Overview
overview
5Static
static
1a1s-root1=...47.eml
windows7-x64
5a1s-root1=...47.eml
windows10-2004-x64
1download (10).png
windows7-x64
1download (10).png
windows10-2004-x64
3email-html-2.html
windows7-x64
1email-html-2.html
windows10-2004-x64
1email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1Analysis
-
max time kernel
185s -
max time network
261s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
a1s-root1=email_banfield_2024_01_24_18_SMTP-att-1-4TKsFW22b9zsRb6-2024-01-24T18_00_47.eml
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a1s-root1=email_banfield_2024_01_24_18_SMTP-att-1-4TKsFW22b9zsRb6-2024-01-24T18_00_47.eml
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
download (10).png
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
download (10).png
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
email-html-2.html
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
email-html-2.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
email-plain-1.txt
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
email-plain-1.txt
Resource
win10v2004-20231215-en
General
-
Target
a1s-root1=email_banfield_2024_01_24_18_SMTP-att-1-4TKsFW22b9zsRb6-2024-01-24T18_00_47.eml
-
Size
49KB
-
MD5
a17092b8af5a3f23423e5f69386de142
-
SHA1
b050e9cf9c46192b4f509ecf585ec081b7a25266
-
SHA256
eaccca860db7601ec9dd272f4dc5208bda6da66efc460027a937ad865a3709db
-
SHA512
268a4020e40219efad250dbd4294d46d44139287bc69f335543fdb83dfad6e9f9b1163fb66ac372bdaa2b9288f06205812c67289c7f2cedbd3a30fbb8ce88657
-
SSDEEP
768:3mur5OOI04W6nfu3C+LusP1wHPTHBcx97YIUWjeqTQM54+KKk2KPjJ6CHHHHHvbH:3mu4Of4W6fuIsGHPTXPjdY0yxFFqOhW
Malware Config
Signatures
-
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command OUTLOOK.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command OUTLOOK.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar OUTLOOK.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit OUTLOOK.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor OUTLOOK.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch OUTLOOK.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND OUTLOOK.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\MenuExt OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" OUTLOOK.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit OUTLOOK.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" OUTLOOK.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor OUTLOOK.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063059-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672D9-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DC-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F4-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EF-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F3-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303E-0000-0000-C000-000000000046}\ = "Actions" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DA-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50BB9B50-811D-11CE-B565-00AA00608FAA}\ = "_DDocSiteControlEvents" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063008-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067367-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C4-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006F026-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063003-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D9-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DB-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F8-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063003-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D4-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063020-0000-0000-C000-000000000046}\ = "_DocumentItem" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630ED-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D0-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063083-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307F-0000-0000-C000-000000000046}\ = "PropertyPageSite" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630B0-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006308C-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F7-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063096-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063103-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303A-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067355-0000-0000-C000-000000000046}\ = "_OlkSenderPhoto" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063103-0000-0000-C000-000000000046}\ = "_AccountSelector" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063101-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630B0-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CE-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063070-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E1-0000-0000-C000-000000000046}\ = "OlkOptionButtonEvents" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CC-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063025-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302D-0000-0000-C000-000000000046}\ = "_PropertyAccessor" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D9-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630A8-0000-0000-C000-000000000046}\ = "ItemProperties" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630A8-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FF-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063073-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307A-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672D9-0000-0000-C000-000000000046}\ = "_OlkLabel" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006F026-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063095-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630B2-0000-0000-C000-000000000046}\ = "ReminderCollectionEvents" OUTLOOK.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063038-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CD-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D8-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006308A-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672EE-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FC-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1680 OUTLOOK.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1812 chrome.exe 1812 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1680 OUTLOOK.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe Token: SeShutdownPrivilege 1812 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1680 OUTLOOK.EXE 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe 1812 chrome.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
pid Process 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE 1680 OUTLOOK.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1812 wrote to memory of 1724 1812 chrome.exe 34 PID 1812 wrote to memory of 1724 1812 chrome.exe 34 PID 1812 wrote to memory of 1724 1812 chrome.exe 34 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 2956 1812 chrome.exe 36 PID 1812 wrote to memory of 1132 1812 chrome.exe 37 PID 1812 wrote to memory of 1132 1812 chrome.exe 37 PID 1812 wrote to memory of 1132 1812 chrome.exe 37 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38 PID 1812 wrote to memory of 2900 1812 chrome.exe 38
Processes
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXEC:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\a1s-root1=email_banfield_2024_01_24_18_SMTP-att-1-4TKsFW22b9zsRb6-2024-01-24T18_00_47.eml"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXEPID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef65f9758,0x7fef65f9768,0x7fef65f97782⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:22⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1444 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:82⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1572 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:82⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2356 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:12⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2324 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:12⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1496 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:22⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2260 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:82⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3556 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:82⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3684 --field-trial-handle=1352,i,7982258012495434459,3265430159791608659,131072 /prefetch:82⤵PID:444
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\8528809a-7214-490f-b234-be6d5c4db48c.tmp
Filesize5KB
MD51c04cba21169dcca1de7643857c3836a
SHA15e6e2af99b6099015db85a2342372457082e60b8
SHA25625b4c0229ad7ef8ea7749045bb44e5ed92411f28b8ca3b5b9b26204b839c2083
SHA5129bf58d5a6c70d92ec7de477a4f60905b2b43e78170c5e1bfc880e218f37200a7b8abc9a23cec7fdd8319554d96d66e7059c23f98fd9b795ccd2ce919f181d41e
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD580470a03948fe66eb61d2ff52959c28d
SHA1ae53eca4412339e2517291c99a5fb3d5a5a7d320
SHA256007d5c6aef7aa79dd02a46f60eaa0283a6a3d4009e45c3a508cac184844d5a80
SHA5122beec5bb3b01a35523a083d39ae37c2eb317be62e793dfda7c281dd3587ea3856dc6cc4e81f29605ec41a169394cdc9b3de889bb61dd8832ff1b3349802a5d32
-
Filesize
5KB
MD5ebfc9faa01f0c0520a3822262ad940be
SHA1eaa34573838a4f8bd7156cc0ac13790af4cf4137
SHA256991bfb299bb91e8b8813bc47c7b8a871f4743c6889b55a0f0c98cf7ec85a6ce3
SHA512c0a9f74fd3b8ff63b8a1cb52ce18db63ddb4229924867a79ebd2209afd20ea5a49bfd5be4bf4e60f6f6e6bb18f70c4d64b98878358d970fa44128f5c1a4d430b
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
240KB
MD5d0530a8265e2c4f62c3fc12e057be026
SHA13df041ee8829c9505cec7cf4a677806edb11c562
SHA256abd0d6ea223a2467abc7b63cd9a477076d92fa4d4fe9caad71e73d6e1a38ba6e
SHA512a57757e6d4e283c3c06679cfd2f7f18a0f2b8d94ff15d76a668c724b670139af75e4feefe60340fc901406eb80f452f3ebb6d98b5058f2061c10bdb1405b1c57
-
Filesize
230KB
MD5cc6870a28af73bbf08772e0c241a29ce
SHA16f2c41ef3642449d7a6604e80b352e5582fe53de
SHA256738969f1dffd540506a4becd57ecd4e1ae52921b4f83b927c31984660ddc261d
SHA512abefeef5e9b0eb71c12ddbbb5bf2e9fc44c4a1a1289ffe30f85c24570754982f51f66f4d1544d39bc683312565569f735e6fa0d056321583e3032eedb17426ea
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31
-
Filesize
6KB
MD5adf3db405fe75820ba7ddc92dc3c54fb
SHA1af664360e136fd5af829fd7f297eb493a2928d60
SHA2564c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476
SHA51269de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84