Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
23-08-2023 05:47
Static task
static1
Behavioral task
behavioral1
Sample
TG-x64.msi
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
TG-x64.msi
Resource
win10-20230703-en
General
-
Target
TG-x64.msi
-
Size
85.0MB
-
MD5
f55bad2eb9042a2602b0ec3e85229a12
-
SHA1
3ab48b03629dfff4afb9a5a883e93e5a63011849
-
SHA256
beb1c209e511b20fd914c2a55d557aab557535f46ef3e1ffd70e478e375c483a
-
SHA512
8b9ebac68c158d6d7823e728afa0424c582ce31a13e928a90cd77ea1970daba5df2af7c211c3d9122ab06414b8b773af60fe9f294f61d7b3702ce0d2a9275ad0
-
SSDEEP
1572864:3CKa/mZuqQjEedKzR+X2JoqtK5vWcPTlXLquLznMOSRzqVMwa6uM5L6smN9IWO+B:3CKZuqQAedcsX1LlWcPThGGzPSRzZwo9
Malware Config
Signatures
-
Processes:
reg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe -
Executes dropped EXE 2 IoCs
Processes:
dach.exeAliIM.exepid process 528 dach.exe 4556 AliIM.exe -
Loads dropped DLL 9 IoCs
Processes:
MsiExec.exeMsiExec.exeAliIM.exepid process 5116 MsiExec.exe 5116 MsiExec.exe 5116 MsiExec.exe 5116 MsiExec.exe 5116 MsiExec.exe 5116 MsiExec.exe 3808 MsiExec.exe 3808 MsiExec.exe 4556 AliIM.exe -
Processes:
resource yara_rule behavioral2/memory/528-217-0x0000000180000000-0x000000018003E000-memory.dmp upx behavioral2/memory/528-220-0x0000000180000000-0x000000018003E000-memory.dmp upx behavioral2/memory/528-219-0x0000000180000000-0x000000018003E000-memory.dmp upx behavioral2/memory/528-221-0x0000000180000000-0x000000018003E000-memory.dmp upx behavioral2/memory/528-222-0x0000000180000000-0x000000018003E000-memory.dmp upx behavioral2/memory/528-235-0x0000000180000000-0x000000018003E000-memory.dmp upx behavioral2/memory/528-268-0x0000000180000000-0x000000018003E000-memory.dmp upx -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exeAliIM.exedescription ioc process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: AliIM.exe File opened (read-only) \??\K: AliIM.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\L: AliIM.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: AliIM.exe File opened (read-only) \??\N: AliIM.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\T: AliIM.exe File opened (read-only) \??\Z: AliIM.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: AliIM.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: AliIM.exe File opened (read-only) \??\Q: AliIM.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: AliIM.exe File opened (read-only) \??\S: AliIM.exe File opened (read-only) \??\X: AliIM.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: AliIM.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: AliIM.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: AliIM.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: AliIM.exe File opened (read-only) \??\G: AliIM.exe File opened (read-only) \??\U: AliIM.exe File opened (read-only) \??\V: AliIM.exe File opened (read-only) \??\W: AliIM.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: AliIM.exe File opened (read-only) \??\M: msiexec.exe -
Drops file in System32 directory 7 IoCs
Processes:
dach.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7229E30BCFD0992128433D951137A421_F0BB2463DDCCB4B49DC9200CC9E498E9 dach.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7229E30BCFD0992128433D951137A421_F0BB2463DDCCB4B49DC9200CC9E498E9 dach.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7229E30BCFD0992128433D951137A421_76EBFC12D6FD7EE9DD82775C12CF3BD5 dach.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7229E30BCFD0992128433D951137A421_76EBFC12D6FD7EE9DD82775C12CF3BD5 dach.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 dach.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_F7F9B7BDCC367A8E3539D28F7D4D4BA2 dach.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_F7F9B7BDCC367A8E3539D28F7D4D4BA2 dach.exe -
Drops file in Windows directory 10 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Windows\Installer\e58d7dd.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{64C771E6-49B2-43AB-9C7C-204A7AEEFF42} msiexec.exe File opened for modification C:\Windows\Installer\MSIDEA5.tmp msiexec.exe File created C:\Windows\Installer\e58d7df.msi msiexec.exe File opened for modification C:\Windows\Installer\e58d7dd.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSID8B7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDA5E.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
dach.exemmc.exeexplorer.exemmc.exenetsh.exenetsh.exemmc.exemsiexec.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" dach.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Settings mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\ExplorerStartupTraceRecorded = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\RenderSoft TextCalc dach.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" dach.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 dach.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@mmcbase.dll,-14008 = "Folder" mmc.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\RenderSoft TextCalc\TextCalc\Recent File List dach.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ dach.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Settings mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mmc.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideIcons = "0" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Recent File List mmc.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control netsh.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace\Session netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellState = 240000003428000000000000000000000000000001000000130000000000000062000000 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\DontPrettyPath = "0" explorer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" dach.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\S-1-5-18_Classes\Local Settings dach.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden = "2" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\AutoCheckSelect = "0" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix dach.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" dach.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache dach.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Recent File List mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\SeparateProcess = "0" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dach.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Settings mmc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\WebView = "1" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Filter = "0" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\RenderSoft TextCalc\TextCalc\Settings dach.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" dach.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" dach.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowCompColor = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\RenderSoft TextCalc\TextCalc dach.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mmc.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM netsh.exe -
Modifies registry class 23 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\6E177C462B94BA34C9C702A4A7EEFF24 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\Version = "16777216" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\Language = "2052" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\B0B06FDC9804AA44B87795745B93C68C\6E177C462B94BA34C9C702A4A7EEFF24 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\6E177C462B94BA34C9C702A4A7EEFF24\MainFeature msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\PackageCode = "88BDD1AFCC554E34FA442BDB0A4E3ECC" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\B0B06FDC9804AA44B87795745B93C68C msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList\PackageName = "TG-x64.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\ProductName = "HIP-THH" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList\Media\DiskPrompt = "[1]" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
msiexec.exeAliIM.exepid process 4896 msiexec.exe 4896 msiexec.exe 4556 AliIM.exe 4556 AliIM.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
Processes:
mmc.exemmc.exepid process 1848 mmc.exe 2264 mmc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 4552 msiexec.exe Token: SeIncreaseQuotaPrivilege 4552 msiexec.exe Token: SeSecurityPrivilege 4896 msiexec.exe Token: SeCreateTokenPrivilege 4552 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4552 msiexec.exe Token: SeLockMemoryPrivilege 4552 msiexec.exe Token: SeIncreaseQuotaPrivilege 4552 msiexec.exe Token: SeMachineAccountPrivilege 4552 msiexec.exe Token: SeTcbPrivilege 4552 msiexec.exe Token: SeSecurityPrivilege 4552 msiexec.exe Token: SeTakeOwnershipPrivilege 4552 msiexec.exe Token: SeLoadDriverPrivilege 4552 msiexec.exe Token: SeSystemProfilePrivilege 4552 msiexec.exe Token: SeSystemtimePrivilege 4552 msiexec.exe Token: SeProfSingleProcessPrivilege 4552 msiexec.exe Token: SeIncBasePriorityPrivilege 4552 msiexec.exe Token: SeCreatePagefilePrivilege 4552 msiexec.exe Token: SeCreatePermanentPrivilege 4552 msiexec.exe Token: SeBackupPrivilege 4552 msiexec.exe Token: SeRestorePrivilege 4552 msiexec.exe Token: SeShutdownPrivilege 4552 msiexec.exe Token: SeDebugPrivilege 4552 msiexec.exe Token: SeAuditPrivilege 4552 msiexec.exe Token: SeSystemEnvironmentPrivilege 4552 msiexec.exe Token: SeChangeNotifyPrivilege 4552 msiexec.exe Token: SeRemoteShutdownPrivilege 4552 msiexec.exe Token: SeUndockPrivilege 4552 msiexec.exe Token: SeSyncAgentPrivilege 4552 msiexec.exe Token: SeEnableDelegationPrivilege 4552 msiexec.exe Token: SeManageVolumePrivilege 4552 msiexec.exe Token: SeImpersonatePrivilege 4552 msiexec.exe Token: SeCreateGlobalPrivilege 4552 msiexec.exe Token: SeCreateTokenPrivilege 4552 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4552 msiexec.exe Token: SeLockMemoryPrivilege 4552 msiexec.exe Token: SeIncreaseQuotaPrivilege 4552 msiexec.exe Token: SeMachineAccountPrivilege 4552 msiexec.exe Token: SeTcbPrivilege 4552 msiexec.exe Token: SeSecurityPrivilege 4552 msiexec.exe Token: SeTakeOwnershipPrivilege 4552 msiexec.exe Token: SeLoadDriverPrivilege 4552 msiexec.exe Token: SeSystemProfilePrivilege 4552 msiexec.exe Token: SeSystemtimePrivilege 4552 msiexec.exe Token: SeProfSingleProcessPrivilege 4552 msiexec.exe Token: SeIncBasePriorityPrivilege 4552 msiexec.exe Token: SeCreatePagefilePrivilege 4552 msiexec.exe Token: SeCreatePermanentPrivilege 4552 msiexec.exe Token: SeBackupPrivilege 4552 msiexec.exe Token: SeRestorePrivilege 4552 msiexec.exe Token: SeShutdownPrivilege 4552 msiexec.exe Token: SeDebugPrivilege 4552 msiexec.exe Token: SeAuditPrivilege 4552 msiexec.exe Token: SeSystemEnvironmentPrivilege 4552 msiexec.exe Token: SeChangeNotifyPrivilege 4552 msiexec.exe Token: SeRemoteShutdownPrivilege 4552 msiexec.exe Token: SeUndockPrivilege 4552 msiexec.exe Token: SeSyncAgentPrivilege 4552 msiexec.exe Token: SeEnableDelegationPrivilege 4552 msiexec.exe Token: SeManageVolumePrivilege 4552 msiexec.exe Token: SeImpersonatePrivilege 4552 msiexec.exe Token: SeCreateGlobalPrivilege 4552 msiexec.exe Token: SeCreateTokenPrivilege 4552 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4552 msiexec.exe Token: SeLockMemoryPrivilege 4552 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 4552 msiexec.exe 4552 msiexec.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
dach.exemmc.exemmc.exemmc.exepid process 528 dach.exe 528 dach.exe 2504 mmc.exe 2504 mmc.exe 1848 mmc.exe 1848 mmc.exe 2264 mmc.exe 2264 mmc.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
msiexec.exemmc.exemmc.exedach.execmd.exemmc.exeexplorer.exeAliIM.exedescription pid process target process PID 4896 wrote to memory of 5116 4896 msiexec.exe MsiExec.exe PID 4896 wrote to memory of 5116 4896 msiexec.exe MsiExec.exe PID 4896 wrote to memory of 5116 4896 msiexec.exe MsiExec.exe PID 4896 wrote to memory of 4600 4896 msiexec.exe srtasks.exe PID 4896 wrote to memory of 4600 4896 msiexec.exe srtasks.exe PID 4896 wrote to memory of 3808 4896 msiexec.exe MsiExec.exe PID 4896 wrote to memory of 3808 4896 msiexec.exe MsiExec.exe PID 4896 wrote to memory of 3808 4896 msiexec.exe MsiExec.exe PID 4896 wrote to memory of 528 4896 msiexec.exe dach.exe PID 4896 wrote to memory of 528 4896 msiexec.exe dach.exe PID 2504 wrote to memory of 2852 2504 mmc.exe netsh.exe PID 2504 wrote to memory of 2852 2504 mmc.exe netsh.exe PID 1848 wrote to memory of 3604 1848 mmc.exe netsh.exe PID 1848 wrote to memory of 3604 1848 mmc.exe netsh.exe PID 528 wrote to memory of 4292 528 dach.exe cmd.exe PID 528 wrote to memory of 4292 528 dach.exe cmd.exe PID 4292 wrote to memory of 992 4292 cmd.exe reg.exe PID 4292 wrote to memory of 992 4292 cmd.exe reg.exe PID 4292 wrote to memory of 2144 4292 cmd.exe reg.exe PID 4292 wrote to memory of 2144 4292 cmd.exe reg.exe PID 4292 wrote to memory of 4480 4292 cmd.exe reg.exe PID 4292 wrote to memory of 4480 4292 cmd.exe reg.exe PID 528 wrote to memory of 1052 528 dach.exe cmd.exe PID 528 wrote to memory of 1052 528 dach.exe cmd.exe PID 2264 wrote to memory of 2920 2264 mmc.exe explorer.exe PID 2264 wrote to memory of 2920 2264 mmc.exe explorer.exe PID 3444 wrote to memory of 4556 3444 explorer.exe AliIM.exe PID 3444 wrote to memory of 4556 3444 explorer.exe AliIM.exe PID 3444 wrote to memory of 4556 3444 explorer.exe AliIM.exe PID 4556 wrote to memory of 1860 4556 AliIM.exe netsh.exe PID 4556 wrote to memory of 1860 4556 AliIM.exe netsh.exe PID 4556 wrote to memory of 1860 4556 AliIM.exe netsh.exe PID 4556 wrote to memory of 1656 4556 AliIM.exe netsh.exe PID 4556 wrote to memory of 1656 4556 AliIM.exe netsh.exe PID 4556 wrote to memory of 1656 4556 AliIM.exe netsh.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\TG-x64.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4552
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7B521B9713907A72EEE6F0BAF0C39C5B C2⤵
- Loads dropped DLL
PID:5116 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4600
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3D0300900593D9674B6F2A021F19B18C2⤵
- Loads dropped DLL
PID:3808 -
C:\Users\Admin\AppData\Roaming\HIP-THH\tdata\emoji\dach.exe"C:\Users\Admin\AppData\Roaming\HIP-THH\tdata\emoji\dach.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Roaming\blRMO.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t reg_dword /d 0 /F4⤵
- UAC bypass
PID:992 -
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t reg_dword /d 0 /F4⤵
- UAC bypass
PID:2144 -
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v PromptOnSecureDesktop /t reg_dword /d 0 /F4⤵
- UAC bypass
PID:4480 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /b C:\Users\Public\Pictures\I6RXY\uQ1cQ_g\n + C:\Users\Public\Pictures\I6RXY\uQ1cQ_g\m C:\Users\Public\Pictures\I6RXY\uQ1cQ_g\UpdateAssist.dll3⤵PID:1052
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:748
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Modifies data under HKEY_USERS
PID:4444
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set address 以太网 static 1.0.0.2 255.255.255.0 1.0.0.1 12⤵
- Modifies data under HKEY_USERS
PID:2852
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: SetClipboardViewer
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set address \"WLAN\" static 1.0.0.3 255.255.255.0 1.0.0.1 12⤵
- Modifies data under HKEY_USERS
PID:3604
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: SetClipboardViewer
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" /root, C:\Users\Public\Pictures\I6RXY\uQ1cQ_g\AliIM.exe2⤵
- Modifies data under HKEY_USERS
PID:2920
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Public\Pictures\I6RXY\uQ1cQ_g\AliIM.exe"C:\Users\Public\Pictures\I6RXY\uQ1cQ_g\AliIM.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set address \"ÒÔÌ«Íø\" dhcp3⤵PID:1860
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set address \"WLAN\" dhcp3⤵PID:1656
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
1.1MB
MD5bb05e538eb0fd043124c1dbd7a54f6a0
SHA1c44c550a754d87880e3413cfa0cb3bcbe7523edb
SHA2560255d50c8fc8f036794a3cebdf2937a94821c6cf07caee1be90cf11fbf4f4c47
SHA512ff6a9b0862307ebe85d72a62eefc09054290995c373f3c5b248bb6f04a6246d68160f6227873bc11649b894cd011f263c0d258796dffa09afb31412d78a8be69
-
Filesize
26.4MB
MD52cbc7a3f347b6cc2ea3da8a4c704bfe2
SHA1da22d871980121b5a14e74e7b74da2a7003d9489
SHA256581699ab0b929e148533b2d57819810d14a532df7ac5ca6d18b3d562d7dc88f3
SHA512037ced5fa254eb1b1adb95dc0f3a33497f315bda91c72823f73bb523f50726cda0925096d0e9ed8ee64e6dc39a39959b112058e9e95d28f5027287a20bdfbc18
-
Filesize
26.4MB
MD52cbc7a3f347b6cc2ea3da8a4c704bfe2
SHA1da22d871980121b5a14e74e7b74da2a7003d9489
SHA256581699ab0b929e148533b2d57819810d14a532df7ac5ca6d18b3d562d7dc88f3
SHA512037ced5fa254eb1b1adb95dc0f3a33497f315bda91c72823f73bb523f50726cda0925096d0e9ed8ee64e6dc39a39959b112058e9e95d28f5027287a20bdfbc18
-
Filesize
392B
MD530d6eb22d6aeec10347239b17b023bf4
SHA1e2a6f86d66c699f6e0ff1ac4e140af4a2a4637d1
SHA256659df6b190a0b92fc34e3a4457b4a8d11a26a4caf55de64dfe79eb1276181f08
SHA512500872c3f2f3f801ec51717690873194675cb7f32cc4a862c09d90c18638d364d49b0e04c32323f52734e5c806e3503a63ac755c7019d762786a72840123df76
-
Filesize
473KB
MD5ed17abee766074018926ff48e0ce7a3d
SHA1d6d3172176302db9ee6225ea06dc1667a814327b
SHA256a8325bd88171952dfb45b16d8bf541e4fbe5d0e546c4e6f6d8aca32b96756dc8
SHA5127dba4925e7aa66b172c76e294938385db09edaf652b751ca3464b03b6203387c07c13c93eafaa9707ec8ad03cc586b1d67abbc731ff6792d422f49a18c30ca86
-
Filesize
473KB
MD5ed17abee766074018926ff48e0ce7a3d
SHA1d6d3172176302db9ee6225ea06dc1667a814327b
SHA256a8325bd88171952dfb45b16d8bf541e4fbe5d0e546c4e6f6d8aca32b96756dc8
SHA5127dba4925e7aa66b172c76e294938385db09edaf652b751ca3464b03b6203387c07c13c93eafaa9707ec8ad03cc586b1d67abbc731ff6792d422f49a18c30ca86
-
Filesize
215KB
MD50ba0713397a453abccfdd0542a8a8c1d
SHA138825f7a4f8997998620d695beb80f7aa9748e6a
SHA2566e0aaf4d72409c28d8ae7bd0b669615cd5bc7d1b3631e024dc04db57f02b16b3
SHA512f550cdd6f9dfb4763c8677d3ba807137c7ff7865484817321d5c28d8a1b8177fb3d2016662c27e04cb27df935bb963c51e374888dd8046a8f19bdebd9421a5a8
-
Filesize
200KB
MD561d49ae47f7fc07f79af64c95169f69e
SHA1e46f038cfea8de5d75bf9f24c44079b16769457d
SHA25605afde58840d8e5a98e479c404a2d508b3a5c85bd6f6fc1f4ecfcf0bc38ed10e
SHA51274d45e6517d0513d46f7e6453154ef832004998d4da2e31c81cbe64acc3a94d24599f065d60dfbe3ca562f2bb4c3f89c5a5acb9de39aa921d26bdf4745505f63
-
Filesize
159KB
MD58deb060ded3af0b733f967caae99d9b3
SHA14a33d4e1fc45f325191f82c3e5a7decc99f21254
SHA256b12a8ea89bd5582c54dca77c663c1a4f6f0d68d1d41ecd2b56fff7520109832d
SHA512ae7c02cb1cab1b4a0be18ea72034cf9ed8426fb31d51114ca454eef90205aacd60770b68f18d27305c79dcf75755d4bad80affa5c644665cae1802a2ca6ffb0d
-
Filesize
100KB
MD541018de291eabc6864c0df467b0b3f79
SHA10f4777c5e381fff0cce6036ac7aac12984518e18
SHA256c654b24360b208b58c66dec156dd2698e03b09a44ea1d6b8eef875275c5ab5f4
SHA5122a661c5e86a65c4ec5310e5e7f7f6f43af7efe93ead598cf6b5b4afe9b24429b86268746ca0396f02818d4d86fcae27088bfe56614779b4fe626627ea4747ae5
-
Filesize
100KB
MD5bf3be0df5d9f5aa446f73bcf5bdc7d1d
SHA11385c180fbae3056a648c921acf0fc7ed075d998
SHA2561196416efafd445f2eafde81c8f783573613d0594997361016a2ae1452ff490c
SHA5128c0e33a4eebb3fd8dbd179caa987ff86b978450eb07fdd9aaec754f949a3667e4c372843fb0e70b32312ebe28f36f43e3fe4ea82a9994f3ce19316a9c54e4acb
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
85.0MB
MD5f55bad2eb9042a2602b0ec3e85229a12
SHA13ab48b03629dfff4afb9a5a883e93e5a63011849
SHA256beb1c209e511b20fd914c2a55d557aab557535f46ef3e1ffd70e478e375c483a
SHA5128b9ebac68c158d6d7823e728afa0424c582ce31a13e928a90cd77ea1970daba5df2af7c211c3d9122ab06414b8b773af60fe9f294f61d7b3702ce0d2a9275ad0
-
Filesize
25.0MB
MD5cb535925875fa3b90e981a742e20ed40
SHA11a04857b02fe3800c8f551ee21a8a6d2b83236f5
SHA256410d78ec8210adf422b82c1cafb5e4bb89e16ab3be4a062f9a588fdbefef8d78
SHA512f2f14cabfedc44c739218944d747b98b4ae94414e5b3d2e2d5fcf63be534bd347c1ec684b3e45047d1e281c5084e96a438e1fac6dabe881126c485027bd89280
-
\??\Volume{96ff0cd0-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{7729eb0e-582d-4dc5-bc31-0c54c6e29f25}_OnDiskSnapshotProp
Filesize5KB
MD5e9c915e0d8334959a27a327991a2fc80
SHA1699cfa9e418fbc13ed3189b7479bc33e2365c519
SHA256f4201efc9ee886392fe163ff1a74c0c3d0037de93a15b7fff75f3cc49c0a1774
SHA51271e4cfc632313f050537bff679efea1de7780fde9629663751c026c9a1668540366a069c016ac5799a8f47c08ed40be7a90273349b766a0fb887199ea894bf23
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
200KB
MD561d49ae47f7fc07f79af64c95169f69e
SHA1e46f038cfea8de5d75bf9f24c44079b16769457d
SHA25605afde58840d8e5a98e479c404a2d508b3a5c85bd6f6fc1f4ecfcf0bc38ed10e
SHA51274d45e6517d0513d46f7e6453154ef832004998d4da2e31c81cbe64acc3a94d24599f065d60dfbe3ca562f2bb4c3f89c5a5acb9de39aa921d26bdf4745505f63
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9