28 PID 1176 wrote to memory of 2024 1176 vsmxiywcfcw.exe 28 PID 1176 wrote to memory of 2024 1176 vsmxiywcfcw.exe 28 PID 1176 wrote to memory of 1984 1176 vsmxiywcfcw.exe 29 PID 1176 wrote to memory of 1984 1176 vsmxiywcfcw.exe 29 PID 1176 wrote to memory of 1984 1176 vsmxiywcfcw.exe 29 PID 1176 wrote to memory of 1984 1176 vsmxiywcfcw.exe 29 -
System policy modification 1 TTPs 34 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" xaqwail.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vsmxiywcfcw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" xaqwail.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xaqwail.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xaqwail.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" xaqwail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" vsmxiywcfcw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xaqwail.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe"C:\Users\Admin\AppData\Local\Temp\766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\vsmxiywcfcw.exe"C:\Users\Admin\AppData\Local\Temp\vsmxiywcfcw.exe" "c:\users\admin\appdata\local\temp\766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\xaqwail.exe"C:\Users\Admin\AppData\Local\Temp\xaqwail.exe" "-c:\users\admin\appdata\local\temp\766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\xaqwail.exe"C:\Users\Admin\AppData\Local\Temp\xaqwail.exe" "-c:\users\admin\appdata\local\temp\766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1984
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
320KB
MD5159cfb5c983a7a8bb9d306284bffe894
SHA13a7d4f5889cf09d4c002edd4f2bbea0c77fd77ad
SHA256283d2fd8fbf141ddf59154db5d3b7259369dc3dfd3d1f7b6b61d25b092e697ce
SHA512c4d7132891f806a68771a88ac4b49bc53be26517fe8cb13237d813f429c5e6c2b8c76dcc3a331e557e79208e9fd6736d941481cbad48b112519464bd8be5b3a9
-
Filesize
320KB
MD5159cfb5c983a7a8bb9d306284bffe894
SHA13a7d4f5889cf09d4c002edd4f2bbea0c77fd77ad
SHA256283d2fd8fbf141ddf59154db5d3b7259369dc3dfd3d1f7b6b61d25b092e697ce
SHA512c4d7132891f806a68771a88ac4b49bc53be26517fe8cb13237d813f429c5e6c2b8c76dcc3a331e557e79208e9fd6736d941481cbad48b112519464bd8be5b3a9
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
712KB
MD52677c0ac5674d7929bf9fb75703b7c01
SHA1fd5099a527b964a44fb49b5a8cb8a179161ba3a4
SHA2561858cc7d6dc7992dfb92e6647b432b7481aff91ebfd2922d2c5506f917089cc4
SHA512c368b52136fd29e46d3405ec0c71c87b42f943d0bffbfd1d916db882569ad2064a344962b5aafb196ad6f0a7c9fac464cd88924a6428fd33c2bc4acaf940ed46
-
Filesize
712KB
MD52677c0ac5674d7929bf9fb75703b7c01
SHA1fd5099a527b964a44fb49b5a8cb8a179161ba3a4
SHA2561858cc7d6dc7992dfb92e6647b432b7481aff91ebfd2922d2c5506f917089cc4
SHA512c368b52136fd29e46d3405ec0c71c87b42f943d0bffbfd1d916db882569ad2064a344962b5aafb196ad6f0a7c9fac464cd88924a6428fd33c2bc4acaf940ed46
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
516KB
MD5a1a52e3e5151070fcd007d8383c95da8
SHA1b924a17678d70f324a169f5704c9e6530843dd86
SHA256766be53387dce453fcce035e801feb6235ee4fb08a900c3552b3373d1efc4c32
SHA512d437c4dd655adac40882707e011c05843eab5459714f66b9162cf53cdaa12b7d85ee104bbb48c510fd07f33131636411e7315ef32a66524e195680427dcbc5df
-
Filesize
320KB
MD5159cfb5c983a7a8bb9d306284bffe894
SHA13a7d4f5889cf09d4c002edd4f2bbea0c77fd77ad
SHA256283d2fd8fbf141ddf59154db5d3b7259369dc3dfd3d1f7b6b61d25b092e697ce
SHA512c4d7132891f806a68771a88ac4b49bc53be26517fe8cb13237d813f429c5e6c2b8c76dcc3a331e557e79208e9fd6736d941481cbad48b112519464bd8be5b3a9
-
Filesize
320KB
MD5159cfb5c983a7a8bb9d306284bffe894
SHA13a7d4f5889cf09d4c002edd4f2bbea0c77fd77ad
SHA256283d2fd8fbf141ddf59154db5d3b7259369dc3dfd3d1f7b6b61d25b092e697ce
SHA512c4d7132891f806a68771a88ac4b49bc53be26517fe8cb13237d813f429c5e6c2b8c76dcc3a331e557e79208e9fd6736d941481cbad48b112519464bd8be5b3a9
-
Filesize
712KB
MD52677c0ac5674d7929bf9fb75703b7c01
SHA1fd5099a527b964a44fb49b5a8cb8a179161ba3a4
SHA2561858cc7d6dc7992dfb92e6647b432b7481aff91ebfd2922d2c5506f917089cc4
SHA512c368b52136fd29e46d3405ec0c71c87b42f943d0bffbfd1d916db882569ad2064a344962b5aafb196ad6f0a7c9fac464cd88924a6428fd33c2bc4acaf940ed46
-
Filesize
712KB
MD52677c0ac5674d7929bf9fb75703b7c01
SHA1fd5099a527b964a44fb49b5a8cb8a179161ba3a4
SHA2561858cc7d6dc7992dfb92e6647b432b7481aff91ebfd2922d2c5506f917089cc4
SHA512c368b52136fd29e46d3405ec0c71c87b42f943d0bffbfd1d916db882569ad2064a344962b5aafb196ad6f0a7c9fac464cd88924a6428fd33c2bc4acaf940ed46
-
Filesize
712KB
MD52677c0ac5674d7929bf9fb75703b7c01
SHA1fd5099a527b964a44fb49b5a8cb8a179161ba3a4
SHA2561858cc7d6dc7992dfb92e6647b432b7481aff91ebfd2922d2c5506f917089cc4
SHA512c368b52136fd29e46d3405ec0c71c87b42f943d0bffbfd1d916db882569ad2064a344962b5aafb196ad6f0a7c9fac464cd88924a6428fd33c2bc4acaf940ed46
-
Filesize
712KB
MD52677c0ac5674d7929bf9fb75703b7c01
SHA1fd5099a527b964a44fb49b5a8cb8a179161ba3a4
SHA2561858cc7d6dc7992dfb92e6647b432b7481aff91ebfd2922d2c5506f917089cc4
SHA512c368b52136fd29e46d3405ec0c71c87b42f943d0bffbfd1d916db882569ad2064a344962b5aafb196ad6f0a7c9fac464cd88924a6428fd33c2bc4acaf940ed46