Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2022 17:34
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
223KB
-
MD5
d3bffde4fa0e12abcbe5ecc10630f9ff
-
SHA1
f36d4d840fe1cd3edab3148bdc89bfc7dcb243ac
-
SHA256
6a8c425fa422a441500e498ceae43d25012127266b2f46f82e81739daf02aa29
-
SHA512
3d0c0cf095dc5a247787670690c1b4ddc7969be0de570bb305eb32d683b9f480c7239cb87308f1ff74c53d38142dd4db3a2626944cbff2149dcf059c73d32c48
-
SSDEEP
3072:ADDCfQLJAs2V545qIiSsMfvofwwd4pGCVbZ0id34auDCnSCf/ln:1fQLJ/p0IiVM343abbl94aMC7
Malware Config
Extracted
redline
mario23_10
167.235.252.160:10642
-
auth_value
eca57cfb5172f71dc45986763bb98942
Extracted
djvu
http://ex3mall.com/lancer/get.php
-
extension
.isza
-
offline_id
m3KmScxfDyEQzJYP8qjOSfP4FvpsOXlekGuMPzt1
-
payload_url
http://uaery.top/dl/build2.exe
http://ex3mall.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-oWam3yYrSr Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0622JOsie
Extracted
amadey
3.61
62.204.41.79/U7vfDb3kg/index.php
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Amadey credential stealer module 2 IoCs
resource yara_rule behavioral2/files/0x000500000001e5d9-312.dat amadey_cred_module behavioral2/files/0x000500000001e5d9-313.dat amadey_cred_module -
Detected Djvu ransomware 10 IoCs
resource yara_rule behavioral2/memory/2132-193-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2132-195-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2132-197-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2204-196-0x00000000021B0000-0x00000000022CB000-memory.dmp family_djvu behavioral2/memory/2132-191-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2132-217-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3520-227-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3520-229-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3520-235-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3520-258-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects Smokeloader packer 2 IoCs
resource yara_rule behavioral2/memory/4176-133-0x0000000000570000-0x0000000000579000-memory.dmp family_smokeloader behavioral2/memory/4340-205-0x00000000005A0000-0x00000000005A9000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/3728-144-0x0000000000400000-0x0000000000460000-memory.dmp family_redline behavioral2/memory/3184-155-0x00000000007A0000-0x000000000080A000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 82 3056 rundll32.exe 84 3364 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 17 IoCs
pid Process 3184 AFFB.exe 2204 B106.exe 4892 B388.exe 4340 B790.exe 2540 BAEC.exe 3932 C2BD.exe 2132 B106.exe 2768 gntuud.exe 4724 B106.exe 3520 B106.exe 1248 build2.exe 2824 build2.exe 4144 build3.exe 4788 gntuud.exe 4444 mstsca.exe 1704 2DFB.exe 4816 gntuud.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B106.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation build2.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B388.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B106.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation gntuud.exe -
Loads dropped DLL 4 IoCs
pid Process 2824 build2.exe 2824 build2.exe 3056 rundll32.exe 3364 rundll32.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4764 icacls.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\86bb8e70-4101-4941-8a0a-b63a4347d705\\B106.exe\" --AutoStart" B106.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 40 api.2ip.ua 41 api.2ip.ua 24 api.2ip.ua 25 api.2ip.ua -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3184 set thread context of 3728 3184 AFFB.exe 89 PID 2204 set thread context of 2132 2204 B106.exe 97 PID 4724 set thread context of 3520 4724 B106.exe 110 PID 1248 set thread context of 2824 1248 build2.exe 112 PID 3056 set thread context of 456 3056 rundll32.exe 129 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 1812 3184 WerFault.exe 86 2492 2540 WerFault.exe 93 2364 4892 WerFault.exe 90 4432 3932 WerFault.exe 95 2460 4788 WerFault.exe 119 4780 1704 WerFault.exe 125 1188 4816 WerFault.exe 136 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B790.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B790.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B790.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Checks processor information in registry 2 TTPs 29 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3904 schtasks.exe 3936 schtasks.exe 1844 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3392 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Process not Found -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e0031000000000098556994100054656d7000003a0009000400efbe6b558a6c98556e942e0000000000000000000000000000000000000000000000000083d7f000540065006d007000000014000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Process not Found -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1048 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4176 file.exe 4176 file.exe 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1048 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4176 file.exe 4340 B790.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeDebugPrivilege 3728 AppLaunch.exe Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeDebugPrivilege 3056 rundll32.exe Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found Token: SeShutdownPrivilege 1048 Process not Found Token: SeCreatePagefilePrivilege 1048 Process not Found -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 1048 Process not Found 3056 rundll32.exe 456 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1048 Process not Found 1048 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 3184 1048 Process not Found 86 PID 1048 wrote to memory of 3184 1048 Process not Found 86 PID 1048 wrote to memory of 3184 1048 Process not Found 86 PID 1048 wrote to memory of 2204 1048 Process not Found 88 PID 1048 wrote to memory of 2204 1048 Process not Found 88 PID 1048 wrote to memory of 2204 1048 Process not Found 88 PID 3184 wrote to memory of 3728 3184 AFFB.exe 89 PID 3184 wrote to memory of 3728 3184 AFFB.exe 89 PID 3184 wrote to memory of 3728 3184 AFFB.exe 89 PID 3184 wrote to memory of 3728 3184 AFFB.exe 89 PID 1048 wrote to memory of 4892 1048 Process not Found 90 PID 1048 wrote to memory of 4892 1048 Process not Found 90 PID 1048 wrote to memory of 4892 1048 Process not Found 90 PID 3184 wrote to memory of 3728 3184 AFFB.exe 89 PID 1048 wrote to memory of 4340 1048 Process not Found 94 PID 1048 wrote to memory of 4340 1048 Process not Found 94 PID 1048 wrote to memory of 4340 1048 Process not Found 94 PID 1048 wrote to memory of 2540 1048 Process not Found 93 PID 1048 wrote to memory of 2540 1048 Process not Found 93 PID 1048 wrote to memory of 2540 1048 Process not Found 93 PID 1048 wrote to memory of 3932 1048 Process not Found 95 PID 1048 wrote to memory of 3932 1048 Process not Found 95 PID 1048 wrote to memory of 3932 1048 Process not Found 95 PID 2204 wrote to memory of 2132 2204 B106.exe 97 PID 2204 wrote to memory of 2132 2204 B106.exe 97 PID 2204 wrote to memory of 2132 2204 B106.exe 97 PID 2204 wrote to memory of 2132 2204 B106.exe 97 PID 2204 wrote to memory of 2132 2204 B106.exe 97 PID 2204 wrote to memory of 2132 2204 B106.exe 97 PID 2204 wrote to memory of 2132 2204 B106.exe 97 PID 2204 wrote to memory of 2132 2204 B106.exe 97 PID 2204 wrote to memory of 2132 2204 B106.exe 97 PID 2204 wrote to memory of 2132 2204 B106.exe 97 PID 4892 wrote to memory of 2768 4892 B388.exe 98 PID 4892 wrote to memory of 2768 4892 B388.exe 98 PID 4892 wrote to memory of 2768 4892 B388.exe 98 PID 2132 wrote to memory of 4764 2132 B106.exe 105 PID 2132 wrote to memory of 4764 2132 B106.exe 105 PID 2132 wrote to memory of 4764 2132 B106.exe 105 PID 2132 wrote to memory of 4724 2132 B106.exe 106 PID 2132 wrote to memory of 4724 2132 B106.exe 106 PID 2132 wrote to memory of 4724 2132 B106.exe 106 PID 2768 wrote to memory of 3936 2768 gntuud.exe 108 PID 2768 wrote to memory of 3936 2768 gntuud.exe 108 PID 2768 wrote to memory of 3936 2768 gntuud.exe 108 PID 4724 wrote to memory of 3520 4724 B106.exe 110 PID 4724 wrote to memory of 3520 4724 B106.exe 110 PID 4724 wrote to memory of 3520 4724 B106.exe 110 PID 4724 wrote to memory of 3520 4724 B106.exe 110 PID 4724 wrote to memory of 3520 4724 B106.exe 110 PID 4724 wrote to memory of 3520 4724 B106.exe 110 PID 4724 wrote to memory of 3520 4724 B106.exe 110 PID 4724 wrote to memory of 3520 4724 B106.exe 110 PID 4724 wrote to memory of 3520 4724 B106.exe 110 PID 4724 wrote to memory of 3520 4724 B106.exe 110 PID 3520 wrote to memory of 1248 3520 B106.exe 111 PID 3520 wrote to memory of 1248 3520 B106.exe 111 PID 3520 wrote to memory of 1248 3520 B106.exe 111 PID 1248 wrote to memory of 2824 1248 build2.exe 112 PID 1248 wrote to memory of 2824 1248 build2.exe 112 PID 1248 wrote to memory of 2824 1248 build2.exe 112 PID 1248 wrote to memory of 2824 1248 build2.exe 112 PID 1248 wrote to memory of 2824 1248 build2.exe 112 PID 1248 wrote to memory of 2824 1248 build2.exe 112 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4176
-
C:\Users\Admin\AppData\Local\Temp\AFFB.exeC:\Users\Admin\AppData\Local\Temp\AFFB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 2482⤵
- Program crash
PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\B106.exeC:\Users\Admin\AppData\Local\Temp\B106.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\B106.exeC:\Users\Admin\AppData\Local\Temp\B106.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\86bb8e70-4101-4941-8a0a-b63a4347d705" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\B106.exe"C:\Users\Admin\AppData\Local\Temp\B106.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\B106.exe"C:\Users\Admin\AppData\Local\Temp\B106.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\1529d754-ce2c-42d0-9475-02a1d089b0da\build2.exe"C:\Users\Admin\AppData\Local\1529d754-ce2c-42d0-9475-02a1d089b0da\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\1529d754-ce2c-42d0-9475-02a1d089b0da\build2.exe"C:\Users\Admin\AppData\Local\1529d754-ce2c-42d0-9475-02a1d089b0da\build2.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
PID:2824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\1529d754-ce2c-42d0-9475-02a1d089b0da\build2.exe" & exit7⤵PID:3476
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:3392
-
-
-
-
-
C:\Users\Admin\AppData\Local\1529d754-ce2c-42d0-9475-02a1d089b0da\build3.exe"C:\Users\Admin\AppData\Local\1529d754-ce2c-42d0-9475-02a1d089b0da\build3.exe"5⤵
- Executes dropped EXE
PID:4144 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"6⤵
- Creates scheduled task(s)
PID:1844
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B388.exeC:\Users\Admin\AppData\Local\Temp\B388.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\35731ceaf0\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\35731ceaf0\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\35731ceaf0\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:3936
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- outlook_win_path
PID:3364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 11322⤵
- Program crash
PID:2364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3184 -ip 31841⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\BAEC.exeC:\Users\Admin\AppData\Local\Temp\BAEC.exe1⤵
- Executes dropped EXE
PID:2540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 3442⤵
- Program crash
PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\B790.exeC:\Users\Admin\AppData\Local\Temp\B790.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4340
-
C:\Users\Admin\AppData\Local\Temp\C2BD.exeC:\Users\Admin\AppData\Local\Temp\C2BD.exe1⤵
- Executes dropped EXE
PID:3932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 3442⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2540 -ip 25401⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4892 -ip 48921⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3932 -ip 39321⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\35731ceaf0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\35731ceaf0\gntuud.exe1⤵
- Executes dropped EXE
PID:4788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 3162⤵
- Program crash
PID:2460
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:4444 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
PID:3904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4788 -ip 47881⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\2DFB.exeC:\Users\Admin\AppData\Local\Temp\2DFB.exe1⤵
- Executes dropped EXE
PID:1704 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Oyiesauffusw.tmp",Wuuitfqhpt2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- outlook_office_path
PID:3056 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 171273⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:456
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵PID:2068
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵PID:1284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 5322⤵
- Program crash
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1704 -ip 17041⤵PID:4712
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\35731ceaf0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\35731ceaf0\gntuud.exe1⤵
- Executes dropped EXE
PID:4816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 3162⤵
- Program crash
PID:1188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4816 -ip 48161⤵PID:4100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5d725336098482e86274e5930393506a1
SHA17cb24085418693dc0c0fc876b6f7d2d400a7c256
SHA256a2550a47e8dee78c170ecdfc8918137469b6115cf32fedc091b80c7dea2701a1
SHA512f67ff810c97f14f9704439a7a3d34588b013eedc97149298c833926bc92d12b1e76b68c684863f86f8dede7fc677139f6c8af8e83bd43cad965ed32bda15ed3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5bae107243c3c1cc23eb066f981b79948
SHA1ed066a4326ae4eb5db4b00b0bb0290f006ad456c
SHA2567d2ba9f4e363368512dc2388d792c3f971d18699234c4edab57ddd4053870026
SHA51267a0ba993ab7abab0973683f134d71ed96cbff33368b222fc84e57def50c57d1c6d1c64362738baa9efa8cd84a3ccee30cc67284b2cd8ea53cbb8d1bfed94764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD57fe6a0378aa8354f0aa53bc143c4838a
SHA17ed066e72c8069fae6da48ccf09ab7564be0ce0f
SHA256969aec506f4feb15961b3c841a82090377c6734681361215aa50a2532eeb1b05
SHA51210395e8dae3a9f6e40ad56906a9bc6d976506c197a1a280ef816871ae27b6a0f08f1a92b1e19edc56e469b1f9c7ae3d112fa80a48a0db577c48d6f19202c0b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD58fb89f10dccaff00b633ea0dc5462c67
SHA1c6162fdcec8a320fc20533ae584b8afd72df133e
SHA256db03d4b90a7d80be9e1f3eb589a7e1e12a58e34b61e284703baf538fc1b59c34
SHA512c1ca5f299a83c32d95586ce13f6ff8b6aed03c4445f567a329b649f7383038721f7a7323a0a1f91dfe2a11dde4351fef9c5e933127a990af99a8655f5af65cfa
-
Filesize
409KB
MD5a131064868de7468d2e768211431401b
SHA1381ad582f72b30b4764afe0a817569b384be65a2
SHA256027bcfc4c5b4a06371e94f4a6b5f69cbee5bcad651d91115132844a2c10885a1
SHA51240fc84899d7bed5c49980f984e3c1446dece3861e5e107fa71e1876f4b778aa8369f03422a971d144f8e65f62a109f53ba94e86bc6ddec478d1bc71f3bb29309
-
Filesize
409KB
MD5a131064868de7468d2e768211431401b
SHA1381ad582f72b30b4764afe0a817569b384be65a2
SHA256027bcfc4c5b4a06371e94f4a6b5f69cbee5bcad651d91115132844a2c10885a1
SHA51240fc84899d7bed5c49980f984e3c1446dece3861e5e107fa71e1876f4b778aa8369f03422a971d144f8e65f62a109f53ba94e86bc6ddec478d1bc71f3bb29309
-
Filesize
409KB
MD5a131064868de7468d2e768211431401b
SHA1381ad582f72b30b4764afe0a817569b384be65a2
SHA256027bcfc4c5b4a06371e94f4a6b5f69cbee5bcad651d91115132844a2c10885a1
SHA51240fc84899d7bed5c49980f984e3c1446dece3861e5e107fa71e1876f4b778aa8369f03422a971d144f8e65f62a109f53ba94e86bc6ddec478d1bc71f3bb29309
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
744KB
MD54a9bff8242e34c49b4ac9380686ff219
SHA17d65d6a5ca3ef29cb4052a515b981e9e59f483fb
SHA2560db3fa90a05d8407f7376f5e7dc7da21c0e7503241e7230665f09485ec87b133
SHA512b5ecae962bc3198fe52057f410f49a6e254d4116febb45d60a6512f99478db3dc3487b88b827068361ae8feb61f0e0e7936c235ac76a2f584bc2e39584ea35b0
-
Filesize
1.0MB
MD5ed11a248a2af894c03adeaa5d9f57a2b
SHA1b2934d359cff3c53158ce3ef329cecd466e8c626
SHA256ebd2be77829bd7882984eaa1065311d781e02e2ae6b56096d79752b9a5f1eddd
SHA512e472a2119c270679b81f6f492b9911a01224d9034da5f22ebc27475a55cc9d97d452d06ca41262cb902f54cfb478d92d7100e9a095b87cacb4444704871a40b1
-
Filesize
1.0MB
MD5ed11a248a2af894c03adeaa5d9f57a2b
SHA1b2934d359cff3c53158ce3ef329cecd466e8c626
SHA256ebd2be77829bd7882984eaa1065311d781e02e2ae6b56096d79752b9a5f1eddd
SHA512e472a2119c270679b81f6f492b9911a01224d9034da5f22ebc27475a55cc9d97d452d06ca41262cb902f54cfb478d92d7100e9a095b87cacb4444704871a40b1
-
Filesize
278KB
MD587851832c33207564ece50e604793481
SHA149bbfb4c03804813d63088c671fe90decd8205a9
SHA2564394fbe12d74d2a7e1039627758e4397d3f8e08f0b288edccc0dfeb232325016
SHA512aa32ad8cef182fc0f208bc678084532bccefe8e14966ec23baaa5cebf6ea62df17120e5e24f40261a3ccf1f1bf26d61dda8fc6e0ebed11bc805bcace5b1aefff
-
Filesize
278KB
MD587851832c33207564ece50e604793481
SHA149bbfb4c03804813d63088c671fe90decd8205a9
SHA2564394fbe12d74d2a7e1039627758e4397d3f8e08f0b288edccc0dfeb232325016
SHA512aa32ad8cef182fc0f208bc678084532bccefe8e14966ec23baaa5cebf6ea62df17120e5e24f40261a3ccf1f1bf26d61dda8fc6e0ebed11bc805bcace5b1aefff
-
Filesize
278KB
MD587851832c33207564ece50e604793481
SHA149bbfb4c03804813d63088c671fe90decd8205a9
SHA2564394fbe12d74d2a7e1039627758e4397d3f8e08f0b288edccc0dfeb232325016
SHA512aa32ad8cef182fc0f208bc678084532bccefe8e14966ec23baaa5cebf6ea62df17120e5e24f40261a3ccf1f1bf26d61dda8fc6e0ebed11bc805bcace5b1aefff
-
Filesize
278KB
MD587851832c33207564ece50e604793481
SHA149bbfb4c03804813d63088c671fe90decd8205a9
SHA2564394fbe12d74d2a7e1039627758e4397d3f8e08f0b288edccc0dfeb232325016
SHA512aa32ad8cef182fc0f208bc678084532bccefe8e14966ec23baaa5cebf6ea62df17120e5e24f40261a3ccf1f1bf26d61dda8fc6e0ebed11bc805bcace5b1aefff
-
Filesize
399KB
MD5b0ece045401c25a90ae1ba804bb43398
SHA1455c85e07d9b6dbd53fce17bc16a2275d49ac855
SHA25626924a35a830aa53611550b2be4e98b445fd091f5da187350cd7fcb532c265fa
SHA5123e9d24cf4916b5aec9bfadc860cc40ab7afcb0029f53af0449a37cf39b90f5de2973cc76ef65449a74357db5c4a8a39e3fd4c83f6caeb8c8cde10c4e33513fdb
-
Filesize
399KB
MD5b0ece045401c25a90ae1ba804bb43398
SHA1455c85e07d9b6dbd53fce17bc16a2275d49ac855
SHA25626924a35a830aa53611550b2be4e98b445fd091f5da187350cd7fcb532c265fa
SHA5123e9d24cf4916b5aec9bfadc860cc40ab7afcb0029f53af0449a37cf39b90f5de2973cc76ef65449a74357db5c4a8a39e3fd4c83f6caeb8c8cde10c4e33513fdb
-
Filesize
744KB
MD54a9bff8242e34c49b4ac9380686ff219
SHA17d65d6a5ca3ef29cb4052a515b981e9e59f483fb
SHA2560db3fa90a05d8407f7376f5e7dc7da21c0e7503241e7230665f09485ec87b133
SHA512b5ecae962bc3198fe52057f410f49a6e254d4116febb45d60a6512f99478db3dc3487b88b827068361ae8feb61f0e0e7936c235ac76a2f584bc2e39584ea35b0
-
Filesize
744KB
MD54a9bff8242e34c49b4ac9380686ff219
SHA17d65d6a5ca3ef29cb4052a515b981e9e59f483fb
SHA2560db3fa90a05d8407f7376f5e7dc7da21c0e7503241e7230665f09485ec87b133
SHA512b5ecae962bc3198fe52057f410f49a6e254d4116febb45d60a6512f99478db3dc3487b88b827068361ae8feb61f0e0e7936c235ac76a2f584bc2e39584ea35b0
-
Filesize
744KB
MD54a9bff8242e34c49b4ac9380686ff219
SHA17d65d6a5ca3ef29cb4052a515b981e9e59f483fb
SHA2560db3fa90a05d8407f7376f5e7dc7da21c0e7503241e7230665f09485ec87b133
SHA512b5ecae962bc3198fe52057f410f49a6e254d4116febb45d60a6512f99478db3dc3487b88b827068361ae8feb61f0e0e7936c235ac76a2f584bc2e39584ea35b0
-
Filesize
744KB
MD54a9bff8242e34c49b4ac9380686ff219
SHA17d65d6a5ca3ef29cb4052a515b981e9e59f483fb
SHA2560db3fa90a05d8407f7376f5e7dc7da21c0e7503241e7230665f09485ec87b133
SHA512b5ecae962bc3198fe52057f410f49a6e254d4116febb45d60a6512f99478db3dc3487b88b827068361ae8feb61f0e0e7936c235ac76a2f584bc2e39584ea35b0
-
Filesize
744KB
MD54a9bff8242e34c49b4ac9380686ff219
SHA17d65d6a5ca3ef29cb4052a515b981e9e59f483fb
SHA2560db3fa90a05d8407f7376f5e7dc7da21c0e7503241e7230665f09485ec87b133
SHA512b5ecae962bc3198fe52057f410f49a6e254d4116febb45d60a6512f99478db3dc3487b88b827068361ae8feb61f0e0e7936c235ac76a2f584bc2e39584ea35b0
-
Filesize
278KB
MD587851832c33207564ece50e604793481
SHA149bbfb4c03804813d63088c671fe90decd8205a9
SHA2564394fbe12d74d2a7e1039627758e4397d3f8e08f0b288edccc0dfeb232325016
SHA512aa32ad8cef182fc0f208bc678084532bccefe8e14966ec23baaa5cebf6ea62df17120e5e24f40261a3ccf1f1bf26d61dda8fc6e0ebed11bc805bcace5b1aefff
-
Filesize
278KB
MD587851832c33207564ece50e604793481
SHA149bbfb4c03804813d63088c671fe90decd8205a9
SHA2564394fbe12d74d2a7e1039627758e4397d3f8e08f0b288edccc0dfeb232325016
SHA512aa32ad8cef182fc0f208bc678084532bccefe8e14966ec23baaa5cebf6ea62df17120e5e24f40261a3ccf1f1bf26d61dda8fc6e0ebed11bc805bcace5b1aefff
-
Filesize
223KB
MD595440fe6c80e86dc803904f88700929b
SHA1ddb8d997cd08556cced0da0a1c57937010e27574
SHA256e68c8dca142f9a1d46ad203fa9be8c0dfc79ee2572daf1217e3b50dbada90b2e
SHA512d06fa49c85290d84df71ac523cf64e959667a4f401f2be8a1be09d0d076541cea09e8462d097711ed0c4d08b84f69dcc8b6583f252cb920fbe477e6ecad74447
-
Filesize
223KB
MD595440fe6c80e86dc803904f88700929b
SHA1ddb8d997cd08556cced0da0a1c57937010e27574
SHA256e68c8dca142f9a1d46ad203fa9be8c0dfc79ee2572daf1217e3b50dbada90b2e
SHA512d06fa49c85290d84df71ac523cf64e959667a4f401f2be8a1be09d0d076541cea09e8462d097711ed0c4d08b84f69dcc8b6583f252cb920fbe477e6ecad74447
-
Filesize
279KB
MD5982caee6a5874d822948314e6252aecb
SHA10a82d611f9d9ffac1d47285a3e4d45fec62b5cfe
SHA256e7dbb8111e30e929db7a20370ce9bf91b5724a4f118604842646c159df1974b7
SHA51208b9601fdf75cca4aa323d3823c41048ab0e21a68a19665724f87ac59982a42ebdcffb8547cc586f0d2154c3c9c414e91bbbccae01f0d13def2e1fe7f300df52
-
Filesize
279KB
MD5982caee6a5874d822948314e6252aecb
SHA10a82d611f9d9ffac1d47285a3e4d45fec62b5cfe
SHA256e7dbb8111e30e929db7a20370ce9bf91b5724a4f118604842646c159df1974b7
SHA51208b9601fdf75cca4aa323d3823c41048ab0e21a68a19665724f87ac59982a42ebdcffb8547cc586f0d2154c3c9c414e91bbbccae01f0d13def2e1fe7f300df52
-
Filesize
223KB
MD5da78bf827f5fbbf645e840cdb64dff01
SHA141b210e0296f5dc4b48343ccd9ee7a48e2041837
SHA25692f5cb6d75b2d8af67ac4122903a36c7f05a00b386bc19d46de303b977ac6afe
SHA512420da089399deaf4f1e0bf6537c44e86c4494da44543fe92ae28db0bf731bde64896114aa137a8654d11e44e3e8d9956ad806384c7e3f9eb02ace7c19bcbc7ea
-
Filesize
223KB
MD5da78bf827f5fbbf645e840cdb64dff01
SHA141b210e0296f5dc4b48343ccd9ee7a48e2041837
SHA25692f5cb6d75b2d8af67ac4122903a36c7f05a00b386bc19d46de303b977ac6afe
SHA512420da089399deaf4f1e0bf6537c44e86c4494da44543fe92ae28db0bf731bde64896114aa137a8654d11e44e3e8d9956ad806384c7e3f9eb02ace7c19bcbc7ea
-
Filesize
730KB
MD58d039a703875733043526555982e4e60
SHA1f583795e790e682db2feaa5f5b8d282216f581e2
SHA2565cb8e52b000f84494627db8e8e700e7731c9bfa2eb9e6a8a8280d2311327e81a
SHA5123e89ec3eb7e90aa93c0a3cc2d120521b1c2236a8a2169b2654fcc153f926b97e85267a177ef92f3ac3a7aa493a81a3a55c1b6b56ef8f8beb93b78bf3eb10373e
-
Filesize
730KB
MD58d039a703875733043526555982e4e60
SHA1f583795e790e682db2feaa5f5b8d282216f581e2
SHA2565cb8e52b000f84494627db8e8e700e7731c9bfa2eb9e6a8a8280d2311327e81a
SHA5123e89ec3eb7e90aa93c0a3cc2d120521b1c2236a8a2169b2654fcc153f926b97e85267a177ef92f3ac3a7aa493a81a3a55c1b6b56ef8f8beb93b78bf3eb10373e
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
126KB
MD5af364df1b3d1011a1e53cc43a0f47931
SHA140a1afe04bb41b40c0369ac5d4707fc74583d2a3
SHA2563357dbe44c1e509faa7b63e62b70600ef38fbc44aa9a7a4037b1edeb9c5528c2
SHA512e25a6185d047a29797c34d43c4bed82fb3c062f057fa0d28f19bdf6b067e1166a232b981797c0d7e371bf3faa2e5b3ca00bdf8a0a8303221bdcc8b126c669f69
-
Filesize
126KB
MD5af364df1b3d1011a1e53cc43a0f47931
SHA140a1afe04bb41b40c0369ac5d4707fc74583d2a3
SHA2563357dbe44c1e509faa7b63e62b70600ef38fbc44aa9a7a4037b1edeb9c5528c2
SHA512e25a6185d047a29797c34d43c4bed82fb3c062f057fa0d28f19bdf6b067e1166a232b981797c0d7e371bf3faa2e5b3ca00bdf8a0a8303221bdcc8b126c669f69