Analysis
-
max time kernel
89s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/12/2024, 17:33
Behavioral task
behavioral1
Sample
29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe
Resource
win10v2004-20241007-en
General
-
Target
29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe
-
Size
232KB
-
MD5
4d95c4d423d1da3acd25310442b5c5e7
-
SHA1
89d22ba59d9d43efd3c0b7c957bba77e80949b0b
-
SHA256
29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98
-
SHA512
9d45e4dbc353150b863932fd4e897b2f943227584fc4845d57e75ff7b7fa4fb0a147e95b72b6e5e710f379e74ddd3b956854e0de6a558f118707f11c5fff0554
-
SSDEEP
3072:5I1i/NU8bOMYcYYcmy5cU+gTn6HOjDhWrzvvQwlgO5s1i/NU82OMYcYYamv5bG:8i/NjO5YBgegD0PHzSni/N+O7P
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe File created C:\WINDOWS\SysWOW64\qx.bat 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 2576 cmd.exe 2720 cmd.exe 2564 cmd.exe 3064 cmd.exe 2832 cmd.exe 2812 cmd.exe 2968 cmd.exe -
resource yara_rule behavioral1/memory/2480-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x0008000000016edc-10.dat upx behavioral1/files/0x0008000000016f02-11.dat upx behavioral1/memory/2480-326-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe File opened for modification C:\WINDOWS\windows.exe 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e4f5fda2cef1b45b9e4be64d84ba8b800000000020000000000106600000001000020000000ce73b22c9b648f159422086d34b9d9d37a176c5dcd17fad703b3e1a81b33d2d0000000000e8000000002000020000000197680958683670fdd69e5209f0f15d1b6967e5bd0ee01083769cecccd30e521200000005fa70072ecb0ae8c257a875a335c4606a180795559b1d10871adcbcb473fc3cb40000000332007f638689b237238a87230cf2788fde1c80e8e8228c91bb43b6ab65633cb5989f25c8e21b8d0bd367df32f7ff67a429f6317303df047ea50110a2d5886ee IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 406ef17fa945db01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A945D7E1-B19C-11EF-88C4-7A9F8CACAEA3} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9626861-B19C-11EF-88C4-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e4f5fda2cef1b45b9e4be64d84ba8b80000000002000000000010660000000100002000000056f238f2b95439cacb87e0f8606273eb29642b308d86f3fb5d27544a892c37bc000000000e8000000002000020000000e6f84843c69455f6635e0383f55f173f759ff8ba597031f141e65848f7b71c729000000056290378b5e737be98f8f7b22c87be51e81e6ea5054c97902c0aba31f36fecbb800012d6eb5e8bdccc37605d983eeccc63c0f8b9bd84ccafcdf154aa22ca07a02e00fdffd9bb2687378846c4a5d7c0da28ee1dde38c9fdde5f58cb5a3451205d6656013a1dcbfbe4d5ca3964648fb93912930a0512d8eb50e0b03708a6eb5e4a09357c5ec5dc73accd935d6840d1446640000000db1c91eb4fabc1a2c3e076424cf1c6499af3e07d35c1e704b231938fa3e5425abcc8a7078c9a946ba908785d03fcbf79b0b7a90a4e3ef43f13127a00d9af2063 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439409056" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2084 IEXPLORE.EXE 2856 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 1576 IEXPLORE.EXE 1576 IEXPLORE.EXE 2856 iexplore.exe 2856 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2084 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 31 PID 2480 wrote to memory of 2084 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 31 PID 2480 wrote to memory of 2084 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 31 PID 2480 wrote to memory of 2084 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 31 PID 2084 wrote to memory of 1576 2084 IEXPLORE.EXE 32 PID 2084 wrote to memory of 1576 2084 IEXPLORE.EXE 32 PID 2084 wrote to memory of 1576 2084 IEXPLORE.EXE 32 PID 2084 wrote to memory of 1576 2084 IEXPLORE.EXE 32 PID 2480 wrote to memory of 2856 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 33 PID 2480 wrote to memory of 2856 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 33 PID 2480 wrote to memory of 2856 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 33 PID 2480 wrote to memory of 2856 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 33 PID 2480 wrote to memory of 2832 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 34 PID 2480 wrote to memory of 2832 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 34 PID 2480 wrote to memory of 2832 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 34 PID 2480 wrote to memory of 2832 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 34 PID 2832 wrote to memory of 2676 2832 cmd.exe 36 PID 2832 wrote to memory of 2676 2832 cmd.exe 36 PID 2832 wrote to memory of 2676 2832 cmd.exe 36 PID 2832 wrote to memory of 2676 2832 cmd.exe 36 PID 2480 wrote to memory of 2812 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 37 PID 2480 wrote to memory of 2812 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 37 PID 2480 wrote to memory of 2812 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 37 PID 2480 wrote to memory of 2812 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 37 PID 2812 wrote to memory of 2372 2812 cmd.exe 39 PID 2812 wrote to memory of 2372 2812 cmd.exe 39 PID 2812 wrote to memory of 2372 2812 cmd.exe 39 PID 2812 wrote to memory of 2372 2812 cmd.exe 39 PID 2480 wrote to memory of 2968 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 40 PID 2480 wrote to memory of 2968 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 40 PID 2480 wrote to memory of 2968 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 40 PID 2480 wrote to memory of 2968 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 40 PID 2968 wrote to memory of 2584 2968 cmd.exe 42 PID 2968 wrote to memory of 2584 2968 cmd.exe 42 PID 2968 wrote to memory of 2584 2968 cmd.exe 42 PID 2968 wrote to memory of 2584 2968 cmd.exe 42 PID 2480 wrote to memory of 2576 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 43 PID 2480 wrote to memory of 2576 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 43 PID 2480 wrote to memory of 2576 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 43 PID 2480 wrote to memory of 2576 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 43 PID 2576 wrote to memory of 2716 2576 cmd.exe 45 PID 2576 wrote to memory of 2716 2576 cmd.exe 45 PID 2576 wrote to memory of 2716 2576 cmd.exe 45 PID 2576 wrote to memory of 2716 2576 cmd.exe 45 PID 2480 wrote to memory of 2720 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 46 PID 2480 wrote to memory of 2720 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 46 PID 2480 wrote to memory of 2720 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 46 PID 2480 wrote to memory of 2720 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 46 PID 2720 wrote to memory of 2548 2720 cmd.exe 48 PID 2720 wrote to memory of 2548 2720 cmd.exe 48 PID 2720 wrote to memory of 2548 2720 cmd.exe 48 PID 2720 wrote to memory of 2548 2720 cmd.exe 48 PID 2480 wrote to memory of 2564 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 49 PID 2480 wrote to memory of 2564 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 49 PID 2480 wrote to memory of 2564 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 49 PID 2480 wrote to memory of 2564 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 49 PID 2564 wrote to memory of 2624 2564 cmd.exe 51 PID 2564 wrote to memory of 2624 2564 cmd.exe 51 PID 2564 wrote to memory of 2624 2564 cmd.exe 51 PID 2564 wrote to memory of 2624 2564 cmd.exe 51 PID 2480 wrote to memory of 3064 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 52 PID 2480 wrote to memory of 3064 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 52 PID 2480 wrote to memory of 3064 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 52 PID 2480 wrote to memory of 3064 2480 29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe 52 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 2584 attrib.exe 2716 attrib.exe 2548 attrib.exe 2624 attrib.exe 2424 attrib.exe 2676 attrib.exe 2372 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe"C:\Users\Admin\AppData\Local\Temp\29bc7f0f24fed8a33ea2928bbf9046551b20d2076203a7be81664f7fda620f98.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.212ok.com/Gbook.asp?qita2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2584
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2424
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5306fe5c52eaedb9789401b9c12854027
SHA19d02ccfde5572072b460dcc0e87ae39f1312b66e
SHA256eb9ab51a2ab862715d8c48a5fbd386ff69ced1746b24e35bfa3071e4bee614d2
SHA512cf04c697e0dccf6ef06a057ee64cf51272de25f3f57d3a6471428c804fb6b876de8b45d833d5c608ecebe19ecd70d69b74ff2c302986cd07abe05972961a0627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582f48d83c1d1f149d45b37377e6a5c01
SHA1af1ed4e137f8df5ea0cda48ff474cccbb1d679ff
SHA2560b3e06d28de8fe9a6e9e1941a3934eefad7515202e4af4ee39287333e043f057
SHA5129c55c415b156bb1190203ca3aaf9e79e4800cad7f50bfdaa3014bcf4926df957e5da694d3dac2854edfde00bfaab60cbabec2ff9322015ca2d49f6fe4e8d4ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3c8d0f457aa960eef3698b5293728c5
SHA169483907763b771c3dfa9d44e8a5cd0744ff48fc
SHA25648f312990c8318220f1c0921f107b9d5edb0d5f9eaea7b83f9cf66ab49ee3552
SHA512cd98f3fa974649e31d2ceecf6eeee77a25b812d4b49c96d007bee1cb0cc7200c576fe98a62381e7e63de41644be5add6d139028704b99314e618692f22a1441b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fca9101a1c38f76fe154c68dd450379
SHA13df10d7f5543d94eeb0a621139ac2ccbe732157f
SHA256129929bdfab79fec70138314af02af286d41028fed7296e29c25d9e67e6e8f43
SHA51244cb2d0091f778c83dca0a1520ab7d40fc7e55930d4263da9fe9e6f7f8f0a43d150b69f1d47d3aa438ffb8f6b28e934bab69fd1b72c0955821e95187c9d31ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657e9adcdc3f3e94bea1c44629321c5d
SHA13eba23d999c124d561a22687e6ba3f65dce883c1
SHA25635ce43503accf4c2946b3bbbafb5bae8df5fca5acd752a92f82023395e082f58
SHA5127c3e86d2683d6910bd46c2beaccee90d4e745bad29b72a9a122c55fd7e6ff0b357eb5c690347a4905323d26964e23ca274fffd6c9ec0158fb02fd08d656d8268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589fbf2f5ab14b26866d3faf8601b4470
SHA1f3a223b470dcaefbc7fb6e3a012d6f680794818e
SHA2568b73645f1fc500a49b7641b19686c60b90927d27d049f0ddb61121ecd9b9a371
SHA51206d65b2a06078a3c9ce616ab714239dae4fc08eca34d1c31d71875b0a6e3988364aa8343050638c0af9fc09ec2ae4ed9f9db325280d0fe48053877c4baa58d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5614a274272394951404204fb49befd11
SHA13e97e44e770125d15584486a64fac829f767afe9
SHA25603eeb80457f43640999854582d93258edbd4fc6c2502e12b83911a9d36719061
SHA512934a7fa707a8608a3a09e2b650981cebfcfdd8c695d83e1f172ee05ab71fb33d8543ebacf338584a3edd3a65e001fad3b1bdd7275f0d900ee635f9890633efb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503e4ee76395b6dbde478ed1d43913438
SHA104818840235c40ac22f9e34a0335ee86f65f1ca5
SHA256d86966913087e12ac3d78259800bfd34215ad5627050ea7c33dbc12cd0f5bebd
SHA5126979a3c51c196905e16c1f8a1b54bf6a2c94af149c97fc94ca18f4051256cb0b259a2235ca33e6f75fa4b7ac0e635b584adbcf0bb51d104faf0912215a1f15bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f1ccdd5c275d18b523ae6d84f0544f3
SHA1565ff999154a39988e3e06d2a2778865a3d4eae8
SHA25623da55a5ac2e655282f27cc757a33dd26d66c0c08429df164b1d3f899caea231
SHA51295ebc4d9c9d3842373622cce1ac3730923c1d1111a8d152cc78cd995dd826be82e2a4025cb8d2721387e370227e41bf06b13f5e287b7a504295880a386ad7c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e20a8d8809f09867fcf27b8b08cf3d87
SHA1c5c7a267d976d754ca9bff4216f1f7aab27234bc
SHA256ab61d520d35a4a2ca2cbda055c510dd5ae2c994020a73593c64c511ef3ae25cc
SHA512e59d1138751c6f0046bd2834d2c23a06854f292590e9906179512f011aac3a3af4415f0cf237a6bba505cd5802e97739ae26b0d13ba52cc2e3a29903443db472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b4625001afc03f8eceaae3c241cfae
SHA1e0b64031145920684fcc42481aaad66c9bfdc632
SHA25611e0e76d445fc05ca0be9c35e624f1f728d073b4a012d2cee33b8b1cbc519fb7
SHA512912f27d14692d11b4053edb3596f97b2ea4ffb44a15ed2f4398db9c50b592c7bcfaa674c706220cc425bda323360997e1196839c1cf2db014cbedba77ff12887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f4afa8deef1bb1daaa8fca246769b29
SHA15dfd6413c067d3c6c007c545246755bea16df7d5
SHA256290bcac790f589c8c0812060399b9417a3567cfc71a184eeb3a0bbd8ca2c97dc
SHA512ff2f692c9d302222ae5ebcc54f5949bc0794e482392cbcc24ed214808e0c8526ed69d59769d86aac98cc6c7ded9e694800a46f4e9576534fceb43ce485a57960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c843aefc739ed68340f9e418189ea854
SHA16bc56e69ba5239078d9051ed116972a800fe3e96
SHA256143a1e7f96ced1120a28528b98f56644bb215c30e24cba2f010e0dd9e2a8e47d
SHA512109e762386ca651d789369afd45fd9bd7801bba16a2b9ce0d2a2790b2a79df88b8c2d69fb48e13126fef758f1fe0d89a581a236c1e8953a5c533ccf6cd969c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522acb0f07b2280f8840adbf5748ed171
SHA1a9a13d652c8dfc79e7019a4933170be670168962
SHA256635a37f068d593f9cf5e2bf2bb9f1ebbac92c662483661eef4e9c5f21630d5b5
SHA512131d03c99a0e5054264d6b4af4eb03b93b72caf453da2927679f8717dd237eecee351948819d7abf8d35a6acffa65b50ea9e9e0b6678fd71c10af753b345b52c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9063577b6381232b4c76fc74386028f
SHA1410c3d7e31b512a6701f9bf10384bee92f11c4f0
SHA256da18441979c28234f08c437cd480525b2d5bd9db9abb0c9828e8c4c0967345ef
SHA5125f72b9ed4efa029d52d2e435b341251fc7d96de726f7ba8b386bcd2c642ab18d9de542b3af408c6a7d2faad8d3bfe3349182c624a2a3a9158d1f84ccd63deccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c22cdfb55dcbe5a45c88846a187434f
SHA17277c401cb5ad9efad4e03d57325ad1be5de1ab8
SHA2563e35b6b33c823f6a80de66c1c11f7d427afa627bdc077a9fd17a064654274d5a
SHA512e5a03f8b9a7042badbd86fae179614aa5fcf6e18b483b5cf7305e2b78dc77e6cf560747c561f61209865423eb610da6c29cdbff09e680331113648b7b7ad3b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55983a8ede61495aff8f92c44deaae554
SHA13933b69f593be118e34b030691de616af4694b28
SHA256df76fd236c19f77a2b42282dcf50c11ea310e086c682103a6742a79ee5718ef8
SHA512f64d5e5b5f3e351a11f150e50f10273359868840db276f83f1c08c6555abdb38426a7487eba27a1f2a866d0dc50fb9f25445ec35354686cec895209bd5238674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f63acafed4b3c9910a556cf6d33dd0f4
SHA1b1a280ae41775f26671a286f5adccb60405e549c
SHA2561601948dd3f057d005ae38b3bc0035fa7ebb0390089a5222087d520e82e322d3
SHA512eb94ea85cc4bc341bb30e73e9991caefab67d750603ecc2ff8de4412eba667094ccd0f95f255a7194a8aa1657bf978f55da0f097216806fccdbfbc5b8d731900
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A945D7E1-B19C-11EF-88C4-7A9F8CACAEA3}.dat
Filesize5KB
MD5cbfa1643744a6f9fe7ddecdeeda51306
SHA1bc303e4a1ffe91cb6128c262e703970a101912e1
SHA256432a2207fc7d571e49653273bcb261a8e3e89cca8201199e16685b8f8da64245
SHA5129d16536cb8b3d7be5daa7f512fd4af1e3ecadd6fc7144e1b8da1c7f44bd521c11b1fcd2423a04463a8467843e578b31676cb3d8cb5ebf156ce196e389f7e7885
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
232KB
MD535fed8afc492377cf000e1d5124790f6
SHA1b4fce707559f5d45b56699767bb4bf23878c492a
SHA25648603f4762fdb05da3ce798c3fd44be9956b75695a57d9bf1ed2bb85bebe8a72
SHA51257f7d827c70037b9feaf2af1441340dc3c5f51e026824e758821e4fb2f8b8682d79fe49d341a92dcd035ed40c64aac572e501f64876bf616dae5e5781c75a1c3
-
Filesize
232KB
MD561cefd0baa4ccb946d78647efc691488
SHA12f87eebf19a772c0ba96fdfbd3d468d38a9fae2b
SHA256d4818e191b924efadf0308b05f338c4f6028df2c2df3ed4d7325bcdab266463b
SHA5120f08252273f217f162e7a65ff4e6709c06677e5c249ca0b3dad5c2bdf925c15c0199cd4a3919f9fd59b9669045ae335dfd42fa78383b9e685099b07498030cf6