Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
31-07-2023 13:58
Static task
static1
Behavioral task
behavioral1
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win10v2004-20230703-en
General
-
Target
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
-
Size
636KB
-
MD5
267d5c3137d313ce1a86c2f255a835e6
-
SHA1
c7a37c0edeffd23777cca44f9b49076be1bd43e6
-
SHA256
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90
-
SHA512
9c119a9f973dae77f2cdd6a855ae45c20660aadc5c592f6d06f6360dd0bb5a380d0ed1fcc23c0cb721da70bcca7d32db46181be675bf0587276d35d6da26a31e
-
SSDEEP
12288:aEky5bwpy02iRaeXCP2CIcdoKAXMr+Mr+kJZ4:j02iRaeHPcdo18rTrf6
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
blackbasta
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion:80/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Renames multiple (743) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Loads dropped DLL 46 IoCs
Processes:
MsiExec.exeMsiExec.exepid process 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1628 MsiExec.exe 1412 MsiExec.exe 1412 MsiExec.exe 1412 MsiExec.exe 1412 MsiExec.exe 1412 MsiExec.exe 1412 MsiExec.exe 1412 MsiExec.exe 1412 MsiExec.exe 1412 MsiExec.exe 1412 MsiExec.exe 1412 MsiExec.exe 1412 MsiExec.exe 1412 MsiExec.exe 1412 MsiExec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Control Panel\Desktop\Wallpaper 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe -
Drops file in Program Files directory 64 IoCs
Processes:
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exemsiexec.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ogalegit.dllencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txtencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txtencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\SolitaireMCE.lnkencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\Microsoft Office\Office14\INLAUNCH.DLLencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACEDAO.DLLencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONTAB32.DLLencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnvpxy.dllencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\RTFHTML.DLLencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ASCIIENG.LNGencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXLIRMV.XMLencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7.dllencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\msproof7.dllencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OARTCONV.DLLencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-filesencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txtencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txtencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Couture.thmxencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXEencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSWORD.OLBencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MYSL.ICOencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\Mozilla Firefox\AccessibleHandler.dllencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-string-l1-1-0.dllencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txtencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txtencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXEencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GKPowerPoint.dllencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MCPS.DLLencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txtencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ.DLLencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\bdcmetadata.xsdencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUTL.OLBencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLVBS.DLLencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\Mozilla Firefox\d3dcompiler_47.dllencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\Microsoft Office\Office14\Mso Example Setup File A.txtencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Apex.thmxencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Elemental.thmxencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INTLDATE.DLLencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OLKIRMV.XMLencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\Mozilla Firefox\postSigningDataencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\Mozilla Firefox\ucrtbase.dllencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Composite.thmxencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7db.kicencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\TaxonomyControl.dllencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VVIEWER.DLLencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORM.DLLencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\7-Zip\7-zip.chmencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txtencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txtencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txtencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\VideoLAN\VLC\THANKS.txtencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Aspect.thmxencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Urban.thmxencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IMPMAIL.DLLencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.BusinessApplications.Runtime.dllencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7fr.kicencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\Java\jre7\README.txtencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CGMIMP32.HLPencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE msiexec.exe File opened for modification C:\Program Files\GrantNew.tifencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txtencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXEencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exeencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.SharePoint.BusinessData.Administration.Client.dllencrypted 17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe -
Drops file in Windows directory 48 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Windows\Installer\f780c8e.mst msiexec.exe File opened for modification C:\Windows\Installer\MSI11CF.tmp msiexec.exe File created C:\Windows\Installer\f780c91.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI2E5C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2E2C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4417.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF6C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI123D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1443.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1BD5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2165.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2474.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI639F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1B67.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2106.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI256F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI27D3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3012.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4106.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI25DD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI310E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI10F3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1386.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI151E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI152F.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI2463.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5E8A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI610C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI613C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI615C.tmp msiexec.exe File opened for modification C:\Windows\Installer\f780c91.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI1413.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI263B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI309F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI617C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1190.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2726.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2D50.tmp msiexec.exe File opened for modification C:\Windows\Installer\f780c8e.mst msiexec.exe File opened for modification C:\Windows\Installer\MSI1CC0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2231.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4155.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI433A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2079.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2DED.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4406.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI60EC.tmp msiexec.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe -
Modifies registry class 29 IoCs
Processes:
msiexec.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\Winword.exe\shell msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.wps msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.dotx msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Applications\winword.exe\shell msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\Winword.exe msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.mht msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.html msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.htm msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.rtf msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.xml msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.docx msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Applications\winword.exe\shell\edit msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\Winword.exe\SupportedTypes msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Applications\winword.exe\SupportedTypes msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.dot msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Applications\winword.exe msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.txt msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.doc msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.wri msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.wpd msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.odt msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.dotm msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\Winword.exe\shell\edit\command msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\Winword.exe\shell\edit msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.mhtml msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\SupportedTypes\.docm msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\winword.exe\shell\edit\ = "&Edit" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Applications\winword.exe\shell\edit\command msiexec.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 1824 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
msiexec.exepid process 2812 msiexec.exe 2812 msiexec.exe 2812 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exedescription pid process Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeSecurityPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeRestorePrivilege 2812 msiexec.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
msiexec.exeMsiExec.exewevtutil.exedescription pid process target process PID 2812 wrote to memory of 1628 2812 msiexec.exe MsiExec.exe PID 2812 wrote to memory of 1628 2812 msiexec.exe MsiExec.exe PID 2812 wrote to memory of 1628 2812 msiexec.exe MsiExec.exe PID 2812 wrote to memory of 1628 2812 msiexec.exe MsiExec.exe PID 2812 wrote to memory of 1628 2812 msiexec.exe MsiExec.exe PID 2812 wrote to memory of 1628 2812 msiexec.exe MsiExec.exe PID 2812 wrote to memory of 1628 2812 msiexec.exe MsiExec.exe PID 2812 wrote to memory of 1412 2812 msiexec.exe MsiExec.exe PID 2812 wrote to memory of 1412 2812 msiexec.exe MsiExec.exe PID 2812 wrote to memory of 1412 2812 msiexec.exe MsiExec.exe PID 2812 wrote to memory of 1412 2812 msiexec.exe MsiExec.exe PID 2812 wrote to memory of 1412 2812 msiexec.exe MsiExec.exe PID 2812 wrote to memory of 1412 2812 msiexec.exe MsiExec.exe PID 2812 wrote to memory of 1412 2812 msiexec.exe MsiExec.exe PID 1412 wrote to memory of 2568 1412 MsiExec.exe wevtutil.exe PID 1412 wrote to memory of 2568 1412 MsiExec.exe wevtutil.exe PID 1412 wrote to memory of 2568 1412 MsiExec.exe wevtutil.exe PID 1412 wrote to memory of 2568 1412 MsiExec.exe wevtutil.exe PID 2568 wrote to memory of 1540 2568 wevtutil.exe wevtutil.exe PID 2568 wrote to memory of 1540 2568 wevtutil.exe wevtutil.exe PID 2568 wrote to memory of 1540 2568 wevtutil.exe wevtutil.exe PID 2568 wrote to memory of 1540 2568 wevtutil.exe wevtutil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe"C:\Users\Admin\AppData\Local\Temp\17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe"1⤵
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
PID:2576
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1824
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 91B2AD42344D5C12FC9651C0997443A02⤵
- Loads dropped DLL
PID:1628
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B1247103FCD157492EA7DF8E31D73324 M Global\MSI00002⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\syswow64\wevtutil.exe"wevtutil.exe" im "C:\Program Files (x86)\Microsoft Office\Office14\BCSEvents.man"3⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\System32\wevtutil.exe"wevtutil.exe" im "C:\Program Files (x86)\Microsoft Office\Office14\BCSEvents.man" /fromwow644⤵PID:1540
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5040ae5c2bdd54884b227cdf4e078ddb9
SHA19e9664a02b14214082beb31e839180ce9500b40b
SHA2565f8d967a475fb1170cbdfe5173af63c1d19a0751f823cf4a3de594bcab3f517a
SHA512fee91e14b5a87099804a8ff41706e97b5861c55eca45cda87c14a9e057710dc0d41b677295dc363a6a2337688bd4ceb6ddc176ff10d75c100c1450dd36e1e41f
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
19KB
MD59cadbfa797783ff9e7fc60301de9e1ff
SHA183bde6d6b75dfc88d3418ec1a2e935872b8864bb
SHA256c1eda5c42be64cfc08408a276340c9082f424ec1a4e96e78f85e9f80d0634141
SHA512095963d9e01d46dae7908e3de6f115d7a0eebb114a5ec6e4e9312dbc22ba5baa268f5acece328066c9456172e90a95e097a35b9ed61589ce9684762e38f1385b
-
Filesize
363KB
MD54a843a97ae51c310b573a02ffd2a0e8e
SHA1063fa914ccb07249123c0d5f4595935487635b20
SHA256727ecf287fb6f4953ee7748913dd559b4f8d3a022fa2ca55bc51cf5886c52086
SHA512905c081552d95b523ecf1155b6c7e157652e5ff00cda30c1c21124d266eb7d305c3398d6832316f403dc45d1b639f1a5a67aea29922cd1a032f52e5247ec55d2
-
Filesize
363KB
MD54a843a97ae51c310b573a02ffd2a0e8e
SHA1063fa914ccb07249123c0d5f4595935487635b20
SHA256727ecf287fb6f4953ee7748913dd559b4f8d3a022fa2ca55bc51cf5886c52086
SHA512905c081552d95b523ecf1155b6c7e157652e5ff00cda30c1c21124d266eb7d305c3398d6832316f403dc45d1b639f1a5a67aea29922cd1a032f52e5247ec55d2
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
85KB
MD55577a98daef4ba33e900a3e3108d6cc1
SHA15af817186ab0376a0433686be470ea2b48c74f5f
SHA256148199b4f3b6b2030e2aeb63a66e8e333e692d38691bcbe39139cf02bb61b31d
SHA512d37d511975b5331a5b1cdda736890c7d4f2dcba4abac2b9399c977bdb7e09c964327e3f771cd592e2632b0e776545c490f29fd391ec13c7948557957cd805dd5
-
Filesize
571KB
MD55a1e6b155435693938596d58eaca74bb
SHA127fb323ccc215136ef350469072b6ad559d39c3d
SHA256f2d5eb947b85f763f72de7f800118844a5207c9e3dd456f13186c2aaf0c485ac
SHA5124fee8576ef5541d4923aacb514b09e1e4dc8d6cbb1dcaada67c65240358147b971c2a1d034faf50c594ae7edb4a3c68dd4ffbbb69893413ffb52e71a86c65388
-
Filesize
32KB
MD58d4c7e2792f92d8e7cba3098a54c8e66
SHA1d21b486f78aef95b7041d7e6966568ac3c550e3a
SHA256aaf3e53a1a1aeadac1339b20e256eabc29502a9a583a7c18b29d6bba2adb1ab0
SHA512b81598b2c47ebe78fb9851254b576885e7ba68b637337378c9e8e7928c72ffc89734c9a729dcb947aa64f8a89f07ef9c1751f64526e60cd72931b92662d2b91a
-
Filesize
32KB
MD58d4c7e2792f92d8e7cba3098a54c8e66
SHA1d21b486f78aef95b7041d7e6966568ac3c550e3a
SHA256aaf3e53a1a1aeadac1339b20e256eabc29502a9a583a7c18b29d6bba2adb1ab0
SHA512b81598b2c47ebe78fb9851254b576885e7ba68b637337378c9e8e7928c72ffc89734c9a729dcb947aa64f8a89f07ef9c1751f64526e60cd72931b92662d2b91a
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
350KB
MD59caf5e1999a4bd6ab8c4d4ea07818a7d
SHA1fb1fe1d18fb670fbbf7461f449a473778b711717
SHA256813ebc09bb3144d76f6f3a1550877c21590e0776f893915ca1178672e84ca1e7
SHA512d40a70f7718adc63a21758ce43bd0c3f71abf4a4b7dd0639be3decf326a1b3281ac1043c519fd3f5cbae5ed6b3e59e3bd8d583c2ae253529fdd6d5225f41ab74
-
Filesize
85KB
MD55577a98daef4ba33e900a3e3108d6cc1
SHA15af817186ab0376a0433686be470ea2b48c74f5f
SHA256148199b4f3b6b2030e2aeb63a66e8e333e692d38691bcbe39139cf02bb61b31d
SHA512d37d511975b5331a5b1cdda736890c7d4f2dcba4abac2b9399c977bdb7e09c964327e3f771cd592e2632b0e776545c490f29fd391ec13c7948557957cd805dd5
-
Filesize
363KB
MD54a843a97ae51c310b573a02ffd2a0e8e
SHA1063fa914ccb07249123c0d5f4595935487635b20
SHA256727ecf287fb6f4953ee7748913dd559b4f8d3a022fa2ca55bc51cf5886c52086
SHA512905c081552d95b523ecf1155b6c7e157652e5ff00cda30c1c21124d266eb7d305c3398d6832316f403dc45d1b639f1a5a67aea29922cd1a032f52e5247ec55d2
-
Filesize
363KB
MD54a843a97ae51c310b573a02ffd2a0e8e
SHA1063fa914ccb07249123c0d5f4595935487635b20
SHA256727ecf287fb6f4953ee7748913dd559b4f8d3a022fa2ca55bc51cf5886c52086
SHA512905c081552d95b523ecf1155b6c7e157652e5ff00cda30c1c21124d266eb7d305c3398d6832316f403dc45d1b639f1a5a67aea29922cd1a032f52e5247ec55d2
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
28KB
MD585221b3bcba8dbe4b4a46581aa49f760
SHA1746645c92594bfc739f77812d67cfd85f4b92474
SHA256f6e34a4550e499346f5ab1d245508f16bf765ff24c4988984b89e049ca55737f
SHA512060e35c4de14a03a2cda313f968e372291866cc4acd59977d7a48ac3745494abc54df83fff63cf30be4e10ff69a3b3c8b6c38f43ebd2a8d23d6c86fbee7ba87d
-
Filesize
107KB
MD59f0b9bc54bb73dfb7cf85520da1a08cb
SHA1236f7b770317d782f0817fbf7542140cb1e1526e
SHA2560d44d40e8bda72a3d6ca26665100b256848e2183029a6728c18ad97cd650547f
SHA5128acfb05a7b4723776fa66c0f71bde90dd49243de5dd2a8cf1a1f09a1175f9346c12a717050bff5f3938bda6cc4c610ca1eab75d4b9b7c8bcfb97d9158727a10d
-
Filesize
148KB
MD533908aa43ac0aaabc06a58d51b1c2cca
SHA10a0d1ce3435abe2eed635481bac69e1999031291
SHA2564447faacefaba8f040822101e2a4103031660de9139e70ecff9aa3a89455a783
SHA512d5216a53df9cfbe1a78629c103286eb17042f639149c46b6a1cd76498531ae82afd265462fbe0ba9baaff275fc95c66504804f107c449f3fc5833b1ed9c3da46
-
Filesize
107KB
MD59f0b9bc54bb73dfb7cf85520da1a08cb
SHA1236f7b770317d782f0817fbf7542140cb1e1526e
SHA2560d44d40e8bda72a3d6ca26665100b256848e2183029a6728c18ad97cd650547f
SHA5128acfb05a7b4723776fa66c0f71bde90dd49243de5dd2a8cf1a1f09a1175f9346c12a717050bff5f3938bda6cc4c610ca1eab75d4b9b7c8bcfb97d9158727a10d
-
Filesize
363KB
MD54a843a97ae51c310b573a02ffd2a0e8e
SHA1063fa914ccb07249123c0d5f4595935487635b20
SHA256727ecf287fb6f4953ee7748913dd559b4f8d3a022fa2ca55bc51cf5886c52086
SHA512905c081552d95b523ecf1155b6c7e157652e5ff00cda30c1c21124d266eb7d305c3398d6832316f403dc45d1b639f1a5a67aea29922cd1a032f52e5247ec55d2
-
Filesize
214KB
MD5399075975c41f7e85b12bc6668f59cf3
SHA104f5140a93f4fd7721cd305d12cdb80d75b36a16
SHA256b5129d385ac5d296142ba97faf663ffbb6c50761fc414d4528d8b8a26bc31ac3
SHA5121266087db1d06405ccdb4e3cfc8f086b361da2a276a62dcbd2ecfa4532571cf57fdc568b07493fb5d0d9171c1eac8b9d371cd3e35600ee08b108b2688c0c95bf
-
Filesize
83KB
MD59471017b246f1b3dbbd8984ecc1f4293
SHA1d498d3f0fdf3c5d90e244094f3df3e618da36341
SHA256e75f900e7240da9993c267a11f5a68d4c2cebb205fa690200bcdf8e1d0b6e7d8
SHA512d950f8e613b8585ba8148cad5731134105bf992d160cdedffdf914e78e7b9f1eac0fa3d1071c87343ee942a92ad8ebd1970850edb5fb278326ef03e9ab4160c7
-
Filesize
571KB
MD55a1e6b155435693938596d58eaca74bb
SHA127fb323ccc215136ef350469072b6ad559d39c3d
SHA256f2d5eb947b85f763f72de7f800118844a5207c9e3dd456f13186c2aaf0c485ac
SHA5124fee8576ef5541d4923aacb514b09e1e4dc8d6cbb1dcaada67c65240358147b971c2a1d034faf50c594ae7edb4a3c68dd4ffbbb69893413ffb52e71a86c65388
-
Filesize
114KB
MD500c3f5ca474a20c4a8dfb263a3950dad
SHA178b00a2e0490e1664af4d86fdbd3ac78330d21d4
SHA2569d849a8f5b39941ea32d47f0529977b1870f648736a483d86682436e3d3db748
SHA51220a8a8655b61b464f29329a70daa95a36c8c54b549bbec26ed93c63097d6d7a4c0a3ca1cb9a85a0521d298885c00f22fbfa28abf9aa33737056b48cc0ebead9d
-
Filesize
148KB
MD533908aa43ac0aaabc06a58d51b1c2cca
SHA10a0d1ce3435abe2eed635481bac69e1999031291
SHA2564447faacefaba8f040822101e2a4103031660de9139e70ecff9aa3a89455a783
SHA512d5216a53df9cfbe1a78629c103286eb17042f639149c46b6a1cd76498531ae82afd265462fbe0ba9baaff275fc95c66504804f107c449f3fc5833b1ed9c3da46
-
Filesize
214KB
MD5399075975c41f7e85b12bc6668f59cf3
SHA104f5140a93f4fd7721cd305d12cdb80d75b36a16
SHA256b5129d385ac5d296142ba97faf663ffbb6c50761fc414d4528d8b8a26bc31ac3
SHA5121266087db1d06405ccdb4e3cfc8f086b361da2a276a62dcbd2ecfa4532571cf57fdc568b07493fb5d0d9171c1eac8b9d371cd3e35600ee08b108b2688c0c95bf
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
350KB
MD59caf5e1999a4bd6ab8c4d4ea07818a7d
SHA1fb1fe1d18fb670fbbf7461f449a473778b711717
SHA256813ebc09bb3144d76f6f3a1550877c21590e0776f893915ca1178672e84ca1e7
SHA512d40a70f7718adc63a21758ce43bd0c3f71abf4a4b7dd0639be3decf326a1b3281ac1043c519fd3f5cbae5ed6b3e59e3bd8d583c2ae253529fdd6d5225f41ab74
-
Filesize
350KB
MD59caf5e1999a4bd6ab8c4d4ea07818a7d
SHA1fb1fe1d18fb670fbbf7461f449a473778b711717
SHA256813ebc09bb3144d76f6f3a1550877c21590e0776f893915ca1178672e84ca1e7
SHA512d40a70f7718adc63a21758ce43bd0c3f71abf4a4b7dd0639be3decf326a1b3281ac1043c519fd3f5cbae5ed6b3e59e3bd8d583c2ae253529fdd6d5225f41ab74
-
Filesize
350KB
MD59caf5e1999a4bd6ab8c4d4ea07818a7d
SHA1fb1fe1d18fb670fbbf7461f449a473778b711717
SHA256813ebc09bb3144d76f6f3a1550877c21590e0776f893915ca1178672e84ca1e7
SHA512d40a70f7718adc63a21758ce43bd0c3f71abf4a4b7dd0639be3decf326a1b3281ac1043c519fd3f5cbae5ed6b3e59e3bd8d583c2ae253529fdd6d5225f41ab74
-
Filesize
107KB
MD59f0b9bc54bb73dfb7cf85520da1a08cb
SHA1236f7b770317d782f0817fbf7542140cb1e1526e
SHA2560d44d40e8bda72a3d6ca26665100b256848e2183029a6728c18ad97cd650547f
SHA5128acfb05a7b4723776fa66c0f71bde90dd49243de5dd2a8cf1a1f09a1175f9346c12a717050bff5f3938bda6cc4c610ca1eab75d4b9b7c8bcfb97d9158727a10d
-
Filesize
107KB
MD59f0b9bc54bb73dfb7cf85520da1a08cb
SHA1236f7b770317d782f0817fbf7542140cb1e1526e
SHA2560d44d40e8bda72a3d6ca26665100b256848e2183029a6728c18ad97cd650547f
SHA5128acfb05a7b4723776fa66c0f71bde90dd49243de5dd2a8cf1a1f09a1175f9346c12a717050bff5f3938bda6cc4c610ca1eab75d4b9b7c8bcfb97d9158727a10d
-
Filesize
148KB
MD533908aa43ac0aaabc06a58d51b1c2cca
SHA10a0d1ce3435abe2eed635481bac69e1999031291
SHA2564447faacefaba8f040822101e2a4103031660de9139e70ecff9aa3a89455a783
SHA512d5216a53df9cfbe1a78629c103286eb17042f639149c46b6a1cd76498531ae82afd265462fbe0ba9baaff275fc95c66504804f107c449f3fc5833b1ed9c3da46
-
Filesize
148KB
MD533908aa43ac0aaabc06a58d51b1c2cca
SHA10a0d1ce3435abe2eed635481bac69e1999031291
SHA2564447faacefaba8f040822101e2a4103031660de9139e70ecff9aa3a89455a783
SHA512d5216a53df9cfbe1a78629c103286eb17042f639149c46b6a1cd76498531ae82afd265462fbe0ba9baaff275fc95c66504804f107c449f3fc5833b1ed9c3da46
-
Filesize
134KB
MD5b8255a1bc3c307557741d2c99b8256d1
SHA148cc6f3c1a566f06684c5184cf830cbd7db638c2
SHA256796aea9a46fb7704222a7fe1f4e27455b14640c816d6f961344f89dc47537b33
SHA51285f685ad84f2208ad87ff34fb5e99edae50fc938a9335cb9747b7707d237c1b397c318090112eee0e9f04777ee004e26e7377f57c3e31159a96638b65110a69c
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
19KB
MD59cadbfa797783ff9e7fc60301de9e1ff
SHA183bde6d6b75dfc88d3418ec1a2e935872b8864bb
SHA256c1eda5c42be64cfc08408a276340c9082f424ec1a4e96e78f85e9f80d0634141
SHA512095963d9e01d46dae7908e3de6f115d7a0eebb114a5ec6e4e9312dbc22ba5baa268f5acece328066c9456172e90a95e097a35b9ed61589ce9684762e38f1385b
-
Filesize
363KB
MD54a843a97ae51c310b573a02ffd2a0e8e
SHA1063fa914ccb07249123c0d5f4595935487635b20
SHA256727ecf287fb6f4953ee7748913dd559b4f8d3a022fa2ca55bc51cf5886c52086
SHA512905c081552d95b523ecf1155b6c7e157652e5ff00cda30c1c21124d266eb7d305c3398d6832316f403dc45d1b639f1a5a67aea29922cd1a032f52e5247ec55d2
-
Filesize
363KB
MD54a843a97ae51c310b573a02ffd2a0e8e
SHA1063fa914ccb07249123c0d5f4595935487635b20
SHA256727ecf287fb6f4953ee7748913dd559b4f8d3a022fa2ca55bc51cf5886c52086
SHA512905c081552d95b523ecf1155b6c7e157652e5ff00cda30c1c21124d266eb7d305c3398d6832316f403dc45d1b639f1a5a67aea29922cd1a032f52e5247ec55d2
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
85KB
MD55577a98daef4ba33e900a3e3108d6cc1
SHA15af817186ab0376a0433686be470ea2b48c74f5f
SHA256148199b4f3b6b2030e2aeb63a66e8e333e692d38691bcbe39139cf02bb61b31d
SHA512d37d511975b5331a5b1cdda736890c7d4f2dcba4abac2b9399c977bdb7e09c964327e3f771cd592e2632b0e776545c490f29fd391ec13c7948557957cd805dd5
-
Filesize
571KB
MD55a1e6b155435693938596d58eaca74bb
SHA127fb323ccc215136ef350469072b6ad559d39c3d
SHA256f2d5eb947b85f763f72de7f800118844a5207c9e3dd456f13186c2aaf0c485ac
SHA5124fee8576ef5541d4923aacb514b09e1e4dc8d6cbb1dcaada67c65240358147b971c2a1d034faf50c594ae7edb4a3c68dd4ffbbb69893413ffb52e71a86c65388
-
Filesize
32KB
MD58d4c7e2792f92d8e7cba3098a54c8e66
SHA1d21b486f78aef95b7041d7e6966568ac3c550e3a
SHA256aaf3e53a1a1aeadac1339b20e256eabc29502a9a583a7c18b29d6bba2adb1ab0
SHA512b81598b2c47ebe78fb9851254b576885e7ba68b637337378c9e8e7928c72ffc89734c9a729dcb947aa64f8a89f07ef9c1751f64526e60cd72931b92662d2b91a
-
Filesize
32KB
MD58d4c7e2792f92d8e7cba3098a54c8e66
SHA1d21b486f78aef95b7041d7e6966568ac3c550e3a
SHA256aaf3e53a1a1aeadac1339b20e256eabc29502a9a583a7c18b29d6bba2adb1ab0
SHA512b81598b2c47ebe78fb9851254b576885e7ba68b637337378c9e8e7928c72ffc89734c9a729dcb947aa64f8a89f07ef9c1751f64526e60cd72931b92662d2b91a
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
350KB
MD59caf5e1999a4bd6ab8c4d4ea07818a7d
SHA1fb1fe1d18fb670fbbf7461f449a473778b711717
SHA256813ebc09bb3144d76f6f3a1550877c21590e0776f893915ca1178672e84ca1e7
SHA512d40a70f7718adc63a21758ce43bd0c3f71abf4a4b7dd0639be3decf326a1b3281ac1043c519fd3f5cbae5ed6b3e59e3bd8d583c2ae253529fdd6d5225f41ab74
-
Filesize
85KB
MD55577a98daef4ba33e900a3e3108d6cc1
SHA15af817186ab0376a0433686be470ea2b48c74f5f
SHA256148199b4f3b6b2030e2aeb63a66e8e333e692d38691bcbe39139cf02bb61b31d
SHA512d37d511975b5331a5b1cdda736890c7d4f2dcba4abac2b9399c977bdb7e09c964327e3f771cd592e2632b0e776545c490f29fd391ec13c7948557957cd805dd5
-
Filesize
363KB
MD54a843a97ae51c310b573a02ffd2a0e8e
SHA1063fa914ccb07249123c0d5f4595935487635b20
SHA256727ecf287fb6f4953ee7748913dd559b4f8d3a022fa2ca55bc51cf5886c52086
SHA512905c081552d95b523ecf1155b6c7e157652e5ff00cda30c1c21124d266eb7d305c3398d6832316f403dc45d1b639f1a5a67aea29922cd1a032f52e5247ec55d2
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
28KB
MD585221b3bcba8dbe4b4a46581aa49f760
SHA1746645c92594bfc739f77812d67cfd85f4b92474
SHA256f6e34a4550e499346f5ab1d245508f16bf765ff24c4988984b89e049ca55737f
SHA512060e35c4de14a03a2cda313f968e372291866cc4acd59977d7a48ac3745494abc54df83fff63cf30be4e10ff69a3b3c8b6c38f43ebd2a8d23d6c86fbee7ba87d
-
Filesize
107KB
MD59f0b9bc54bb73dfb7cf85520da1a08cb
SHA1236f7b770317d782f0817fbf7542140cb1e1526e
SHA2560d44d40e8bda72a3d6ca26665100b256848e2183029a6728c18ad97cd650547f
SHA5128acfb05a7b4723776fa66c0f71bde90dd49243de5dd2a8cf1a1f09a1175f9346c12a717050bff5f3938bda6cc4c610ca1eab75d4b9b7c8bcfb97d9158727a10d
-
Filesize
148KB
MD533908aa43ac0aaabc06a58d51b1c2cca
SHA10a0d1ce3435abe2eed635481bac69e1999031291
SHA2564447faacefaba8f040822101e2a4103031660de9139e70ecff9aa3a89455a783
SHA512d5216a53df9cfbe1a78629c103286eb17042f639149c46b6a1cd76498531ae82afd265462fbe0ba9baaff275fc95c66504804f107c449f3fc5833b1ed9c3da46
-
Filesize
107KB
MD59f0b9bc54bb73dfb7cf85520da1a08cb
SHA1236f7b770317d782f0817fbf7542140cb1e1526e
SHA2560d44d40e8bda72a3d6ca26665100b256848e2183029a6728c18ad97cd650547f
SHA5128acfb05a7b4723776fa66c0f71bde90dd49243de5dd2a8cf1a1f09a1175f9346c12a717050bff5f3938bda6cc4c610ca1eab75d4b9b7c8bcfb97d9158727a10d
-
Filesize
363KB
MD54a843a97ae51c310b573a02ffd2a0e8e
SHA1063fa914ccb07249123c0d5f4595935487635b20
SHA256727ecf287fb6f4953ee7748913dd559b4f8d3a022fa2ca55bc51cf5886c52086
SHA512905c081552d95b523ecf1155b6c7e157652e5ff00cda30c1c21124d266eb7d305c3398d6832316f403dc45d1b639f1a5a67aea29922cd1a032f52e5247ec55d2
-
Filesize
214KB
MD5399075975c41f7e85b12bc6668f59cf3
SHA104f5140a93f4fd7721cd305d12cdb80d75b36a16
SHA256b5129d385ac5d296142ba97faf663ffbb6c50761fc414d4528d8b8a26bc31ac3
SHA5121266087db1d06405ccdb4e3cfc8f086b361da2a276a62dcbd2ecfa4532571cf57fdc568b07493fb5d0d9171c1eac8b9d371cd3e35600ee08b108b2688c0c95bf
-
Filesize
83KB
MD59471017b246f1b3dbbd8984ecc1f4293
SHA1d498d3f0fdf3c5d90e244094f3df3e618da36341
SHA256e75f900e7240da9993c267a11f5a68d4c2cebb205fa690200bcdf8e1d0b6e7d8
SHA512d950f8e613b8585ba8148cad5731134105bf992d160cdedffdf914e78e7b9f1eac0fa3d1071c87343ee942a92ad8ebd1970850edb5fb278326ef03e9ab4160c7
-
Filesize
571KB
MD55a1e6b155435693938596d58eaca74bb
SHA127fb323ccc215136ef350469072b6ad559d39c3d
SHA256f2d5eb947b85f763f72de7f800118844a5207c9e3dd456f13186c2aaf0c485ac
SHA5124fee8576ef5541d4923aacb514b09e1e4dc8d6cbb1dcaada67c65240358147b971c2a1d034faf50c594ae7edb4a3c68dd4ffbbb69893413ffb52e71a86c65388
-
Filesize
114KB
MD500c3f5ca474a20c4a8dfb263a3950dad
SHA178b00a2e0490e1664af4d86fdbd3ac78330d21d4
SHA2569d849a8f5b39941ea32d47f0529977b1870f648736a483d86682436e3d3db748
SHA51220a8a8655b61b464f29329a70daa95a36c8c54b549bbec26ed93c63097d6d7a4c0a3ca1cb9a85a0521d298885c00f22fbfa28abf9aa33737056b48cc0ebead9d
-
Filesize
148KB
MD533908aa43ac0aaabc06a58d51b1c2cca
SHA10a0d1ce3435abe2eed635481bac69e1999031291
SHA2564447faacefaba8f040822101e2a4103031660de9139e70ecff9aa3a89455a783
SHA512d5216a53df9cfbe1a78629c103286eb17042f639149c46b6a1cd76498531ae82afd265462fbe0ba9baaff275fc95c66504804f107c449f3fc5833b1ed9c3da46
-
Filesize
214KB
MD5399075975c41f7e85b12bc6668f59cf3
SHA104f5140a93f4fd7721cd305d12cdb80d75b36a16
SHA256b5129d385ac5d296142ba97faf663ffbb6c50761fc414d4528d8b8a26bc31ac3
SHA5121266087db1d06405ccdb4e3cfc8f086b361da2a276a62dcbd2ecfa4532571cf57fdc568b07493fb5d0d9171c1eac8b9d371cd3e35600ee08b108b2688c0c95bf
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
350KB
MD59caf5e1999a4bd6ab8c4d4ea07818a7d
SHA1fb1fe1d18fb670fbbf7461f449a473778b711717
SHA256813ebc09bb3144d76f6f3a1550877c21590e0776f893915ca1178672e84ca1e7
SHA512d40a70f7718adc63a21758ce43bd0c3f71abf4a4b7dd0639be3decf326a1b3281ac1043c519fd3f5cbae5ed6b3e59e3bd8d583c2ae253529fdd6d5225f41ab74
-
Filesize
350KB
MD59caf5e1999a4bd6ab8c4d4ea07818a7d
SHA1fb1fe1d18fb670fbbf7461f449a473778b711717
SHA256813ebc09bb3144d76f6f3a1550877c21590e0776f893915ca1178672e84ca1e7
SHA512d40a70f7718adc63a21758ce43bd0c3f71abf4a4b7dd0639be3decf326a1b3281ac1043c519fd3f5cbae5ed6b3e59e3bd8d583c2ae253529fdd6d5225f41ab74
-
Filesize
107KB
MD59f0b9bc54bb73dfb7cf85520da1a08cb
SHA1236f7b770317d782f0817fbf7542140cb1e1526e
SHA2560d44d40e8bda72a3d6ca26665100b256848e2183029a6728c18ad97cd650547f
SHA5128acfb05a7b4723776fa66c0f71bde90dd49243de5dd2a8cf1a1f09a1175f9346c12a717050bff5f3938bda6cc4c610ca1eab75d4b9b7c8bcfb97d9158727a10d
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba