Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 00:11
Behavioral task
behavioral1
Sample
6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe
Resource
win10v2004-20240802-en
General
-
Target
6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe
-
Size
33KB
-
MD5
f8c828f938d4ed21c3c0d69a1c9211e4
-
SHA1
198636a32191acc85071a8ef4ad77dbd2f08c3da
-
SHA256
6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47
-
SHA512
82f546ad372f6c093bd4881435f79a368320a2e6952fbbad83f69c0d193df79418a2464198db2aaebd036c681944ea01139aa27e9698ee61dee337039c09c5f4
-
SSDEEP
768:UEzNbLcQ9qQuVriDMuyuruTD0qB77777J77c77c77c7nOT1g:l3h9qQA6hZunrB77777J77c77c77c7O+
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe \"C:\\Windows\\system32\\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\\üþÿÝ×ýÑýü.exe\"" 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{B9394E44-1727-BAB3-22BA-4E4422BA1727}\last-check = "üþÿÝ×ýÑýü.exe" 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{B9394E44-1727-BAB3-22BA-4E4422BA1727}\last-check7 = "÷ùúØÒøÌø÷\u0090„•\u0090.exe" 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Active Setup\Installed Components\{B9394E44-1727-BAB3-22BA-4E4422BA1727} 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{B9394E44-1727-BAB3-22BA-4E4422BA1727}\Direktori = "d[}xŠ\u008f…\u0090˜”}t‰†\u008d\u008do†˜}„\u0090\u008f•“\u0090\u008dOœSRfdSQSQNTbfbNRQWZNbSeeNQYQQScTQTQZež" 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{B9394E44-1727-BAB3-22BA-4E4422BA1727}\Direktori = "d[}xŠ\u008f…\u0090˜”}”𔕆ŽTS}‘“Š\u008f•†“OœSSSXbSYQNTbfbNRQWZNbSefNQYQQScTQTQZež" 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation üþÿÝ×ýÑýü.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation üþÿÝ×ýÑýü.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation ÷ùúØÒøÌø÷„•.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation üþÿÝ×ýÑýü.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation ÷ùúØÒøÌø÷„•.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation üþÿÝ×ýÑýü.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation üþÿÝ×ýÑýü.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation ÷ùúØÒøÌø÷„•.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation ÷ùúØÒøÌø÷„•.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation ÷ùúØÒøÌø÷„•.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation üþÿÝ×ýÑýü.exe -
Executes dropped EXE 25 IoCs
pid Process 1028 ÷ùúØÒøÌø÷„•.exe 3472 üþÿÝ×ýÑýü.exe 3772 üþÿÝ×ýÑýü.exe 1052 ÷ùúØÒøÌø÷„•.exe 1908 üþÿÝ×ýÑýü.exe 4244 ÷ùúØÒøÌø÷„•.exe 4772 üþÿÝ×ýÑýü.exe 4992 ÷ùúØÒøÌø÷„•.exe 2568 üþÿÝ×ýÑýü.exe 4312 ÷ùúØÒøÌø÷„•.exe 3568 üþÿÝ×ýÑýü.exe 4816 ÷ùúØÒøÌø÷„•.exe 4936 ÷ùúØÒøÌø÷„•.exe 4156 üþÿÝ×ýÑýü.exe 1020 üþÿÝ×ýÑýü.exe 4680 ÷ùúØÒøÌø÷„•.exe 4332 ÷ùúØÒøÌø÷„•.exe 2672 üþÿÝ×ýÑýü.exe 5032 ÷ùúØÒøÌø÷„•.exe 4900 üþÿÝ×ýÑýü.exe 4460 ÷ùúØÒøÌø÷„•.exe 4388 üþÿÝ×ýÑýü.exe 4524 ÷ùúØÒøÌø÷„•.exe 3056 üþÿÝ×ýÑýü.exe 3500 ÷ùúØÒøÌø÷„•.exe -
resource yara_rule behavioral2/memory/1188-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/files/0x0007000000023419-7.dat upx behavioral2/files/0x0007000000023418-14.dat upx behavioral2/memory/3772-21-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/1188-24-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3772-27-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/1028-29-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3472-36-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4244-52-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/1052-73-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4772-71-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/2568-96-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4312-102-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/1908-101-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4992-124-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4816-132-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4936-135-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3568-148-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4156-153-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4936-203-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4680-218-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/1020-233-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/5032-255-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4900-268-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4332-270-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/2672-295-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4524-318-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3056-328-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4460-331-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3500-341-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4388-343-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\÷ùúØÒøÌø÷„•.exe = "C:\\Windows\\system32\\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\\÷ùúØÒøÌø÷\u0090„•\u0090.exe" 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\mail-buffers 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe File opened for modification C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\mail-sent 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe File opened for modification C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D} 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe File opened for modification C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\üþÿÝ×ýÑýü.exe 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe File opened for modification C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\÷ùúØÒøÌø÷„•.exe 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\ShellNew\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}\mail-buffers 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe File opened for modification C:\Windows\ShellNew\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}\mail-sent 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe File opened for modification C:\Windows\ShellNew\control.{21EC2020-3AEA-1069-A2DD-08002B30309D} 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language üþÿÝ×ýÑýü.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language üþÿÝ×ýÑýü.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language üþÿÝ×ýÑýü.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÷ùúØÒøÌø÷„•.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language üþÿÝ×ýÑýü.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÷ùúØÒøÌø÷„•.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language üþÿÝ×ýÑýü.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÷ùúØÒøÌø÷„•.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÷ùúØÒøÌø÷„•.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language üþÿÝ×ýÑýü.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language üþÿÝ×ýÑýü.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÷ùúØÒøÌø÷„•.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language üþÿÝ×ýÑýü.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÷ùúØÒøÌø÷„•.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÷ùúØÒøÌø÷„•.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÷ùúØÒøÌø÷„•.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language üþÿÝ×ýÑýü.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language üþÿÝ×ýÑýü.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÷ùúØÒøÌø÷„•.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÷ùúØÒøÌø÷„•.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÷ùúØÒøÌø÷„•.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language üþÿÝ×ýÑýü.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language üþÿÝ×ýÑýü.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÷ùúØÒøÌø÷„•.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÷ùúØÒøÌø÷„•.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings ÷ùúØÒøÌø÷„•.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings üþÿÝ×ýÑýü.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings ÷ùúØÒøÌø÷„•.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings ÷ùúØÒøÌø÷„•.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings üþÿÝ×ýÑýü.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings üþÿÝ×ýÑýü.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings ÷ùúØÒøÌø÷„•.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings üþÿÝ×ýÑýü.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings üþÿÝ×ýÑýü.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings üþÿÝ×ýÑýü.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings ÷ùúØÒøÌø÷„•.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3728 WINWORD.EXE 3728 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 34 IoCs
pid Process 1188 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe 1028 ÷ùúØÒøÌø÷„•.exe 3472 üþÿÝ×ýÑýü.exe 3772 üþÿÝ×ýÑýü.exe 1052 ÷ùúØÒøÌø÷„•.exe 3728 WINWORD.EXE 3728 WINWORD.EXE 3728 WINWORD.EXE 1908 üþÿÝ×ýÑýü.exe 4244 ÷ùúØÒøÌø÷„•.exe 3728 WINWORD.EXE 4772 üþÿÝ×ýÑýü.exe 3728 WINWORD.EXE 3728 WINWORD.EXE 3728 WINWORD.EXE 4992 ÷ùúØÒøÌø÷„•.exe 2568 üþÿÝ×ýÑýü.exe 4312 ÷ùúØÒøÌø÷„•.exe 3568 üþÿÝ×ýÑýü.exe 4816 ÷ùúØÒøÌø÷„•.exe 4936 ÷ùúØÒøÌø÷„•.exe 3728 WINWORD.EXE 4156 üþÿÝ×ýÑýü.exe 1020 üþÿÝ×ýÑýü.exe 4680 ÷ùúØÒøÌø÷„•.exe 4332 ÷ùúØÒøÌø÷„•.exe 2672 üþÿÝ×ýÑýü.exe 5032 ÷ùúØÒøÌø÷„•.exe 4900 üþÿÝ×ýÑýü.exe 4460 ÷ùúØÒøÌø÷„•.exe 4388 üþÿÝ×ýÑýü.exe 4524 ÷ùúØÒøÌø÷„•.exe 3056 üþÿÝ×ýÑýü.exe 3500 ÷ùúØÒøÌø÷„•.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1188 wrote to memory of 1028 1188 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe 84 PID 1188 wrote to memory of 1028 1188 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe 84 PID 1188 wrote to memory of 1028 1188 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe 84 PID 1188 wrote to memory of 3472 1188 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe 85 PID 1188 wrote to memory of 3472 1188 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe 85 PID 1188 wrote to memory of 3472 1188 6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe 85 PID 1028 wrote to memory of 3772 1028 ÷ùúØÒøÌø÷„•.exe 86 PID 1028 wrote to memory of 3772 1028 ÷ùúØÒøÌø÷„•.exe 86 PID 1028 wrote to memory of 3772 1028 ÷ùúØÒøÌø÷„•.exe 86 PID 3472 wrote to memory of 3728 3472 üþÿÝ×ýÑýü.exe 89 PID 3472 wrote to memory of 3728 3472 üþÿÝ×ýÑýü.exe 89 PID 3472 wrote to memory of 1052 3472 üþÿÝ×ýÑýü.exe 90 PID 3472 wrote to memory of 1052 3472 üþÿÝ×ýÑýü.exe 90 PID 3472 wrote to memory of 1052 3472 üþÿÝ×ýÑýü.exe 90 PID 1052 wrote to memory of 1908 1052 ÷ùúØÒøÌø÷„•.exe 92 PID 1052 wrote to memory of 1908 1052 ÷ùúØÒøÌø÷„•.exe 92 PID 1052 wrote to memory of 1908 1052 ÷ùúØÒøÌø÷„•.exe 92 PID 1908 wrote to memory of 4244 1908 üþÿÝ×ýÑýü.exe 93 PID 1908 wrote to memory of 4244 1908 üþÿÝ×ýÑýü.exe 93 PID 1908 wrote to memory of 4244 1908 üþÿÝ×ýÑýü.exe 93 PID 1052 wrote to memory of 2076 1052 ÷ùúØÒøÌø÷„•.exe 94 PID 1052 wrote to memory of 2076 1052 ÷ùúØÒøÌø÷„•.exe 94 PID 1052 wrote to memory of 4772 1052 ÷ùúØÒøÌø÷„•.exe 95 PID 1052 wrote to memory of 4772 1052 ÷ùúØÒøÌø÷„•.exe 95 PID 1052 wrote to memory of 4772 1052 ÷ùúØÒøÌø÷„•.exe 95 PID 1908 wrote to memory of 4992 1908 üþÿÝ×ýÑýü.exe 96 PID 1908 wrote to memory of 4992 1908 üþÿÝ×ýÑýü.exe 96 PID 1908 wrote to memory of 4992 1908 üþÿÝ×ýÑýü.exe 96 PID 4992 wrote to memory of 2568 4992 ÷ùúØÒøÌø÷„•.exe 97 PID 4992 wrote to memory of 2568 4992 ÷ùúØÒøÌø÷„•.exe 97 PID 4992 wrote to memory of 2568 4992 ÷ùúØÒøÌø÷„•.exe 97 PID 1908 wrote to memory of 3872 1908 üþÿÝ×ýÑýü.exe 98 PID 1908 wrote to memory of 3872 1908 üþÿÝ×ýÑýü.exe 98 PID 1908 wrote to memory of 4312 1908 üþÿÝ×ýÑýü.exe 99 PID 1908 wrote to memory of 4312 1908 üþÿÝ×ýÑýü.exe 99 PID 1908 wrote to memory of 4312 1908 üþÿÝ×ýÑýü.exe 99 PID 4992 wrote to memory of 1360 4992 ÷ùúØÒøÌø÷„•.exe 100 PID 4992 wrote to memory of 1360 4992 ÷ùúØÒøÌø÷„•.exe 100 PID 4992 wrote to memory of 3568 4992 ÷ùúØÒøÌø÷„•.exe 101 PID 4992 wrote to memory of 3568 4992 ÷ùúØÒøÌø÷„•.exe 101 PID 4992 wrote to memory of 3568 4992 ÷ùúØÒøÌø÷„•.exe 101 PID 3568 wrote to memory of 4816 3568 üþÿÝ×ýÑýü.exe 102 PID 3568 wrote to memory of 4816 3568 üþÿÝ×ýÑýü.exe 102 PID 3568 wrote to memory of 4816 3568 üþÿÝ×ýÑýü.exe 102 PID 3568 wrote to memory of 4556 3568 üþÿÝ×ýÑýü.exe 104 PID 3568 wrote to memory of 4556 3568 üþÿÝ×ýÑýü.exe 104 PID 3568 wrote to memory of 4936 3568 üþÿÝ×ýÑýü.exe 105 PID 3568 wrote to memory of 4936 3568 üþÿÝ×ýÑýü.exe 105 PID 3568 wrote to memory of 4936 3568 üþÿÝ×ýÑýü.exe 105 PID 4936 wrote to memory of 4156 4936 ÷ùúØÒøÌø÷„•.exe 106 PID 4936 wrote to memory of 4156 4936 ÷ùúØÒøÌø÷„•.exe 106 PID 4936 wrote to memory of 4156 4936 ÷ùúØÒøÌø÷„•.exe 106 PID 4936 wrote to memory of 4040 4936 ÷ùúØÒøÌø÷„•.exe 108 PID 4936 wrote to memory of 4040 4936 ÷ùúØÒøÌø÷„•.exe 108 PID 4936 wrote to memory of 1020 4936 ÷ùúØÒøÌø÷„•.exe 109 PID 4936 wrote to memory of 1020 4936 ÷ùúØÒøÌø÷„•.exe 109 PID 4936 wrote to memory of 1020 4936 ÷ùúØÒøÌø÷„•.exe 109 PID 1020 wrote to memory of 4680 1020 üþÿÝ×ýÑýü.exe 128 PID 1020 wrote to memory of 4680 1020 üþÿÝ×ýÑýü.exe 128 PID 1020 wrote to memory of 4680 1020 üþÿÝ×ýÑýü.exe 128 PID 1020 wrote to memory of 2456 1020 üþÿÝ×ýÑýü.exe 111 PID 1020 wrote to memory of 2456 1020 üþÿÝ×ýÑýü.exe 111 PID 1020 wrote to memory of 4332 1020 üþÿÝ×ýÑýü.exe 112 PID 1020 wrote to memory of 4332 1020 üþÿÝ×ýÑýü.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe"C:\Users\Admin\AppData\Local\Temp\6690204ed0041210274e149fd7aa719b242cbc25a046bf5274c26bfb0c7feb47.exe"1⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\÷ùúØÒøÌø÷„•.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\÷ùúØÒøÌø÷„•.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\üþÿÝ×ýÑýü.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\üþÿÝ×ýÑýü.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3772
-
-
-
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\üþÿÝ×ýÑýü.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\üþÿÝ×ýÑýü.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\the [K]angen is back.doc" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3728
-
-
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\÷ùúØÒøÌø÷„•.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\÷ùúØÒøÌø÷„•.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\üþÿÝ×ýÑýü.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\üþÿÝ×ýÑýü.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\÷ùúØÒøÌø÷„•.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\÷ùúØÒøÌø÷„•.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4244
-
-
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\÷ùúØÒøÌø÷„•.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\÷ùúØÒøÌø÷„•.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\üþÿÝ×ýÑýü.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\üþÿÝ×ýÑýü.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2568
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\the [K]angen is back.doc" /o ""6⤵PID:1360
-
-
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\üþÿÝ×ýÑýü.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\üþÿÝ×ýÑýü.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\÷ùúØÒøÌø÷„•.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\÷ùúØÒøÌø÷„•.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4816
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\the [K]angen is back.doc" /o ""7⤵PID:4556
-
-
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\÷ùúØÒøÌø÷„•.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\÷ùúØÒøÌø÷„•.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\üþÿÝ×ýÑýü.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\üþÿÝ×ýÑýü.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4156
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\the [K]angen is back.doc" /o ""8⤵PID:4040
-
-
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\üþÿÝ×ýÑýü.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\üþÿÝ×ýÑýü.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\÷ùúØÒøÌø÷„•.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\÷ùúØÒøÌø÷„•.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4680
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\the [K]angen is back.doc" /o ""9⤵PID:2456
-
-
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\÷ùúØÒøÌø÷„•.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\÷ùúØÒøÌø÷„•.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4332 -
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\üþÿÝ×ýÑýü.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\üþÿÝ×ýÑýü.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2672 -
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\÷ùúØÒøÌø÷„•.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\÷ùúØÒøÌø÷„•.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5032
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\the [K]angen is back.doc" /o ""11⤵PID:4236
-
-
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\÷ùúØÒøÌø÷„•.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\÷ùúØÒøÌø÷„•.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4460 -
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\üþÿÝ×ýÑýü.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\üþÿÝ×ýÑýü.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4388 -
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\÷ùúØÒøÌø÷„•.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\÷ùúØÒøÌø÷„•.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4524
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\the [K]angen is back.doc" /o ""13⤵PID:3244
-
-
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\÷ùúØÒøÌø÷„•.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\÷ùúØÒøÌø÷„•.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3500
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\the [K]angen is back.doc" /o ""12⤵PID:324
-
-
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\üþÿÝ×ýÑýü.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\üþÿÝ×ýÑýü.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\the [K]angen is back.doc" /o ""10⤵PID:848
-
-
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\üþÿÝ×ýÑýü.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\üþÿÝ×ýÑýü.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4900
-
-
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\the [K]angen is back.doc" /o ""5⤵PID:3872
-
-
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\÷ùúØÒøÌø÷„•.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\÷ùúØÒøÌø÷„•.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4312
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\the [K]angen is back.doc" /o ""4⤵PID:2076
-
-
C:\Windows\SysWOW64\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}\üþÿÝ×ýÑýü.exeC:\Windows\system32\printer.{2227A280-3AEA-1069-A2DE-08002B30309D}.\üþÿÝ×ýÑýü.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4772
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:4680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
413B
MD59b95183821471fb6255136a647d08fb8
SHA1b078f64ad6009e2c59afe504351fd11191f16666
SHA25661091066a3c572755212663e6a03eeebef6a3c12d338af21a68c208806880882
SHA512212cccacd42cd403d5d0547caa0aab7a66d49195a61aa8a1a6bbc6ed8c3f4af7c920aed4b41ed8d6eeb77792f5467617bbc517d0a782d7e67d537a35cedf246b
-
Filesize
413B
MD5803f360723a357add605ce9038a4e1bc
SHA1c56e1028b031ad3df3f989d9fc0031d1f8ca74ff
SHA256a59938d8fe5dac3af5d88af11e0cd6431687804788b0c97dda53e5b444c98626
SHA51216937e46f9e56c3007c38b7554098fd92509d3a7ca40b889b6ab50407ea5c5b2fce7645d327582ffa9866011552b2554d0848c67ce1fbfa3d16556edd3723487
-
Filesize
377B
MD50d6dc7bb6e9e97ef40655c91295b0322
SHA1369f43a3b498d796952e0ef431d7d07645d916c2
SHA2565ba8387b2f0038aa3b5a42c6ac7fff4a7033891df1f0e300c5e0c2796fbc8a7f
SHA5122199c136306ff3218c04623856d27b1c511201172dc594f120cafebd3a2adf74c12ee7e886bbf2f5b7499433336d43c7ba0a3c0882041af3f4142f531c353c40
-
Filesize
1KB
MD5cf2764982fa8ab78eb4d8d96afe33ea4
SHA1ec78fb3c58bf3bda958a16a0a35e5c4b2d6eec90
SHA2563a778771171ba350af4eb2039bcc4ade74246f06837430b31d5fed0dd4e7c1e3
SHA512f6278346b169b4444aebf6d49fdb52cadb1fdc830cc4642f0862c15d5a6f58285c8c4bca877ca717bb000cc9bb86632246cb2f85f4c1091ce4d86d5e7b3d8467
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
Filesize
6KB
MD5730ce61abbb36e76c9e06a2b7e5212a7
SHA17436058ca37a58f15d1665796223e2e4aecaca1c
SHA256805b903c4557f4abea0640d516b28612d0f61ff4069eeb2bc7799ff9580008fb
SHA512c3d63bbd7c8b259ea904648942c729e2812e4127c6d680b4d515d20dfb3740f0e111ecb8db7815b51c454814d34cfb006784ee89e567681af23e98acacb12c04
-
Filesize
63KB
MD5e548f7ae8264b8a33db00e77cf5871a0
SHA18293bb85e2a1cd33a334d30d61c2fe6a6ebb7708
SHA2561ff8313a2087fd8f3ed535f828a9d8a90f237a75cb37e4462635bd1d84e8e715
SHA51288ac532acd3411d3c1e4a84a9fbb77a9ceb71a410abbf38b20caef433b42760dd47a513b229c8a3cb4f73079ad979d6fd9a9ebcd2ebaf82987540d7e5d16605d
-
Filesize
38KB
MD5aba8c6e0b3d33c1d76ad3f68c066911e
SHA1564b3684776a8fa9b544ac1514a177f785d73dce
SHA256d07f2a8f53f24176fc510325b3789587982c7407fd39de68c2d8735eae3ecc6d
SHA51278c26fc100ff6af039311d7aff217d3d6a15d6a84902dbacde1228bb6cedb84d9ed0b7f814bb177c78eab063684e7010c416c282f30cc2d3c0f4c6a137e1ad74