Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 11:38
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe
-
Size
273KB
-
MD5
85490747df7ed85dd1a3256964e7f2d4
-
SHA1
bd7e4e6d7961519b0b60ad42b4b5d5151ca56a8d
-
SHA256
7edd58fdbfe7a8e71d9d2e2c87079e4a5e281e12fa6aafdd486eb1d41617d8e7
-
SHA512
11d60264ba31717068d52a749daf6a63d7963930cf07fd654b0b826d90f6665f63d9911a7cef0415543045e972bb489c9f8b1b5b17fc0dafb45f017fb72e5712
-
SSDEEP
6144:FQ5wkJtBQK9l26GdEG5bFpNjFvwvCrx5uDubVamqKX6PoV:gdBQq26GjdjzoDyVamBqi
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+hpypd.txt
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/3785494BBABB1F19
http://b4youfred5485jgsa3453f.italazudda.com/3785494BBABB1F19
http://5rport45vcdef345adfkksawe.bematvocal.at/3785494BBABB1F19
http://fwgrhsao3aoml7ej.onion/3785494BBABB1F19
http://fwgrhsao3aoml7ej.ONION/3785494BBABB1F19
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (422) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2116 cmd.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+hpypd.png gdekxiyahrtw.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+hpypd.txt gdekxiyahrtw.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+hpypd.html gdekxiyahrtw.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 gdekxiyahrtw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\hfdwdburfgmo = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\gdekxiyahrtw.exe\"" gdekxiyahrtw.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows NT\TableTextService\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationRight_ButtonGraphic.png gdekxiyahrtw.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\Mozilla Firefox\fonts\Recovery+hpypd.png gdekxiyahrtw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\Recovery+hpypd.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Recovery+hpypd.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_snow.png gdekxiyahrtw.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\hi.pak gdekxiyahrtw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\Recovery+hpypd.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\Recovery+hpypd.png gdekxiyahrtw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\Recovery+hpypd.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\Recovery+hpypd.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\asl-v20.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\HeartsMCE.png gdekxiyahrtw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\drag.png gdekxiyahrtw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es_MX\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\it-IT\Recovery+hpypd.png gdekxiyahrtw.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-back-over-select.png gdekxiyahrtw.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_INTRO_BG.wmv gdekxiyahrtw.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\it-IT\Recovery+hpypd.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\Recovery+hpypd.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\Mso Example Intl Setup File B.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\Recovery+hpypd.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\Recovery+hpypd.png gdekxiyahrtw.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_single.png gdekxiyahrtw.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\ParentMenuButtonIcon.png gdekxiyahrtw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eo\LC_MESSAGES\Recovery+hpypd.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\Recovery+hpypd.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\Recovery+hpypd.png gdekxiyahrtw.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\README.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\dial_sml.png gdekxiyahrtw.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\en-US\Recovery+hpypd.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationLeft_ButtonGraphic.png gdekxiyahrtw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_top_right.png gdekxiyahrtw.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\Recovery+hpypd.png gdekxiyahrtw.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\Recovery+hpypd.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\Recovery+hpypd.png gdekxiyahrtw.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\content-background.png gdekxiyahrtw.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\Recovery+hpypd.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\Microsoft Office\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\Java\jre7\lib\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.jpg gdekxiyahrtw.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\layers.png gdekxiyahrtw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\Recovery+hpypd.png gdekxiyahrtw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\Recovery+hpypd.html gdekxiyahrtw.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\Recovery+hpypd.png gdekxiyahrtw.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\Recovery+hpypd.txt gdekxiyahrtw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\Recovery+hpypd.html gdekxiyahrtw.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\gdekxiyahrtw.exe VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe File opened for modification C:\Windows\gdekxiyahrtw.exe VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10701DE1-271E-11EF-ACD5-DECBF2EBC4E5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424181422" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000008fecae66add3aa396d4b8804c95daa3ee1d11dbb9ea14fab771a4afeb7d261d0000000000e8000000002000020000000ff71a573f4e7f7bcd3b0dda32403a3c986922ee7211d1d35b70689c00c5884d92000000000facd547a7cda5aeaa895882352f9e781acbfb82ca047ed4f18d4339151cb9b40000000b580b923072d8899dd43c250fe38771616d493457874e6a98ba4c1b9eabe9315a9633ec49b215c0c24378d24c1a73bd9f24ca9939772c83bfe366a6eb41a8746 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b010dee42abbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2644 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe 2692 gdekxiyahrtw.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 1720 VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe Token: SeDebugPrivilege 2692 gdekxiyahrtw.exe Token: SeIncreaseQuotaPrivilege 2644 WMIC.exe Token: SeSecurityPrivilege 2644 WMIC.exe Token: SeTakeOwnershipPrivilege 2644 WMIC.exe Token: SeLoadDriverPrivilege 2644 WMIC.exe Token: SeSystemProfilePrivilege 2644 WMIC.exe Token: SeSystemtimePrivilege 2644 WMIC.exe Token: SeProfSingleProcessPrivilege 2644 WMIC.exe Token: SeIncBasePriorityPrivilege 2644 WMIC.exe Token: SeCreatePagefilePrivilege 2644 WMIC.exe Token: SeBackupPrivilege 2644 WMIC.exe Token: SeRestorePrivilege 2644 WMIC.exe Token: SeShutdownPrivilege 2644 WMIC.exe Token: SeDebugPrivilege 2644 WMIC.exe Token: SeSystemEnvironmentPrivilege 2644 WMIC.exe Token: SeRemoteShutdownPrivilege 2644 WMIC.exe Token: SeUndockPrivilege 2644 WMIC.exe Token: SeManageVolumePrivilege 2644 WMIC.exe Token: 33 2644 WMIC.exe Token: 34 2644 WMIC.exe Token: 35 2644 WMIC.exe Token: SeIncreaseQuotaPrivilege 2644 WMIC.exe Token: SeSecurityPrivilege 2644 WMIC.exe Token: SeTakeOwnershipPrivilege 2644 WMIC.exe Token: SeLoadDriverPrivilege 2644 WMIC.exe Token: SeSystemProfilePrivilege 2644 WMIC.exe Token: SeSystemtimePrivilege 2644 WMIC.exe Token: SeProfSingleProcessPrivilege 2644 WMIC.exe Token: SeIncBasePriorityPrivilege 2644 WMIC.exe Token: SeCreatePagefilePrivilege 2644 WMIC.exe Token: SeBackupPrivilege 2644 WMIC.exe Token: SeRestorePrivilege 2644 WMIC.exe Token: SeShutdownPrivilege 2644 WMIC.exe Token: SeDebugPrivilege 2644 WMIC.exe Token: SeSystemEnvironmentPrivilege 2644 WMIC.exe Token: SeRemoteShutdownPrivilege 2644 WMIC.exe Token: SeUndockPrivilege 2644 WMIC.exe Token: SeManageVolumePrivilege 2644 WMIC.exe Token: 33 2644 WMIC.exe Token: 34 2644 WMIC.exe Token: 35 2644 WMIC.exe Token: SeBackupPrivilege 2520 vssvc.exe Token: SeRestorePrivilege 2520 vssvc.exe Token: SeAuditPrivilege 2520 vssvc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2268 iexplore.exe 832 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 640 IEXPLORE.EXE 640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2692 1720 VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe 28 PID 1720 wrote to memory of 2692 1720 VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe 28 PID 1720 wrote to memory of 2692 1720 VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe 28 PID 1720 wrote to memory of 2692 1720 VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe 28 PID 1720 wrote to memory of 2116 1720 VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe 29 PID 1720 wrote to memory of 2116 1720 VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe 29 PID 1720 wrote to memory of 2116 1720 VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe 29 PID 1720 wrote to memory of 2116 1720 VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe 29 PID 2692 wrote to memory of 2644 2692 gdekxiyahrtw.exe 31 PID 2692 wrote to memory of 2644 2692 gdekxiyahrtw.exe 31 PID 2692 wrote to memory of 2644 2692 gdekxiyahrtw.exe 31 PID 2692 wrote to memory of 2644 2692 gdekxiyahrtw.exe 31 PID 2692 wrote to memory of 2644 2692 gdekxiyahrtw.exe 38 PID 2692 wrote to memory of 2644 2692 gdekxiyahrtw.exe 38 PID 2692 wrote to memory of 2644 2692 gdekxiyahrtw.exe 38 PID 2692 wrote to memory of 2644 2692 gdekxiyahrtw.exe 38 PID 2692 wrote to memory of 2268 2692 gdekxiyahrtw.exe 39 PID 2692 wrote to memory of 2268 2692 gdekxiyahrtw.exe 39 PID 2692 wrote to memory of 2268 2692 gdekxiyahrtw.exe 39 PID 2692 wrote to memory of 2268 2692 gdekxiyahrtw.exe 39 PID 2268 wrote to memory of 640 2268 iexplore.exe 40 PID 2268 wrote to memory of 640 2268 iexplore.exe 40 PID 2268 wrote to memory of 640 2268 iexplore.exe 40 PID 2268 wrote to memory of 640 2268 iexplore.exe 40 PID 2692 wrote to memory of 2824 2692 gdekxiyahrtw.exe 43 PID 2692 wrote to memory of 2824 2692 gdekxiyahrtw.exe 43 PID 2692 wrote to memory of 2824 2692 gdekxiyahrtw.exe 43 PID 2692 wrote to memory of 2824 2692 gdekxiyahrtw.exe 43 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System gdekxiyahrtw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" gdekxiyahrtw.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_85490747df7ed85dd1a3256964e7f2d4.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\gdekxiyahrtw.exeC:\Windows\gdekxiyahrtw.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2692 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT3⤵
- Opens file in notepad (likely ransom note)
PID:2644
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\GDEKXI~1.EXE3⤵PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE2⤵
- Deletes itself
PID:2116
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD593785aca349550524365472f9f858c61
SHA195e0d9b425abe42c5a7ea66e1aa4af2318901062
SHA2562aaed893b1b076bae409c7dfa16367aa7489722755c138e7809ed92f0dd0abb8
SHA51276b908c85cb4d260598939e29bfb507d27063008ce7e19cce87a81af4068e5bcaea1a0fe40d6895e63e2aa5076e6c4cb9c2d9a34e1f46789f91dfd4eb9b233ae
-
Filesize
68KB
MD5fe56cfbc2a4c19735bbfe44470b62a68
SHA1e253e5951ab4edc2933babf25674ffe3609b3ee4
SHA256c7cfe4fee43a4ffbe4a38b116b74b52736873e34a9ddb1358d3170ffc4665516
SHA512a7a0afa091f5d5baf4c78b3103068d1415e107ce41f90d35fb9d46cd3ac7e15b02516770244b2459dfcaa8a2692b9f6e6c0d95c7fc6b3e0ad8f61120c9f5958e
-
Filesize
2KB
MD567ea4c4afaecce08d8e0c6b939d574e1
SHA1c8571eb9fa3cac288918684861ce1ebc7cbe5c30
SHA256e2ee9b27b88be392a62ba1b7a139096a145a590ace0d5367ec24580d3ba0ab01
SHA5125cb475b435b911a1c801acfb243f3cd1829e6383e7bf49733a485593b4c86521be8c5341a20eac83a4eb076805b00c1941ea01cc167a003562c00f73e7ab1c3a
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD579a509789cf65d733879300470d82f6b
SHA16143a998e3fb8ddadb2acc61fa9d54ce460698c8
SHA256d3127725aed37a57fbed87d61ca2de1f49bda333158e4c3325271f51c26dc596
SHA512f6b2ac4d21a25d4a1aad238d93111eda98a832cb113e1334223c54e72ed937241f6d9cc86578e71f8bdb134014685132c1fb405008b3c0a813bce54e04d3fadb
-
Filesize
109KB
MD537908ea3af79e187b20320544eda0b2f
SHA1a2e2b502d79e3c7441ace8e8d8aecf0e814aef1e
SHA256dadb90776b16672d65c72d0cb7526d28ce3ba11c62b8f961d0cf59e9bfcabaa0
SHA512649d1f60b0d924707ec3cc7e9464ae226926dc15e6cc22f92cb26872b99880a216a88c714a24533e577c3a699c4fdfa5ee9b588d869ce40faa58913b9590d4d7
-
Filesize
173KB
MD55aaf34ab2a0cd63e2ca5e9a75078fcfc
SHA17ea044c72c0b3d92f3d2c1db2ac7f4f9fd9bf7ba
SHA256468a18a761269f30311415167573d8a0705f87839177f5a4c3b5888a1d5da9e4
SHA5123cfe7ac7e6fa508146140a19a183db0032afc13071d9bf6256614b0622eab0cce44cd9327d9c4f533af65ea451a80c2942d094c5b42c90297b9736c33be97622
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa5acf49723ebf7946f67a59e7d6e52b
SHA1a36af660873be70dd9edf470f26ecf002f167016
SHA2562995005cfc880cdf81d72a7fa5d28c77e1f04dd6e5b0648cf222f413d14ef7d4
SHA5124a664b64fb93234eadb0a053c4dd2185a29f1b8edb7e5033d645a11d30af0ca8bb5b7dcd72e0c4038b549852f67ae5b77f584871e1c81ddcd156d405f6b51077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705cd3a27ebc391cdbd7dd9e7b071700
SHA16477cd2f15d21bd8d565fc26f379504f43cbb11a
SHA256a12f8f54490cd39db6420b6013d227ded805f44c754f8a489f04909ef7cc3b3e
SHA5129a78e4c849247710ac39fa29b1594fc92c11e39d8c3df2fa875e67474bb6f167dd268133b002565fc9c17f51eb308a6e8f50087bc336021555e764443eda2026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59949f0b0d3119d600ef28d557f4e352f
SHA164f02cb8bca888c9d189eb7bf5948063ec91c2b3
SHA2566e23bcec842ba7671264728f802ff0dfff66259d7012031a08a38c7a041b2d49
SHA512d758487c31be84969a8e19cd75aba18fce22cc7cd2ef4eaeff857d99a417e95e6716ad8a6e409ca3f7a83a46a525ef0ee93ec96652fd32a04877600ca1cb2970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9cd28522ebdb3c5ec721927cd3c4d04
SHA132b8c551be4fe8f889ea9031bc808d839031fc15
SHA256e3601797472bb3a19dbefa6c3568dccf5c01806cbb352f069ef8a3d201be26a0
SHA512403868dfc7c5d4df8bd752b5f1b53ce50e77861d49a30043cbee638d638b8bcedfa19c84468c197e0ce0dd7de08c1924bca394cc5ba9fa956bf05d2498952d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f21501caab480c772f1ad645e9b45a47
SHA1234065842ce1947ff743c4dc058e5849e7019743
SHA2569bac9e501deb255d2a2494e6e1e0df3556208c1a73883b36a5fc94e5b0f62315
SHA5129b3e04506a1b1431082352d3f42c3813608a27b4efb4a504d476e5a7d21fb8b73ff3c73e99651e6de53b2074ceb7ce526eeec28291d7cd7869fd7f824a1de4f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ab008e8b7a4d27a4635c8d7432b0c14
SHA1dacc09d9287d86d4b59c2d5e36b43ab097923c15
SHA25668518d9d67e416f0afa735506b200322ed9b70290aec4a3dca5980d724292f42
SHA512cb1228704973288aef0ee5796c3469f82bad2427652e098258bc54bb0b42c4f5ecc930073ceba1bc9d6879c5bdcb3a60c18f11c22eae3ac0b8b853ce21680882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d7ea4f420a2a0a80ade4f1b5f7d54d1
SHA157777ffad509c1a4ec6f7902c232ba37279f52dc
SHA25673e75b008def54ac7f02850a46ed93ac2e31b74975649824b459e78e33966314
SHA5121d4de3bee4bc3e6c9965f6e778f05e92131ff906595a27ca98e83dc45351c957b984fba70f19442a93eb14d630ce574631fc638874d0a86418b6b156aa3023ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53026eb1117eaba4b2d31c4531deb514d
SHA1a2ed024eac265607106078aac599b3a51c39d236
SHA256198625c91d1c600db10e45e30a0eb1c5ea6a40a875ce0c17d213c35f052198c3
SHA512e963179ffae26c41a101492a999a2d53accb0ae13b190f78a2acfb45a39fcfd375c5493a2be51978510693667cad0486447d0f3c833d6589669cf63071af1736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552ae5731ed2a1d77ab7a25ea7d41e523
SHA1940b019492050073293d1f0eef104bc1d5aedce1
SHA256eed4aeb9462c2b1615eb5a4145f298efd64e341298d3ed904b2974523dd684e8
SHA512674ffdc4a80bbc99d325d0a4085a5a3c636566ec01a39e65661d36f362f1d6bb580b6a8095694585ad31f441265a516d98cb933349255241b5553e66ed90e0f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5973013ef0fb201f8e99d8eb0c92d515b
SHA19ae605f7c530a2330057a41a1ec8080b891bcf7c
SHA2568577bb02584d6b987690875116b82fcc663dddb8f4971daf9fbb25708086850f
SHA512136a0f0678def0eed4ea102bb787abc0a4413bfc2d54f50bc1f530ca7ad5de713464bab4a008225b7e9bc72cd28852ac0386a334a7d8b1db093ef86addf7bbeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5322a38318b974e92d6e1cc887b040849
SHA1dd0c26c065cadcd645521fbe235bf9b63720629b
SHA25619649a90e284efab3891d5cbb9f1df50e6152d7fc6301bb15beb22571120f8c8
SHA512e3ff58b7324b56c2f5e90c8089e35668b5b380dfe9f76c3b13046bae9fecf35c0fb1ec9a3f777d1cb6616ea17a4b5bc71ecca44bc766bd8f7ef7c79e2a2a352e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5728bc745a14028b734ea3271577389dc
SHA13d2b4c7355bf61d447b2515d771681cceab96e1d
SHA2565a4a54d8e92838c11a44d7da140a53bef76e284cb9d402899ebea1dbed56e48e
SHA512e6200027b7a19907b0da6738ce0cd50a6459d7657573070acf2fa9c164ded64095831717acd3897cc37103d0598df4b884f0adecc58f05e50b647fa37df84f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f49aa129aa2eabf080c8801d71aba0
SHA1db94d21737d3752a294b5af64cf4f70de9d9ce37
SHA256ce94cbf1a7d71f80be3cc7336249668d5803da449ba1a392245654d12a6674b0
SHA512dd7d2de29d352952ad992fa2b974dcd1a54c4c8b054ca8e01d9e3797e27f77820fb05bc3f0509214ef7f31d64a39eb9dc5ec9c479fbdd5531f2713c3a9182df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe96e6b033373cdd602003cf5e8dcf35
SHA1a2d32accba90fbc258882652e6d8c5a7175a68b3
SHA256957e56ccee016ab594f02842e9504dff6efc9fbac6cd44936611d96c9fd852f2
SHA512ba58adce7f4971db54ef8287f6f52d8a1625effb4333d45a29dec20cb8c45cb967a0b24a9ffaefb65b92ead7f871d8265a4cab1fbe8d06271f3ca4576a3c4616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ead3a37fefec20dacb39c9a5e0569f0e
SHA10390749f6ce8d9c40099fa7f1fe713e48c8f9a21
SHA2562c57c96158e7c66f6747d0b4dbe4b68acffbff3cf2d269b29f1a94bf795f7135
SHA512c69b27722d5b58159994d1a5910d18c73bde96aab605f69b5936349c585a2254df4d165fb11cfcd7e59a181fb5a9f6756f7735f57764d3a6c188d2fda67bc8b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eff0e2f94476d7dc399b1312104cfca
SHA12a60b7ed773c005376689df91c65206a520b640c
SHA256ae4490817eee18693e58dff2f5279e9a19f71ae2f709f03484df5765ba589f0b
SHA512be2870476fb1b4bae37c8937ac3b55674df4634e5612caddcdf65b3afb4f3c5d53d6dce3c8471ee3f9cfca6416de55f8acdd3c79d4033d73a4b6708085b39cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc31b8ac97fe408eae315a8a80edfa7
SHA1bdc88f2c533e1a7bc3c41f6e886fb84e645e5ab4
SHA256edadaf81d2fd23a86a06743037098149370537f2a354907592ad8cff858613e0
SHA5122afb5bedd3f1ec100d09e2f45f43d807bd043c05c1a15ff96d0f25784630a46f14d45a589d823bb8ff26d1e7d00c6e86db738d6c8c517008f616116949e3b596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a873be1b3cc6f66e89b6c28c30649a25
SHA1f23c49721a9c7e54c163b40ed7c51cd0448b1d7a
SHA2563c0f13a8e632c519c63d27f627f2aadec30b9eaf5c0eb11406f70ec7b9442e0a
SHA5124ebec6f2acafdd3c3c7f488c9f4e0ef74cf5d14241788fd10de29645b36a1aa26052add0dae7491280c52a807b19f4b79917daa114c775a833e71356df3f6196
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
273KB
MD585490747df7ed85dd1a3256964e7f2d4
SHA1bd7e4e6d7961519b0b60ad42b4b5d5151ca56a8d
SHA2567edd58fdbfe7a8e71d9d2e2c87079e4a5e281e12fa6aafdd486eb1d41617d8e7
SHA51211d60264ba31717068d52a749daf6a63d7963930cf07fd654b0b826d90f6665f63d9911a7cef0415543045e972bb489c9f8b1b5b17fc0dafb45f017fb72e5712