Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe
Resource
win10v2004-20240508-en
General
-
Target
256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe
-
Size
92KB
-
MD5
609d2e4eb7d20b36325a7802f271dc01
-
SHA1
469a568005cfafb8938cc7b16f365ab8f225978b
-
SHA256
256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23
-
SHA512
26bf39e82253ee0511b3498efb320785ea39b6904d8fea73aa8fe81bd218774192f484c4b8e05e69b4c55176d566afca70d187c270347a8a13a0b0c9a019e72f
-
SSDEEP
1536:GBwl+KXpsqN5vlwWYyhZ9S4AB8Dsx7Zoygwff/WDb4hkUwqS06ky597:ww+asqN5aW/hS1Z2bDbCkUK0
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (316) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe = "C:\\Windows\\System32\\256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe" 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Admin\Links\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\Videos\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\2P2F3L3Q\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3RE14TN8\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\Music\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Music\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\Documents\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\J5F35Y14\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2812790648-3157963462-487717889-1000\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\DCO0772Q\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\Info.hta 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Windows\System32\256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\bg.txt.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Uzhgorod.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187817.WMF.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\librawvid_plugin.dll.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\BLENDS.ELM 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-services_ja.jar.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libyuy2_i422_plugin.dll.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\EXPEDITN.INF.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Common Files\System\fr-FR\wab32res.dll.mui 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\CircleIconsMask.bmp 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341551.JPG.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR39F.GIF.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Thatch.dotx 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_m.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libkaraoke_plugin.dll.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\flyout.html 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\720_480shadow.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\CONTACTS.ICO 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\LATIN1.SHP.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGACCBAR.DPV.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00122_.WMF.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152892.WMF.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Hardcover.xml.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153302.WMF 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\localizedStrings.js 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107708.WMF.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\TAB_OFF.GIF.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmlaunch.exe 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sm\LC_MESSAGES\vlc.mo.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Author2String.XSL.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\UrbanLetter.Dotx 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-background.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01152_.WMF.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libaudiobargraph_a_plugin.dll.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Porto_Velho.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02264_.WMF.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Status.accft.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\init.js 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\buttonUp_On.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Lindeman 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\shvlzm.exe.mui.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\msdia100.dll 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-compat_zh_CN.jar 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Data.Entity.Design.Resources.dll 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-oql_ja.jar.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\jamendo.luac 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\TAB_ON.GIF 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Microsoft Office\Office14\subscription.xsd.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-autoupdate-services.xml.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Nome 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PARNT_08.MID.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GROOVE_COL.HXC.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\gadget.xml 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0227558.JPG 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18205_.WMF.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Swirl.css.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\search_background.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-utilities_ja.jar.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Flow.xml.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\Microsoft.VisualStudio.Tools.Applications.Runtime.v10.0.dll.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\HostSideAdapters\Microsoft.VisualStudio.Tools.Office.Outlook.HostAdapter.v10.0.dll 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\larrow.gif 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libequalizer_plugin.dll.id-47477499.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\STS2\TAB_OFF.GIF 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2604 vssadmin.exe 3908 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1040 vssvc.exe Token: SeRestorePrivilege 1040 vssvc.exe Token: SeAuditPrivilege 1040 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1244 wrote to memory of 3016 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 28 PID 1244 wrote to memory of 3016 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 28 PID 1244 wrote to memory of 3016 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 28 PID 1244 wrote to memory of 3016 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 28 PID 3016 wrote to memory of 2280 3016 cmd.exe 30 PID 3016 wrote to memory of 2280 3016 cmd.exe 30 PID 3016 wrote to memory of 2280 3016 cmd.exe 30 PID 3016 wrote to memory of 2604 3016 cmd.exe 31 PID 3016 wrote to memory of 2604 3016 cmd.exe 31 PID 3016 wrote to memory of 2604 3016 cmd.exe 31 PID 1244 wrote to memory of 1852 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 35 PID 1244 wrote to memory of 1852 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 35 PID 1244 wrote to memory of 1852 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 35 PID 1244 wrote to memory of 1852 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 35 PID 1852 wrote to memory of 2492 1852 cmd.exe 37 PID 1852 wrote to memory of 2492 1852 cmd.exe 37 PID 1852 wrote to memory of 2492 1852 cmd.exe 37 PID 1852 wrote to memory of 3908 1852 cmd.exe 38 PID 1852 wrote to memory of 3908 1852 cmd.exe 38 PID 1852 wrote to memory of 3908 1852 cmd.exe 38 PID 1244 wrote to memory of 2908 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 39 PID 1244 wrote to memory of 2908 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 39 PID 1244 wrote to memory of 2908 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 39 PID 1244 wrote to memory of 2908 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 39 PID 1244 wrote to memory of 2816 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 40 PID 1244 wrote to memory of 2816 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 40 PID 1244 wrote to memory of 2816 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 40 PID 1244 wrote to memory of 2816 1244 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 40 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe"C:\Users\Admin\AppData\Local\Temp\256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2280
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2604
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2492
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3908
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:2908
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:2816
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPlusWW.msi.id-47477499.[[email protected]].bip
Filesize24.4MB
MD5ef2cc62b26fbd689350c0520435ea6dc
SHA10b263b8ed189ce1530ea7f90eb538ca005fbff16
SHA2569033e30ab67ac1502529b818d0cf4d56fddbf328c49be12b6d0d70ad1384aedd
SHA512458c09574797340556c7f1038d395c68cbb9238fb3135a820901be3e682c2ce4aa451e39ea459bdc28ee2ec130eac177c14b32d3a3a14514883f2b26ea42a955
-
Filesize
13KB
MD51ddca39aa8bcd5fe587b22bde91c20f2
SHA18d71f330b5b63770009d8deee3699eb19f0dd33f
SHA256b419bba3f934b632e3cf93550896d1324ee1a57e9e3828063c5d66846c2af856
SHA5120c197dabade1303088ef073088b44b527bd142ba26fb5efed8e09f7d05c581e8d3a2d3b0c89ad7b00e126e5271e73e1d7da1a482ccf25e5c0c4f410acfe8f958