Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe
Resource
win10v2004-20220812-en
General
-
Target
d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe
-
Size
704KB
-
MD5
01c8ccb0190c4ae2d1aa3bcd40dc3050
-
SHA1
b885f05169d2a4987a953e6993b1243eba567408
-
SHA256
d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9
-
SHA512
d8a15c31d78d9349e111eb0b829aff06b92c43cf5aa58965201819053a7f5651a0065aa788475f6d0d76c37d66fb344fcd642b93d8d91038b76a1b54f9ba7962
-
SSDEEP
12288:WpgvmzFHi0mo5aH0qMzd5807FmPJQPDHvd:WpgvOHi0mGaH0qSdPF44V
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" aihlq.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" aihlq.exe -
Adds policy Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\luuzfm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\niuldwuexqakhefraq.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eqtbkujku = "eyjzqifogyhqmiitb.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eqtbkujku = "eyjzqifogyhqmiitb.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\luuzfm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aynhcyzmiereeeixjcomb.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eqtbkujku = "yuhzsmlwqkvgecerbsc.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\luuzfm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eyjzqifogyhqmiitb.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\luuzfm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eyjzqifogyhqmiitb.exe" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\luuzfm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\liwpjeeqlgsedcftewhe.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eqtbkujku = "aynhcyzmiereeeixjcomb.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eqtbkujku = "liwpjeeqlgsedcftewhe.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eqtbkujku = "aynhcyzmiereeeixjcomb.exe" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\luuzfm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\niuldwuexqakhefraq.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eqtbkujku = "xqapfwsariqytonx.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\luuzfm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\liwpjeeqlgsedcftewhe.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eqtbkujku = "niuldwuexqakhefraq.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eqtbkujku = "eyjzqifogyhqmiitb.exe" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\luuzfm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yuhzsmlwqkvgecerbsc.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eqtbkujku = "niuldwuexqakhefraq.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\luuzfm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xqapfwsariqytonx.exe" aihlq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eqtbkujku = "yuhzsmlwqkvgecerbsc.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\luuzfm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yuhzsmlwqkvgecerbsc.exe" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\luuzfm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xqapfwsariqytonx.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\luuzfm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yuhzsmlwqkvgecerbsc.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eqtbkujku = "aynhcyzmiereeeixjcomb.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eqtbkujku = "xqapfwsariqytonx.exe" aihlq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run aihlq.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aihlq.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aihlq.exe -
Executes dropped EXE 2 IoCs
pid Process 1236 aihlq.exe 632 aihlq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sglvgsjmykn = "liwpjeeqlgsedcftewhe.exe ." aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yijpwer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\liwpjeeqlgsedcftewhe.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\yijpwer = "xqapfwsariqytonx.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pekvhumqdquy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eyjzqifogyhqmiitb.exe ." aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yijpwer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eyjzqifogyhqmiitb.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "aynhcyzmiereeeixjcomb.exe ." aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pekvhumqdquy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yuhzsmlwqkvgecerbsc.exe ." aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "aynhcyzmiereeeixjcomb.exe ." aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yijpwer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yuhzsmlwqkvgecerbsc.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pekvhumqdquy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aynhcyzmiereeeixjcomb.exe ." d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xkoxhsikvg = "xqapfwsariqytonx.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "liwpjeeqlgsedcftewhe.exe ." aihlq.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xkoxhsikvg = "eyjzqifogyhqmiitb.exe" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yuhzsmlwqkvgecerbsc.exe ." aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pekvhumqdquy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aynhcyzmiereeeixjcomb.exe ." aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xkoxhsikvg = "aynhcyzmiereeeixjcomb.exe" aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sglvgsjmykn = "liwpjeeqlgsedcftewhe.exe ." aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pekvhumqdquy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\niuldwuexqakhefraq.exe ." aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "eyjzqifogyhqmiitb.exe ." d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oelxkyrwkydia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aynhcyzmiereeeixjcomb.exe" aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sglvgsjmykn = "yuhzsmlwqkvgecerbsc.exe ." aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sglvgsjmykn = "niuldwuexqakhefraq.exe ." aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xkoxhsikvg = "yuhzsmlwqkvgecerbsc.exe" aihlq.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yijpwer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\niuldwuexqakhefraq.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\yijpwer = "liwpjeeqlgsedcftewhe.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\yijpwer = "aynhcyzmiereeeixjcomb.exe" aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\niuldwuexqakhefraq.exe ." aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xkoxhsikvg = "eyjzqifogyhqmiitb.exe" aihlq.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\liwpjeeqlgsedcftewhe.exe ." d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xqapfwsariqytonx.exe ." aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yijpwer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\niuldwuexqakhefraq.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oelxkyrwkydia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xqapfwsariqytonx.exe" aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sglvgsjmykn = "aynhcyzmiereeeixjcomb.exe ." d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xqapfwsariqytonx.exe ." aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aynhcyzmiereeeixjcomb.exe ." aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yijpwer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xqapfwsariqytonx.exe" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xkoxhsikvg = "niuldwuexqakhefraq.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pekvhumqdquy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yuhzsmlwqkvgecerbsc.exe ." aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xkoxhsikvg = "yuhzsmlwqkvgecerbsc.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "eyjzqifogyhqmiitb.exe ." aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oelxkyrwkydia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xqapfwsariqytonx.exe" aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yijpwer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aynhcyzmiereeeixjcomb.exe" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\yijpwer = "eyjzqifogyhqmiitb.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "yuhzsmlwqkvgecerbsc.exe ." aihlq.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xkoxhsikvg = "xqapfwsariqytonx.exe" aihlq.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xkoxhsikvg = "liwpjeeqlgsedcftewhe.exe" aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aynhcyzmiereeeixjcomb.exe ." d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oelxkyrwkydia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aynhcyzmiereeeixjcomb.exe" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pekvhumqdquy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xqapfwsariqytonx.exe ." aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\yijpwer = "eyjzqifogyhqmiitb.exe" aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "yuhzsmlwqkvgecerbsc.exe ." aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\yijpwer = "liwpjeeqlgsedcftewhe.exe" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pekvhumqdquy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\niuldwuexqakhefraq.exe ." aihlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "niuldwuexqakhefraq.exe ." aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nyahpymm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\liwpjeeqlgsedcftewhe.exe ." aihlq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yijpwer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\liwpjeeqlgsedcftewhe.exe" aihlq.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aihlq.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aihlq.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 www.showmyipaddress.com 18 whatismyip.everdot.org 24 whatismyipaddress.com 31 whatismyip.everdot.org -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\cgbbcelegibuagqldcuyttu.dwy aihlq.exe File created C:\Windows\SysWOW64\cgbbcelegibuagqldcuyttu.dwy aihlq.exe File opened for modification C:\Windows\SysWOW64\pekvhumqdquypgbhkuxmsdpcuylycgxojp.cfu aihlq.exe File created C:\Windows\SysWOW64\pekvhumqdquypgbhkuxmsdpcuylycgxojp.cfu aihlq.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\cgbbcelegibuagqldcuyttu.dwy aihlq.exe File created C:\Program Files (x86)\cgbbcelegibuagqldcuyttu.dwy aihlq.exe File opened for modification C:\Program Files (x86)\pekvhumqdquypgbhkuxmsdpcuylycgxojp.cfu aihlq.exe File created C:\Program Files (x86)\pekvhumqdquypgbhkuxmsdpcuylycgxojp.cfu aihlq.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\cgbbcelegibuagqldcuyttu.dwy aihlq.exe File created C:\Windows\cgbbcelegibuagqldcuyttu.dwy aihlq.exe File opened for modification C:\Windows\pekvhumqdquypgbhkuxmsdpcuylycgxojp.cfu aihlq.exe File created C:\Windows\pekvhumqdquypgbhkuxmsdpcuylycgxojp.cfu aihlq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings aihlq.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings aihlq.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe 1236 aihlq.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 632 aihlq.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1236 aihlq.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4200 wrote to memory of 1236 4200 d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe 80 PID 4200 wrote to memory of 1236 4200 d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe 80 PID 4200 wrote to memory of 1236 4200 d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe 80 PID 4200 wrote to memory of 632 4200 d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe 81 PID 4200 wrote to memory of 632 4200 d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe 81 PID 4200 wrote to memory of 632 4200 d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe 81 -
System policy modification 1 TTPs 39 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" aihlq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System aihlq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" aihlq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" aihlq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" aihlq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe"C:\Users\Admin\AppData\Local\Temp\d5b7c970e04ae56a1d7f2b096de69d6dd024c1cb6bb4e9c20f6e1fb446c70ff9.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\aihlq.exe"C:\Users\Admin\AppData\Local\Temp\aihlq.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\aihlq.exe"C:\Users\Admin\AppData\Local\Temp\aihlq.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- System policy modification
PID:632
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD59a28699f7dab37a2ca3d63137ec3ffdf
SHA1862542b1df2639f324c4ae71fd33f7b3fa2cae8c
SHA2566e42866813824004717d9af55c4772f6c43e7b5063a8f7a133f518af74564a07
SHA512a372467c269b02060f16ca60adc35fdca1d1356d8c899cd48c97a4d79048a0005e42b0d19d0c80f74a32775eb3cda5fac7b890608ee68834f558ba5d8c5ed505
-
Filesize
1.2MB
MD59a28699f7dab37a2ca3d63137ec3ffdf
SHA1862542b1df2639f324c4ae71fd33f7b3fa2cae8c
SHA2566e42866813824004717d9af55c4772f6c43e7b5063a8f7a133f518af74564a07
SHA512a372467c269b02060f16ca60adc35fdca1d1356d8c899cd48c97a4d79048a0005e42b0d19d0c80f74a32775eb3cda5fac7b890608ee68834f558ba5d8c5ed505
-
Filesize
1.2MB
MD59a28699f7dab37a2ca3d63137ec3ffdf
SHA1862542b1df2639f324c4ae71fd33f7b3fa2cae8c
SHA2566e42866813824004717d9af55c4772f6c43e7b5063a8f7a133f518af74564a07
SHA512a372467c269b02060f16ca60adc35fdca1d1356d8c899cd48c97a4d79048a0005e42b0d19d0c80f74a32775eb3cda5fac7b890608ee68834f558ba5d8c5ed505