Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 02:13
Static task
static1
Behavioral task
behavioral1
Sample
d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe
Resource
win10v2004-20240802-en
General
-
Target
d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe
-
Size
94KB
-
MD5
002a5619993588ab6b47990c7a4a237f
-
SHA1
7d9aefdfdc745a196e29ec879d774d46d6194291
-
SHA256
d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc
-
SHA512
4d964cb86e6cf5164ef0f514ff65346aa5680e7574e0b2d3501801295d66fcc5407999f86e915c624678e78e1602425432697d1cb523b5900feb9c127858b892
-
SSDEEP
1536:rG39cG5yGQE0yRAo4CBsleM4Xu5Z/N/I+e7d/Cdjzr0MKwqlenOu7A/YcHT:m5xQEizCOeM4XClJI+WwUxJlenbC
Malware Config
Extracted
C:\Program Files\Java\jdk1.7.0_80\ ATTENTION! ALL YOUR FILES ARE ENCRYPTED!.TXT
Signatures
-
Detects Zeppelin payload 8 IoCs
resource yara_rule behavioral1/memory/2628-9-0x0000000000180000-0x00000000002C4000-memory.dmp family_zeppelin behavioral1/memory/2628-10-0x0000000000180000-0x00000000002C4000-memory.dmp family_zeppelin behavioral1/memory/2864-7-0x0000000000180000-0x00000000002C4000-memory.dmp family_zeppelin behavioral1/memory/2756-7768-0x0000000000180000-0x00000000002C4000-memory.dmp family_zeppelin behavioral1/memory/2864-12143-0x0000000000180000-0x00000000002C4000-memory.dmp family_zeppelin behavioral1/memory/2864-24762-0x0000000000180000-0x00000000002C4000-memory.dmp family_zeppelin behavioral1/memory/2864-30246-0x0000000000180000-0x00000000002C4000-memory.dmp family_zeppelin behavioral1/memory/2756-30279-0x0000000000180000-0x00000000002C4000-memory.dmp family_zeppelin -
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7416) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 3048 notepad.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\Q: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\B: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\R: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\N: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\G: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\A: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\Z: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\W: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\U: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\P: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\O: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\K: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\E: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\X: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\T: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\S: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\J: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\I: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\H: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\Y: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\M: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened (read-only) \??\L: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\AccessBridgePackages.h.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14830_.GIF.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-api-visual.xml d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\mobile.css d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152892.WMF.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\topnav.gif d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME28.CSS.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\HEADER.GIF d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01742_.GIF d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\AppConfigInternal.zip.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4-dark_mac.css d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0188519.WMF.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0214934.WMF d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Sts.css d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\VOLTAGE.WAV d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BZCARD11.POC d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Tbilisi.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0174952.JPG d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0287020.WMF.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00191_.WMF d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Checkers.api.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\EScript.api.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01174_.WMF d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\whitemenu.png d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\button_mid.gif.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.databinding.nl_zh_4.4.0.v20140623020002.jar d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0146142.JPG d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21398_.GIF d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jre7\lib\charsets.jar.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\art\03_lastfm.luac d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02153_.WMF.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0215718.WMF.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\README.txt.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.batik.util.gui_1.7.0.v200903091627.jar d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\de-DE\Solitaire.exe.mui d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\org-netbeans-modules-profiler-oql.jar.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsHomePage.html d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\Form.zip d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\jni_md.h d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Azores d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\ ATTENTION! ALL YOUR FILES ARE ENCRYPTED!.TXT d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0304853.WMF d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0199283.WMF.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18192_.WMF.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15135_.GIF d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\GREET11.POC d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_it.properties.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\MANIFEST.MF.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-windows_ja.jar.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Issues.accdt d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jre7\bin\server\classes.jsa.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ffffff_256x240.png.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\bdcmetadata.xsd.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\new-trigger-wiz.gif d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7Handle.png d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0214098.WAV.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR31F.GIF d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.actionProvider.exsd d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00100_.WMF d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14583_.GIF d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGBARBLL.XML.C16-9AF-B2F d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Riyadh88 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 796 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2792 WMIC.exe Token: SeSecurityPrivilege 2792 WMIC.exe Token: SeTakeOwnershipPrivilege 2792 WMIC.exe Token: SeLoadDriverPrivilege 2792 WMIC.exe Token: SeSystemProfilePrivilege 2792 WMIC.exe Token: SeSystemtimePrivilege 2792 WMIC.exe Token: SeProfSingleProcessPrivilege 2792 WMIC.exe Token: SeIncBasePriorityPrivilege 2792 WMIC.exe Token: SeCreatePagefilePrivilege 2792 WMIC.exe Token: SeBackupPrivilege 2792 WMIC.exe Token: SeRestorePrivilege 2792 WMIC.exe Token: SeShutdownPrivilege 2792 WMIC.exe Token: SeDebugPrivilege 2792 WMIC.exe Token: SeSystemEnvironmentPrivilege 2792 WMIC.exe Token: SeRemoteShutdownPrivilege 2792 WMIC.exe Token: SeUndockPrivilege 2792 WMIC.exe Token: SeManageVolumePrivilege 2792 WMIC.exe Token: 33 2792 WMIC.exe Token: 34 2792 WMIC.exe Token: 35 2792 WMIC.exe Token: SeBackupPrivilege 1660 vssvc.exe Token: SeRestorePrivilege 1660 vssvc.exe Token: SeAuditPrivilege 1660 vssvc.exe Token: SeIncreaseQuotaPrivilege 2792 WMIC.exe Token: SeSecurityPrivilege 2792 WMIC.exe Token: SeTakeOwnershipPrivilege 2792 WMIC.exe Token: SeLoadDriverPrivilege 2792 WMIC.exe Token: SeSystemProfilePrivilege 2792 WMIC.exe Token: SeSystemtimePrivilege 2792 WMIC.exe Token: SeProfSingleProcessPrivilege 2792 WMIC.exe Token: SeIncBasePriorityPrivilege 2792 WMIC.exe Token: SeCreatePagefilePrivilege 2792 WMIC.exe Token: SeBackupPrivilege 2792 WMIC.exe Token: SeRestorePrivilege 2792 WMIC.exe Token: SeShutdownPrivilege 2792 WMIC.exe Token: SeDebugPrivilege 2792 WMIC.exe Token: SeSystemEnvironmentPrivilege 2792 WMIC.exe Token: SeRemoteShutdownPrivilege 2792 WMIC.exe Token: SeUndockPrivilege 2792 WMIC.exe Token: SeManageVolumePrivilege 2792 WMIC.exe Token: 33 2792 WMIC.exe Token: 34 2792 WMIC.exe Token: 35 2792 WMIC.exe Token: SeDebugPrivilege 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe Token: SeDebugPrivilege 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2888 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 30 PID 2756 wrote to memory of 2888 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 30 PID 2756 wrote to memory of 2888 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 30 PID 2756 wrote to memory of 2888 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 30 PID 2756 wrote to memory of 2984 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 31 PID 2756 wrote to memory of 2984 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 31 PID 2756 wrote to memory of 2984 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 31 PID 2756 wrote to memory of 2984 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 31 PID 2756 wrote to memory of 2652 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 33 PID 2756 wrote to memory of 2652 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 33 PID 2756 wrote to memory of 2652 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 33 PID 2756 wrote to memory of 2652 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 33 PID 2756 wrote to memory of 2760 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 35 PID 2756 wrote to memory of 2760 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 35 PID 2756 wrote to memory of 2760 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 35 PID 2756 wrote to memory of 2760 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 35 PID 2756 wrote to memory of 2896 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 36 PID 2756 wrote to memory of 2896 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 36 PID 2756 wrote to memory of 2896 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 36 PID 2756 wrote to memory of 2896 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 36 PID 2756 wrote to memory of 2688 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 38 PID 2756 wrote to memory of 2688 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 38 PID 2756 wrote to memory of 2688 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 38 PID 2756 wrote to memory of 2688 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 38 PID 2756 wrote to memory of 2864 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 39 PID 2756 wrote to memory of 2864 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 39 PID 2756 wrote to memory of 2864 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 39 PID 2756 wrote to memory of 2864 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 39 PID 2756 wrote to memory of 2628 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 40 PID 2756 wrote to memory of 2628 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 40 PID 2756 wrote to memory of 2628 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 40 PID 2756 wrote to memory of 2628 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 40 PID 2888 wrote to memory of 2792 2888 cmd.exe 44 PID 2888 wrote to memory of 2792 2888 cmd.exe 44 PID 2888 wrote to memory of 2792 2888 cmd.exe 44 PID 2888 wrote to memory of 2792 2888 cmd.exe 44 PID 2896 wrote to memory of 796 2896 cmd.exe 45 PID 2896 wrote to memory of 796 2896 cmd.exe 45 PID 2896 wrote to memory of 796 2896 cmd.exe 45 PID 2896 wrote to memory of 796 2896 cmd.exe 45 PID 2756 wrote to memory of 3048 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 49 PID 2756 wrote to memory of 3048 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 49 PID 2756 wrote to memory of 3048 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 49 PID 2756 wrote to memory of 3048 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 49 PID 2756 wrote to memory of 3048 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 49 PID 2756 wrote to memory of 3048 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 49 PID 2756 wrote to memory of 3048 2756 d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe 49 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe"C:\Users\Admin\AppData\Local\Temp\d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no2⤵
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- System Location Discovery: System Language Discovery
PID:2652
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet2⤵
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:796
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat2⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe"C:\Users\Admin\AppData\Local\Temp\d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe" -agent 02⤵
- Drops file in Program Files directory
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe"C:\Users\Admin\AppData\Local\Temp\d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc.exe" -agent 12⤵PID:2628
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD50b438ffea1be7d8f3b69113446673660
SHA17da24307b7dc67fe82bd4cde5bbbf9dd26027172
SHA2569c31683a1777bce00f89c308609aa882682076bf190739d10987a4ab16a69a80
SHA5127984250e3804b44663ff49720dca19301bc240c4dc326a2af03d1c5106706ff9c300bee9565d7da1c4f0c451371b7bc3a5b40b3f3d4614e3376ed4c2b5e1c271
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB.txt
Filesize29KB
MD545f8f6e3308f792f96be5a482180e5b8
SHA13a50c277a3cd1a2104ede6199da26c9020bfe5f1
SHA256af2785970e4f26af81b58230fc26e84a77eceededf78067b32485b9a7b6ac082
SHA51200196542e6188dbe7992da817547da8fa71bf5d218c6887448f5198265c6b20fd0629da9cb60b8d529ea6af61b113c4dac70eb22bf588be623019b16e5c43d73
-
Filesize
6KB
MD55083fd50424f0c8334e934377387e9f0
SHA112e810544ea35f652df5b419dee1f22978065a10
SHA256d7f6fd963aa9b80c41f95a03dfeb3a22366d356ee9fbd6ec7b9549ee86ffd057
SHA512681412506d2a8bb09d70f7386494ea25da2cc890fb8582cf53e6096a93cc3657c8d2fa32aff6c1deb2683ed0278c5673d05e6d05a2f8c74606c27d2c4bb10f26
-
Filesize
122KB
MD51ec9f9624c06bbd9f70256ef5a2c8508
SHA156af9a8f682a4aec4fd3bd60ca503c502bf1b16e
SHA2560e19ca42770fcf71a02bd8bab381cb68edf016d813b784cb1758c3ba46ac816e
SHA512e3753047b29fb48600325cb70fa67e397f68c6e4f972f719340c35fcba7bb1217988890154a2b76ce7d2372164b206d4b6db976f7b0bbe38793cd1dff7f2ad9f
-
Filesize
258KB
MD5efe21edf5485e2a4a1667c8ef933006e
SHA1178d1a902f57974ceb21c3f298562d3e944b1634
SHA25689cb0dd4235b708fa0773e300aadaa48045870f3e8f769738197a841d5f2619d
SHA51220a6532479f15a1be4ee76d0e018cbbc0079113357c017fafbdb0c17c50347355ad27fed59643f244d3b33e63f01929ff2969154ed5e1575e17cd92920c5b4d8
-
Filesize
78KB
MD599253affc42573e0c33393d89a38ded1
SHA106355bc629010eda6c5613415d7e03c88c3a3a69
SHA256b06a1f3d2de9dc1b75841445781e498be0f5f86017817f0a5ab6d4dfea498cc7
SHA51233307b1e1e9818b086873be8ae50d233cf9dd70f6b80035e8a888e811d34793a9f94eb934003a43de7b071550edd80e5027a53323fbbbb7c7b04f43d66cc5939
-
Filesize
7KB
MD5547663a9961f1fc91b6fd108dfd9b163
SHA1de74755c8ba60365645dab828ec3be04ff7e3eba
SHA2565664179a17ca7fedee0d58529bd6102222c064be0992ee67151ddf43e4c2be01
SHA5124164fb3ca8bf9d85ff8ea622ae28ae4fc9232de8ac4afa5ae40e3372767897ce228ff39528adadf8d035317b6f023093f86c0a846f3a53c2e71585c9a680ee1a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_OffMask.bmp
Filesize8KB
MD5c2dfaef83e6f1afd096fb5a869972d2a
SHA1244dbd34187493f6c22fbd3aeb0f9c45bdbd2eb1
SHA256fde2a45977b3a97cb1f76e69f20dc042c9addeaacd4b482154da3601ac414194
SHA512c6da8684d97174e71e80f7b0ab28d889812c5171cdb03e4ec66680882d7fd25d898ca54cc61a532a8488e9f7f1a87d8e5ea9a7a7d2fdbae299887ec8d964e0ea
-
Filesize
78KB
MD5ca0e6917d651d376c840bc66dba833ff
SHA15d5ea23b8d2a621735711ff1760325bc94af1f3a
SHA25627a0258c513e599759a8864524f8b361002af5f6f5c27280a6866b6df9267831
SHA51290bd821896f172deb7fc6ac4da5be29598db76fcbe53b7183ff9bc18e6ae5b532de72d1d28c489733946ff7af0a463d285dd500d53a2881478badec4714f5abd
-
C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMV12\Microsoft.Office.InfoPath.xml
Filesize249KB
MD5286bf98148ab75fcf2cf9434141316f3
SHA1fc35ba26c954779d50d70f4c7f55fc42f85039a1
SHA2562b87f316e0b622c56ad55ca5f4526c7d2de359559d9f8c009f35567a96cb29dc
SHA512585a000120cd416a648b7273fa9d05b1f4dcdcee70d8695b50591a53528aa86962a3388ba1ba66af4cec4adb158bfe340358fbafa19e5c0b385860c7691c58ff
-
Filesize
78KB
MD5d7d57696d8e3a1781c6edc7aeb5538fe
SHA1f322f5e8c733b7dc9f4485f66962d4425761c1a7
SHA256fa1a9e593433defe159106483545564f379e76d3ace59b110050366b0ee9d2f7
SHA5126759ed80042ec28a6274f8bac9362c75591612ee676a4593105a3dc6aef0eb24a6d899ee6496cdc2fa2b85f08efc4093f2bc8ea427b3e21aca41c8eb438a68db
-
Filesize
78KB
MD5eee9111574525f79721c721358317a2a
SHA11024a71fd8ecaa575579f7ec45f5aedb1fb93211
SHA2569244e03d225791034637e0dfcfb60199f4894d0b6866b6ec377b0e47c374f6de
SHA51217a9c1a686f349eb6c4138fa2c0a04a765af4e5734b8634719c37ec2675f679373ab894f9e62d27adbc7d4192a4d2b279d78e63fc6cbe929db0fdf7e99398589
-
Filesize
78KB
MD5d1c342b7858f88b12ee843daf30aba19
SHA1e917b922d7758e45e6c5c473a8c54feb96db36d0
SHA2565190b8638c908fa2a671662851d663dc27108bc784ad142c38f0a4a5acc54ecd
SHA51250aecf11e1145af21f6080348b552b082aa359828d585a324289e78e4a7c92e31527f672ddf7699b5ba3f3f96ce7abfa58477b61c6523a655c243aa66f8d4a97
-
Filesize
834B
MD5a4b01b15d0aa4d649dec0db525176a2f
SHA1d978e5719c04ef2cdd35dfbb5083c5685b71e32e
SHA25665a4c4b1281e5ce9b88129651463f2279033c1b9bc6871a3fa3548f94e245bb3
SHA51275f7fff14a7ab98b031f84c990db0aab93cddf0506a2cd733ce1f7c6ed4d5781eba56d701c5dd812b3bc24e4f9e2859e9cc15cbc4beba8843d934bf2636fce66
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\eclipse_update_120.jpg
Filesize22KB
MD5594f619c09c44350c7ad70f4e718f97c
SHA18cb93a285a3af4e635141599cbfaea227bdd1eb6
SHA2566f535258c680626ce80dfa0b875c0ca3b3ecf3752c6cc6f20b128a496ce9f724
SHA5129cd9f00657be40cbd970a14e64a59505dd680ef88da6d6c04202058c28c1afff287c3312ecd6d4573f8c93c5e4008ae445aebdc612e7d01eb144d37502e13e99
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\epl-v10.html
Filesize13KB
MD565fc6ff5128646a203ad91c8ec8e914a
SHA13dd0c9f5bce57d4ecce86ab21a8fe8c5417ab2ab
SHA2565e177f8350606242a13f6dbaf1b3ef7787ac7b502bc575f23ab7b0f2b3d40642
SHA5127fb16f84c18ba78275d417c7c5c52bdb49ec58283604a504f2cec5e6e3255c367db713bf38dcbba9c31722b2c47fd2c95bb7037bd7660966f4e7d85ab5ff62ad
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\epl-v10.html
Filesize13KB
MD5108e0f945a8831e9250f4ce7646fd4a9
SHA11fab58f0c08fc41dfcbb4a84e71157a2bb7c42c9
SHA256004476abbe71e001eaf3dd16e390cabe226422eed3920ce07e6014cecf505f96
SHA51297c88295d9de5397fe3dbee4cd96eb499e126f863207f8357a5bb5fe92540aef2afed2a002b4b5514bd051a9ffe7a8416d5db5cd5e3865a0cff31c27ea26e2e9
-
Filesize
606KB
MD5c5956b16ddd2dae1ac9ffc623642cbf7
SHA1a5e02fe9d8d9b0f71fa59ef0106c5673f74d636d
SHA256e67e91a7874ad03527e5bae86815ed44fa990b6b64b4f3f32ba350518eeb2d18
SHA5121327d5830b04d5d7d87f68b7d48bda0966e7a0e4a463699883eaab106b9eeedb7b59350819d5a23f959b58ce9a6f7d849de993e9c74809534012e912045cd6a2
-
Filesize
611KB
MD574bf162c5921539191973755dba135f0
SHA194792fc92dbcd50c2ecad92d7184c2014521febd
SHA256bcde459b501d9911ed48e222454ce6c2795a2c6c008e0c17b14ffa1be79bfb3d
SHA512efb3bc7e9c271eb532d3abdff147cc9ce39420a959be554e8f77e281282ad83d4e15daddb3a0e4c06922ac7c8af85a53e4a4c88e4ef7471f3195cb10fde904e8
-
Filesize
674KB
MD5edf452ba08143e5fa1ee482c19ef5a57
SHA17b2580f3cde02f67626d51b93f742c98021fd91f
SHA25659d6fcf4b9101171853639cdcb3d1d70a06cebd0a66ad6c59856a2dd7abae9f4
SHA5128bd41ffc4fa5b6bd51c98fa52c773b5414123cee00a4adef9644f51771b5489636354e26648c331e0550d77c22e9b4372c1d58f779457632a5b544cdd863ccee
-
Filesize
1.1MB
MD5b4680edc81425e440a76c0ed77619ba1
SHA1d9ed78b7d12429216c093d38a95d8e239aa77cb1
SHA256c2656cb52f8c9902f9d87c2b600aec3f2943888e5c1113aeb3fead145ba20eb0
SHA5125ac4cbbfd2c80d3f7cb622e503cdd26b976a976151229ee6b3f316fd7d9278e0ef312ed38fee4ba4e38eb738197fc93a31066b46e3fa09fdc15c3d2c18e605a5
-
Filesize
595KB
MD5f482dc489dd31e9ffa42c5682049189a
SHA173ce5b8269ff2ce5945ffebc9eddd9cd486bf5e1
SHA256c6f77be7a56f87872471ba712ca27073c9af644bf0580639c1108067a6b51896
SHA5129781138e0fb802db94cf690141586a494a7bb63688f8847fa3931ce995191dfa6f29e05bb52536c1658389676426c3baa748fe17c9b65d6cf0a0162a3ae66833
-
Filesize
617KB
MD5f24eee7ce1bef78f30e1feb800fe57f9
SHA1d0251d7b71b631865401648ea6b542168013f0a0
SHA25602da90a2aa74589dbf4bb16870e619c3c1ea3e43aa71c6e8325e9c0fd8829ff0
SHA5123487b7cc7227b279d63d125f38c1da39e3f1baef3d968ef6d084f50fb2cc2462924f40672eba433c866d8e05ede64a2363510e9350176ab03db60243e21b9603
-
Filesize
780KB
MD58a7f5bfe6c42b20daa8af74d9b32527c
SHA1629af2c338c60b999663099317649fe240b039f4
SHA25619a780f80c3883199f37643cce59370761be7a8c9f27d75c7c6545f1dcc02c08
SHA51234f6f5c93401f6e9d7b98b4c4d8ddccc53f597368db93e000dccfdb143d4064acb52941b8ed0c7bc96c35a07b1312ca20a5aa99ca750a2f6d8c319aabc98c34f
-
Filesize
3B
MD55cadb523cb6909f92350f70f124adfb8
SHA168811987a9c2c687836cbd0c9f0440d0fd65944b
SHA2568fbd42ad079a6ceeaf6cecc9f333f41f53335eba32cafff07f5c9555680fdce4
SHA512a1470f119f649517db5c54862645a3ac5cff6023d761ca89edfa932ae15c71846c8049206fa2c0c49356af0d7c902b08f5273d46e397f985ac098cd1cf6ffa25
-
Filesize
407KB
MD5f75293bbaf4bd26f7d76b30a62751593
SHA19a669058077bddef7aa1b33599f44a1bac085933
SHA2561397df6d42136679ad73633d2e79c2ac328d6337b33cc0c9b18998036afb16f4
SHA512e0278af16335b6e0476b243941a90d55567fd6a1e8d03396e4f4fc4a5174920c06f10e1e756c043bcd5cd4fa73e9ed4f3d9db01eb794b64048bbffcba84c9c77
-
Filesize
480KB
MD53ebd9f11762c58e4a3424f1ca1116679
SHA1d18025c3b89f93edf2e6bcaf70a7a58830e4cb19
SHA2561b1572dac0978f0ec7101a050e5664eb5b7f29e4b1db49bf2a05974ed90ebb63
SHA512d3dc7dc4df9bd7553e1b20e13bd99a44edbaa613279b8959390b14fd0c744f56caf3cb4a2370af0afc1e69f081db857ec0a01e06c055b669120edc021dfa61f7
-
Filesize
466KB
MD5cfceba71584074c3bb38847ec5f78195
SHA102b19195480cdbb6f9c50d05a864f2a53d3e2c6d
SHA2567714e261abb70c17331df894fd5d4f11cc772d7257ef46e60446fec14e4adbb9
SHA512b89ccdece7c761ec47a9facc19344fb22e065108feac4d2e9607c6ea32b9d684e3e95795999f7368a554a1590450e0005b2f6c442dba8699f46ba0391ac7a70b
-
Filesize
12KB
MD5433c56bca25efdc490745f9417d40cdc
SHA17bde245ea07bf8b72e6fea3a5f199ae0f1b28b27
SHA2569fa73aa4a1aa22704e34531fd86a4606f3a0805600478faa319441eb102272a8
SHA5128d9de5118b1087097f9d3dc8f09cdd83c41541da61a6acccc513f934a43f3535ba55428c39a3750520607caf5fb7bcbb71a8df390218f99c88612d8f9c0532a9
-
Filesize
185KB
MD564c4e804c36a086f34cfe0e8cd1b3af7
SHA1d1718c20cba776cbf36a3e53ed41f1cf1bbff05e
SHA256cec60fed91ddd3f7bc5c6a3e92ff49e2ae60b73ab31f97d74fc706d23a3540a0
SHA51251e6660a0b36eeaec585bc7e4c8054ef3c8733ee1033d5ff5619947e448aead143440b8010475032f5979fb1cbb20ce259b12de9d1e96e1fd1b942c6e1b943db
-
Filesize
289KB
MD57ad8d3f6d6e6aef8b1c7fe04ab0b2a7e
SHA176061563d807689b399f57b5c91821f77f78e958
SHA256856bab14dd421a7ec9562ff44101d4728c774475fce3d4b6a6590523e9f94ff0
SHA51215eaa46dde7dcf70715144e477f4710c740a9985598b25d808d22ddb7780ab68c005406fa87e6401c530277a39438aee2ba8978c0c2aeee6a46ff0465b9b97d9
-
Filesize
274KB
MD53ba8776e056d8e5c2dd0bbff02cb8f10
SHA1f266add609875a631f729e9f042e1067230f6794
SHA256f6f77e8bb7ca42c496cfd341ba7738d1e87d356c0f0f646f81471eaa22f15d1a
SHA5127e8d9f79b53728fe270ae507720958220b0bb44a532799dfa888fa8dd55792bf8726dc71c6745672f824f3504894f6485b3f6386353ae579080602533244c6b3
-
Filesize
525KB
MD560dd77755536b5dc91d65c1f9be8dc26
SHA14a98b536894214a0e6f1a7b6d787f945d4e45ea1
SHA2560049e164d9710a42c3b8d9c46c5da600cc11e523d66f128d265d9ece89816034
SHA5129a6cb008c77dd27439c9440136b4d8d5e8eeecfd2bad7b26418756924c0931cbd71ed62148775850ad3655b9433aad1a14247503477298866a237cfe4201b9ff
-
Filesize
377KB
MD5950c389d0d9d794c03f2db5a27d13165
SHA17ba18fcfffebf2110c06517563770e694c8b8e53
SHA25618e7637ca66113c183ce3a8b04ad9c93ee2288015d89c762f2ee21bcec537770
SHA512cf9d3eeee5b9ded22a26363422897c50a1c984bfd6c71b65661b1d681c19303d2c648347da06360bf7dafc19764142eb09803e3363b80c470dd82426d921b4c0
-
Filesize
451KB
MD5ba5d92f4219c33063328fc048cfdf8e6
SHA13901b0641bcaf8082ee8b1ab25e15fbce8e26c88
SHA256af151d04b5d97be417628b323425fabab927a69666b74042cd983999cbec69e5
SHA5129f73ebc6c92759b7fb818778a70a17b639fa7c9f1920f2531fa6dccd53956b8e6e71c56f7c991077c928c698620816d39ef68ad3b8dba52ef2bc2fdf262ebd1e
-
Filesize
303KB
MD5e1753ade5e9b234fa660ef6e71b715b0
SHA15785a6240a5fdeb98dfaf9ae0aa8f84ccabb1fb2
SHA25687e55362dc84717a5a8ee05ee9a236a86d6d81265f2138b1eef815b249cd7476
SHA512c33576b4261e0a021beb918bbef7da5225fb510ce49ba0a77fe7510bc374366d3c9c5e7888ea4579da4d1417da7072ecf3db58bb5493381fd1f67e2d8a173714
-
Filesize
421KB
MD5b27704e6598adc69ffce513f3eca2a4d
SHA1926e3e6e7a7ef65afca802c9184546bacf5f6215
SHA2562ad4bc6aa8aa7a950e034ac39eaf8a77b976f39dde922beee2e85768bb2ea47c
SHA5124b3428d05cdcd0385870997d12b717a5d55767a2e19494f485a6c27723854e503881a5e718e0221e39abd9d4433cba3ceb09ddc325eba6e230700d5863673f78
-
Filesize
510KB
MD51903d84b346d590e6e0589368a5c0fa2
SHA1755ffe314c3ae56e7bf71dadf0a2d684a8dd5438
SHA2568bfea4e41c94c880a4c7eb74f6f0dc76be9cd19623bb01d988542dd4391567e8
SHA512a9cab9c52b08d93835724caccf9c46a6056dad9b72f449ed347b73fdab744e69e37b2391a825bfb8b1de2566497f7612e63a36fecdc00c06d7652c7e73bd5c42
-
Filesize
436KB
MD5f7616662712baa75862e68f20b85958d
SHA130339af3f1836868b2e05d9cf2d692ce59a0888b
SHA256de2c51ee667bc4123f70aacbeebef6bc5724ec56a4710ff63dba12f61e650fe6
SHA51233ef7831eefb431fb975fd36fc68c6341367da2fbf10b5d31d0d49a64e51a7410ab4f7e595c81e3d6c8fc2b2ed68ab0dc85a179b110e5b29d70675178041502b
-
Filesize
215KB
MD50759aa1634d063caef53080551976ae2
SHA14d52f88dc0299bbbff6fa95b5ea92553bdf19438
SHA256ce881cb7e5ba09b021e2fb6d556795ba0589fed7abd9176b09b2c1fa0d6818cb
SHA512fe019b4798e9322e00a7d627ff06b433b79d03a7590862027ff13e3fea9e2d82be153ea9caf0c0dc14a8bc55eec55654639863713ffc0e0737195686e678af7b
-
Filesize
362KB
MD5277f123253b55a9e15e0374e9ca5e30d
SHA1854ea17ee66b71aa9aeae08eb22ef5ec48e494ad
SHA256456ceebc4e000a1dffd88276f1b4ab9e7d34ecbd9fad90e22c0c970792b898e7
SHA51224b33ef79f93b81faee9a03975fb27c0b1899a822a612e53f9067e45c70c4c6a117606f8e38f7299bd7fa8e135065d95edfa464a2c26afa82ba5bfbd269a3fad
-
Filesize
244KB
MD5473cca79958f69e811e7e8e0c7dd04e3
SHA1c920ed1fd5563b9e7e70cd542e43524b1c873273
SHA256fddf84d66eab1467f91b6bb603f74fa4f7f39b73fd5fff386cbdea1d7046bafc
SHA5120aeea87510c8e0e4c02ad554e7218cbf75b3822dd990596ede1e7eb032e70e9f30557d35ebf69c4faf04c35122103c34293eceff3fc15c8e9fb6e32c144da3c6
-
Filesize
495KB
MD51777a26b9b0c0c0d362b7e64d1925e45
SHA1c79b76b1e4053725dd4570f9744367f1de3b0351
SHA25639596ada43d0c9035e1299a4b43321afb536c99b571b3486a8ddc85bb920f457
SHA5120bba9a0a8c86898143eabc985694d944fd5716531e5e7a5a53ef4cfff639f24b4934fb5bc894e49c8bcf9a439a67e9f40614faeaabdd0bbed132e19c7a9e3514
-
Filesize
392KB
MD56e256e556f2c156e16d88859cf2d0aca
SHA11c3313b2d0b9536ab9ef4ed547028322e3553aef
SHA25674a054810a53622314341034fb7af3ad64ddb0822e0862752877ffd8060db8ca
SHA51297cb707c2988abcfcae31294400c612162b350731142aa846ca8cfc2f6ad3c32fb331d607e10abbe81d957455d87329057950312e7ce7f298187f42b534268c4
-
Filesize
318KB
MD5a6ab0bcc8fa9ab29b25af2e963918fa0
SHA15869875bb4feea5e1e23b2764387e1ff0ab5ff2e
SHA256a852f1331da9225262233093798623c7a8371e0cfa6b476a1e965016112fd6a7
SHA51287befd309607b5a9b7debb0e07f261e0e0ade2cd37bd2c9506864e347ec1e313b376307adba3ed1623b7859c1846bfc2c7225ccbb8d2ff84de30e6a6a896f901
-
Filesize
230KB
MD51ddbd5a3a745db6212dc758117e1f5cf
SHA17cc86af48a23bfd736e4c1d96c6230066d9287c5
SHA2562089f544c829674dc3f3873e2eacb50ce1bb281ae4b1f291c4c323f4a6d698af
SHA5126514e75c3a61b1d0bd393d17937a9707df548913dcdfdf39ab4c1b6ca9bb90f97657a5092d3d2b4cd57ad430f8e3d51896a68f06b5a85b3447c789e618afb733
-
Filesize
348KB
MD50337980500d3c39a508cdff63930897f
SHA138cadce83ecebce401295d68cc71e60516216074
SHA256aba89632ff1bc7ec9d5b20da028e3ef5fe7570bf427a8e810b2ec2a52899e4be
SHA51201cc650eae40d747924d121eabbaa1a26cacb6090242cdcbcae736a505a5983bdb46a928cb4e885218817d06f36e64fa57a64814d1c79ab3255ef0c86053e80f
-
Filesize
333KB
MD5d3d82edbb4cc6fac2f5299936544766f
SHA1590c49abd4809803a66e58d84f609d01c0ff70a6
SHA2565d1a9b3a732c4c87075ec0b62831463dbf5d1bd329988d9c42db18cadcac8507
SHA512bdd50c7cd51945927e513f14e2e50ce2e5ac8cdb970a588784640ac478261327a78a3fa6021fbd895490c4d906618abddc950327b59443635097e9a08790db46
-
Filesize
724KB
MD51e734edbaaf2a2919a4d47ec3ba32f3d
SHA1e0e569586bc7d9af7f6bca050de56d531811455e
SHA25662ea379c22a1104359eacec2cc1187e54dae71a2bf9ba9d0555e1b939a457f29
SHA5126cde671611f3175a9531b118d05617926795d222fb993b73f50a9f01823bcc1ea1671e199f6ca6f2e662fc27972a6e69d84402f68a8d36574b6909d833bc3ecb
-
Filesize
200KB
MD5df87741630f120930b7bee856146ec7a
SHA1dfd0611738eb81e172051988661bd9e3cb2cd81f
SHA256cead3e293bbd08de815b6cb6761f7fbe4cd577c88010bc547e4def555ffed772
SHA512c1cb0635256ca2f65b9b1b1edb0ed8ee22c1a596aaabf61b00fd98de6b70cc61904192fd8e41a973f169ed4c6c20e2c7d6b9349f12ea8fa13c4f241c500b8c1f
-
Filesize
86KB
MD592748fefafd4f225f9d7b77c0aa3e6ac
SHA10b48f8ff46f3d4f7527bcd264798a5f1beaf3496
SHA2566b45b2dc18afa356a77f9c596303a5280de6982f5c591c2f1384e6514fed68d8
SHA51298fe34620e6f805bc9b1aadafc8ea897902e4c2edbe9db9d2a3f31b043e36549ee29be9d116262d138b44323f2ea140e037510b51a7c8e7ed8ea3669419122f8