Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
26/11/2023, 14:19
Behavioral task
behavioral1
Sample
0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe
Resource
win7-20231020-en
General
-
Target
0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe
-
Size
223KB
-
MD5
c3884fdb01c5772eabc515a30513e556
-
SHA1
213ad80a218ba9d98948710ff0b119dcbca70d0f
-
SHA256
0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224
-
SHA512
a4b9b4b8b4757e7aa45ab978a0daeaef6ae4f3fc98a242edda6a67312d564f268f8cba5506e3270ac5c3f6145243d44989f31c90a0358a006a3f96ca04481733
-
SSDEEP
3072:qZ7wXfSRZ0ON/EwW66wN94xu4CkAZJM2k5D66L+NfGbVON2Nqi/6gS5UoWXHz72n:mwPSUONLNsuWA7koN+boRi9S6oiz72D
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1276 created 420 1276 Explorer.EXE 23 -
Drops file in Drivers directory 9 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\RfMa8Rdejgz.sys driverquery.exe File opened for modification C:\Windows\system32\drivers\B8cK59gpT5GURs.wbe driverquery.exe File created C:\Windows\System32\drivers\qY748oQ.sys driverquery.exe File opened for modification C:\Windows\system32\drivers\wDON0jbPjzXz.sys driverquery.exe File opened for modification C:\Windows\system32\drivers\PB5Lr7hzlOMh.qtr driverquery.exe File opened for modification C:\Windows\system32\drivers\Jl35PaMFnSY7.sys driverquery.exe File opened for modification C:\Windows\system32\drivers\nwurBFHQrsEJbh.sys driverquery.exe File opened for modification C:\Windows\system32\drivers\M3fGlE9XhQMeU.jqb driverquery.exe File opened for modification C:\Windows\system32\drivers\4YDLAsuzvdR5Ef.xvb driverquery.exe -
Deletes itself 1 IoCs
pid Process 2996 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3028 driverquery.exe -
Loads dropped DLL 7 IoCs
pid Process 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1220 Dwm.exe 1220 Dwm.exe 1220 Dwm.exe -
resource yara_rule behavioral1/memory/860-0-0x0000000001100000-0x000000000116E000-memory.dmp upx behavioral1/memory/860-46-0x0000000001100000-0x000000000116E000-memory.dmp upx behavioral1/memory/860-54-0x0000000001100000-0x000000000116E000-memory.dmp upx behavioral1/memory/860-71-0x0000000001100000-0x000000000116E000-memory.dmp upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
resource yara_rule behavioral1/files/0x000b0000000120d6-155.dat vmprotect behavioral1/files/0x00190000000120d6-250.dat vmprotect behavioral1/files/0x00270000000120d6-334.dat vmprotect behavioral1/files/0x00350000000120d6-418.dat vmprotect -
Drops file in System32 directory 23 IoCs
description ioc Process File opened for modification C:\Windows\system32\mwWfyCAuSRn6Pb.sys driverquery.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 driverquery.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 driverquery.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C driverquery.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B driverquery.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B driverquery.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 driverquery.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 driverquery.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_CE21678B3713ACF5F5ED4AAA700C6173 driverquery.exe File created C:\Windows\system32\ \Windows\System32\FfgqVaAWa.sys driverquery.exe File opened for modification C:\Windows\system32\uKBUMW0sXdBE.sys driverquery.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C driverquery.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_ADB601E2C381343DA1163E5F08582475 driverquery.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_ADB601E2C381343DA1163E5F08582475 driverquery.exe File opened for modification C:\Windows\system32\HXrvC4FXY7YbqJ.xqo driverquery.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 driverquery.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 driverquery.exe File opened for modification C:\Windows\system32\c1dSA6Dtvm06.flv driverquery.exe File opened for modification C:\Windows\system32\0EKkwzSHVBRu9b.blz driverquery.exe File opened for modification C:\Windows\system32\Xqz7TgKYCwRc.sys driverquery.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_CE21678B3713ACF5F5ED4AAA700C6173 driverquery.exe File opened for modification C:\Windows\system32\WBNG0MfayfY.sys driverquery.exe File opened for modification C:\Windows\system32\GkNHIgx9ne2.pcg driverquery.exe -
Drops file in Program Files directory 31 IoCs
description ioc Process File opened for modification C:\Program Files\wDM7P16VSlms.byo driverquery.exe File opened for modification C:\Program Files\gqsl3KlzVz.sys driverquery.exe File opened for modification C:\Program Files\yZdKDi2Se2Yt.sys driverquery.exe File opened for modification C:\Program Files (x86)\JNqNO8pK1u.dtq driverquery.exe File opened for modification C:\Program Files\DVD Maker\manifest.json Dwm.exe File opened for modification C:\Program Files\DVD Maker\5cccf7cc.js Dwm.exe File opened for modification C:\Program Files\Microsoft Games\4d55872b.html Explorer.EXE File opened for modification C:\Program Files\0tBQKn2xXeuq0.mhr driverquery.exe File opened for modification C:\Program Files\IA600iojdlgZQ.sys driverquery.exe File opened for modification C:\Program Files\Windows Media Player\3dddfa88.js driverquery.exe File opened for modification C:\Program Files\Windows Media Player\5cccf7cc.js driverquery.exe File opened for modification C:\Program Files\DVD Maker\3dddfa88.js Dwm.exe File opened for modification C:\Program Files\G3t7Eul0Gd0PZ.qps driverquery.exe File opened for modification C:\Program Files\MBNvQBcueB.wfy driverquery.exe File opened for modification C:\Program Files (x86)\vm0UjTpjfFNH.qou driverquery.exe File opened for modification C:\Program Files (x86)\o9MwClOFOlcqkz.sys driverquery.exe File opened for modification C:\Program Files (x86)\RHHATvkw8yUB.sys driverquery.exe File opened for modification C:\Program Files\Windows Media Player\lib\6c44766e.js driverquery.exe File opened for modification C:\Program Files\Microsoft Games\3dde05bc.js Explorer.EXE File opened for modification C:\Program Files (x86)\aWCrMNg8qN7X.sys driverquery.exe File opened for modification C:\Program Files (x86)\oDLgm9mbS3.oiu driverquery.exe File opened for modification C:\Program Files\DVD Maker\4d55792a.html Dwm.exe File opened for modification C:\Program Files\Microsoft Games\lib\6c448a09.js Explorer.EXE File opened for modification C:\Program Files (x86)\6I9uU30NpiX.hgk driverquery.exe File opened for modification C:\Program Files\Windows Media Player\4d55792a.html driverquery.exe File opened for modification C:\Program Files\DVD Maker\lib\6c44766e.js Dwm.exe File opened for modification C:\Program Files\maPgTVA2Av8W.sys driverquery.exe File opened for modification C:\Program Files (x86)\dxKfIyqXsdQ5w9.sys driverquery.exe File opened for modification C:\Program Files\Windows Media Player\manifest.json driverquery.exe File opened for modification C:\Program Files\Microsoft Games\manifest.json Explorer.EXE File opened for modification C:\Program Files\Microsoft Games\5ccd089a.js Explorer.EXE -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\DXDlP4CG.sys driverquery.exe File opened for modification C:\Windows\1qT60PVMkjqln.oap driverquery.exe File opened for modification C:\Windows\n9a3K75kxoNnct.gij driverquery.exe File opened for modification C:\Windows\vZqhwEGli3Fh.pvd driverquery.exe File opened for modification C:\Windows\yoDRyNHePXx.sys driverquery.exe File created C:\Windows\Logs\driverquery.exe Explorer.EXE File opened for modification C:\Windows\Logs\driverquery.exe Explorer.EXE File opened for modification C:\Windows\mXt0CPaJk0.sys driverquery.exe File opened for modification C:\Windows\vDYtWg8z9esPh.sys driverquery.exe File opened for modification C:\Windows\3hNxEE851l2fk.sys driverquery.exe File opened for modification C:\Windows\CjLYI6pH2dEP.quw driverquery.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2648 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-57-ba-b3-5c-b9\WpadDecision = "0" driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs driverquery.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{806F5D4B-4102-4495-AD6C-41016BBC561C}\WpadDecision = "0" driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates driverquery.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust driverquery.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs driverquery.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings ReAgentc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 driverquery.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{806F5D4B-4102-4495-AD6C-41016BBC561C}\WpadDecisionTime = a03129a97320da01 driverquery.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-57-ba-b3-5c-b9\WpadDecisionTime = a03129a97320da01 driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs driverquery.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 driverquery.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{806F5D4B-4102-4495-AD6C-41016BBC561C}\WpadDecisionReason = "1" driverquery.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing driverquery.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates driverquery.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{806F5D4B-4102-4495-AD6C-41016BBC561C}\52-57-ba-b3-5c-b9 driverquery.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs driverquery.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{806F5D4B-4102-4495-AD6C-41016BBC561C} driverquery.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-57-ba-b3-5c-b9\WpadDecisionReason = "1" driverquery.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My driverquery.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs driverquery.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" ReAgentc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates driverquery.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs driverquery.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix driverquery.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" driverquery.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad driverquery.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0062000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-57-ba-b3-5c-b9 driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates driverquery.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections ReAgentc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings driverquery.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{806F5D4B-4102-4495-AD6C-41016BBC561C}\WpadNetworkName = "Network" driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs driverquery.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" ReAgentc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs driverquery.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" ReAgentc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 driverquery.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ driverquery.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs driverquery.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix ReAgentc.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CDE6AAF6C1A8635E3BE792896F2079A5AA7671F3\Blob = 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 driverquery.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CDE6AAF6C1A8635E3BE792896F2079A5AA7671F3\Blob = 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 driverquery.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d0030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 driverquery.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CDE6AAF6C1A8635E3BE792896F2079A5AA7671F3 driverquery.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 driverquery.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CDE6AAF6C1A8635E3BE792896F2079A5AA7671F3\Blob = 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 driverquery.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 3028 driverquery.exe 1180 ReAgentc.exe 3028 driverquery.exe 1276 Explorer.EXE 3028 driverquery.exe 3028 driverquery.exe 3028 driverquery.exe 3028 driverquery.exe 3028 driverquery.exe 3028 driverquery.exe 3028 driverquery.exe 3028 driverquery.exe 1276 Explorer.EXE 1276 Explorer.EXE 3028 driverquery.exe 1276 Explorer.EXE 1276 Explorer.EXE 3028 driverquery.exe 1276 Explorer.EXE 3028 driverquery.exe 1276 Explorer.EXE 1276 Explorer.EXE 3028 driverquery.exe 3028 driverquery.exe 1276 Explorer.EXE 1276 Explorer.EXE 3028 driverquery.exe 1276 Explorer.EXE 1276 Explorer.EXE 3028 driverquery.exe 1276 Explorer.EXE 1276 Explorer.EXE 3028 driverquery.exe 3028 driverquery.exe 1276 Explorer.EXE 1276 Explorer.EXE 3028 driverquery.exe 1276 Explorer.EXE 3028 driverquery.exe 1276 Explorer.EXE 1276 Explorer.EXE 3028 driverquery.exe 1276 Explorer.EXE 3028 driverquery.exe 1276 Explorer.EXE 1276 Explorer.EXE 3028 driverquery.exe 1276 Explorer.EXE 3028 driverquery.exe 1276 Explorer.EXE 3028 driverquery.exe 1276 Explorer.EXE 3028 driverquery.exe 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1276 Explorer.EXE -
Suspicious behavior: LoadsDriver 59 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe Token: SeTcbPrivilege 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe Token: SeDebugPrivilege 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe Token: SeDebugPrivilege 1276 Explorer.EXE Token: SeDebugPrivilege 1276 Explorer.EXE Token: SeDebugPrivilege 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe Token: SeIncBasePriorityPrivilege 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe Token: SeDebugPrivilege 3028 driverquery.exe Token: SeDebugPrivilege 3028 driverquery.exe Token: SeDebugPrivilege 3028 driverquery.exe Token: SeDebugPrivilege 3028 driverquery.exe Token: SeDebugPrivilege 3028 driverquery.exe Token: SeBackupPrivilege 3028 driverquery.exe Token: SeDebugPrivilege 3028 driverquery.exe Token: SeDebugPrivilege 3028 driverquery.exe Token: SeDebugPrivilege 3028 driverquery.exe Token: SeDebugPrivilege 1276 Explorer.EXE Token: SeBackupPrivilege 1276 Explorer.EXE Token: SeDebugPrivilege 1220 Dwm.exe Token: SeBackupPrivilege 1220 Dwm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1276 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 860 wrote to memory of 1276 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 6 PID 860 wrote to memory of 1276 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 6 PID 860 wrote to memory of 1276 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 6 PID 860 wrote to memory of 1276 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 6 PID 860 wrote to memory of 1276 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 6 PID 1276 wrote to memory of 3028 1276 Explorer.EXE 28 PID 1276 wrote to memory of 3028 1276 Explorer.EXE 28 PID 1276 wrote to memory of 3028 1276 Explorer.EXE 28 PID 1276 wrote to memory of 3028 1276 Explorer.EXE 28 PID 1276 wrote to memory of 3028 1276 Explorer.EXE 28 PID 1276 wrote to memory of 3028 1276 Explorer.EXE 28 PID 1276 wrote to memory of 3028 1276 Explorer.EXE 28 PID 1276 wrote to memory of 3028 1276 Explorer.EXE 28 PID 860 wrote to memory of 420 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 23 PID 860 wrote to memory of 420 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 23 PID 860 wrote to memory of 420 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 23 PID 860 wrote to memory of 420 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 23 PID 860 wrote to memory of 420 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 23 PID 860 wrote to memory of 2996 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 31 PID 860 wrote to memory of 2996 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 31 PID 860 wrote to memory of 2996 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 31 PID 860 wrote to memory of 2996 860 0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe 31 PID 2996 wrote to memory of 2648 2996 cmd.exe 33 PID 2996 wrote to memory of 2648 2996 cmd.exe 33 PID 2996 wrote to memory of 2648 2996 cmd.exe 33 PID 2996 wrote to memory of 2648 2996 cmd.exe 33 PID 3028 wrote to memory of 1180 3028 driverquery.exe 37 PID 3028 wrote to memory of 1180 3028 driverquery.exe 37 PID 3028 wrote to memory of 1180 3028 driverquery.exe 37 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1180 3028 driverquery.exe 37 PID 3028 wrote to memory of 1180 3028 driverquery.exe 37 PID 3028 wrote to memory of 1180 3028 driverquery.exe 37 PID 3028 wrote to memory of 1180 3028 driverquery.exe 37 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1180 3028 driverquery.exe 37 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6 PID 3028 wrote to memory of 1276 3028 driverquery.exe 6
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe"C:\Users\Admin\AppData\Local\Temp\0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe"2⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\timeout.exetimeout /t 14⤵
- Delays execution with timeout.exe
PID:2648
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\Logs\driverquery.exe"C:\Windows\Logs\driverquery.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\system32\ReAgentc.exe"C:\Windows\system32\ReAgentc.exe"3⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
Filesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
415KB
MD564bc1983743c584a9ad09dacf12792e5
SHA10f14098f523d21f11129c4df09451413ddff6d61
SHA256057ec356f1577fe86b706e5aeb74e3bdd6fe04d22586fecf69b866f8f72db7f5
SHA5129ab4ddb64bd97dd1a7ee15613a258edf1d2eba880a0896a91487c47a32c9bd1118cde18211053a5b081216d123d5f901b454a525cbba01d8067c31babd8c8c3c
-
Filesize
94KB
MD5e2bcd723ea3517e71a154502127b5d92
SHA14ef626bfc18e4707a195a79a975392b30d0d603e
SHA2560e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc
SHA512497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a
-
Filesize
94KB
MD5e2bcd723ea3517e71a154502127b5d92
SHA14ef626bfc18e4707a195a79a975392b30d0d603e
SHA2560e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc
SHA512497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5bf5911b141b7c3d4e5ac13f69b64b18b
SHA1dccc131271b45b57f78dcb38f2545411bc342add
SHA256a3f8560e778b848807215f441323569c600509fe4b5cd78af203066371ba23b1
SHA512872ae7dc9ae590dbab72fb55824b556f235037d32853662b9c4e0cc09f6d1e2b8af8c1a31a915145c14cba49f9f3f8e6ddc72ae373b67199cef60917d3a1d4d8
-
Filesize
447KB
MD5d15f5f23df8036bd5089ce8d151b0e0d
SHA14066ff4d92ae189d92fcdfb8c11a82cc9db56bb2
SHA256f2c40dde6f40beaa3c283b66791ff27e6f06d66c8dd6eff5262f51e02ee26520
SHA512feaec8a00346b0a74c530859785e1b280da5833bf3113083bf4664ebee85b14ceca648499f36d266d329d602349f9ad0fc21a10e605377b3a2c24b456f3a9bd9
-
Filesize
447KB
MD5e71d42ddf06808ff0cedf7fb168354a1
SHA16a8ecdcba3d24a21b87453dbbe002f08fde02591
SHA256418c834495462b21faf850f48fc9bf92b50d55ec49fefe25ac398fe9fd30e85e
SHA5121241aa4bc13764c6be6ae3769558db9df4f9b6d8639b338d114e32841dfc69f5f41f728525c0ff690e98ad7c871f3593806b48d5941c2ac3289570481c1264bc
-
Filesize
415KB
MD520310c607a9b2f73c22415070ecd72a4
SHA1ca94b931deb3919cfcc58c8ad3995a57b1f6610e
SHA256f66af3bb7175710d3247afd6c3a3bc72df11f06393a17c8fa9feed81ea6c29f5
SHA512da368950b1abe1754787915a75722bad9ed36b59160076cc8693508bde868e4137ef56fd37dd938978ddea99291c21a00e230d30e8ae8a9935a11513a2f649ce
-
Filesize
94KB
MD5e2bcd723ea3517e71a154502127b5d92
SHA14ef626bfc18e4707a195a79a975392b30d0d603e
SHA2560e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc
SHA512497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a
-
Filesize
94KB
MD5e2bcd723ea3517e71a154502127b5d92
SHA14ef626bfc18e4707a195a79a975392b30d0d603e
SHA2560e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc
SHA512497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a
-
Filesize
94KB
MD5e2bcd723ea3517e71a154502127b5d92
SHA14ef626bfc18e4707a195a79a975392b30d0d603e
SHA2560e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc
SHA512497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a
-
Filesize
94KB
MD5e2bcd723ea3517e71a154502127b5d92
SHA14ef626bfc18e4707a195a79a975392b30d0d603e
SHA2560e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc
SHA512497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a
-
Filesize
94KB
MD5e2bcd723ea3517e71a154502127b5d92
SHA14ef626bfc18e4707a195a79a975392b30d0d603e
SHA2560e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc
SHA512497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a
-
Filesize
94KB
MD5e2bcd723ea3517e71a154502127b5d92
SHA14ef626bfc18e4707a195a79a975392b30d0d603e
SHA2560e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc
SHA512497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a
-
Filesize
94KB
MD5e2bcd723ea3517e71a154502127b5d92
SHA14ef626bfc18e4707a195a79a975392b30d0d603e
SHA2560e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc
SHA512497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a