Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26-10-2022 12:01
Behavioral task
behavioral1
Sample
Ref671005018.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Ref671005018.xls
Resource
win10v2004-20220812-en
General
-
Target
Ref671005018.xls
-
Size
233KB
-
MD5
4e2e5429ef978cde8873d5354606cf77
-
SHA1
39d1d9c8416380c967c7eda4de6ddc5cf2a5c8f4
-
SHA256
d86628ed9c58fadce80cac836d949eb6dac45d1671a76d77ed4d39fe5db93bd8
-
SHA512
ad4dd92ce0de2a61be9328c01d82500b1bfea67d320267560647d9fb70cd6b24444346b6296bfa8584a4a0a29875eecbf0f8185d8a4abd2c0d5933e4fafde9e6
-
SSDEEP
6144:yk3hOdsylKlgryzc4bNhZF+E+W2knA1ADM/NuNNFNNXNNuNNdNNPNNaNNbNNWNNb:GAcNuNNFNNXNNuNNdNNPNNaNNbNNWNNb
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
svchost.exegst.exeddkvmcjj.exeakfng.exepid process 1188 svchost.exe 1492 gst.exe 1616 ddkvmcjj.exe 1792 akfng.exe -
Drops startup file 3 IoCs
Processes:
ddkvmcjj.exeakfng.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start.lnk ddkvmcjj.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start.lnk akfng.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start.lnk ddkvmcjj.exe -
Loads dropped DLL 6 IoCs
Processes:
EXCEL.EXEsvchost.exeWScript.exeWScript.exepid process 1604 EXCEL.EXE 1188 svchost.exe 1188 svchost.exe 1188 svchost.exe 1380 WScript.exe 1092 WScript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
ddkvmcjj.exeakfng.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ddkvmcjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6_910\\ddkvmcjj.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\6_910\\cjnm.edm" ddkvmcjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run akfng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9_105\\akfng.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\9_105\\whofhgk.sos" akfng.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce ddkvmcjj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\6_910 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6_910\\start.vbs" ddkvmcjj.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce akfng.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\9_105 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9_105\\start.vbs" akfng.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
EXCEL.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1604 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid process 1604 EXCEL.EXE 1604 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
EXCEL.EXEpid process 1604 EXCEL.EXE 1604 EXCEL.EXE 1604 EXCEL.EXE 1604 EXCEL.EXE 1604 EXCEL.EXE -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
EXCEL.EXEsvchost.exegst.exeWScript.exeWScript.exeddkvmcjj.exeakfng.exedescription pid process target process PID 1604 wrote to memory of 1188 1604 EXCEL.EXE svchost.exe PID 1604 wrote to memory of 1188 1604 EXCEL.EXE svchost.exe PID 1604 wrote to memory of 1188 1604 EXCEL.EXE svchost.exe PID 1604 wrote to memory of 1188 1604 EXCEL.EXE svchost.exe PID 1188 wrote to memory of 1492 1188 svchost.exe gst.exe PID 1188 wrote to memory of 1492 1188 svchost.exe gst.exe PID 1188 wrote to memory of 1492 1188 svchost.exe gst.exe PID 1188 wrote to memory of 1492 1188 svchost.exe gst.exe PID 1188 wrote to memory of 1380 1188 svchost.exe WScript.exe PID 1188 wrote to memory of 1380 1188 svchost.exe WScript.exe PID 1188 wrote to memory of 1380 1188 svchost.exe WScript.exe PID 1188 wrote to memory of 1380 1188 svchost.exe WScript.exe PID 1492 wrote to memory of 1092 1492 gst.exe WScript.exe PID 1492 wrote to memory of 1092 1492 gst.exe WScript.exe PID 1492 wrote to memory of 1092 1492 gst.exe WScript.exe PID 1492 wrote to memory of 1092 1492 gst.exe WScript.exe PID 1380 wrote to memory of 1616 1380 WScript.exe ddkvmcjj.exe PID 1380 wrote to memory of 1616 1380 WScript.exe ddkvmcjj.exe PID 1380 wrote to memory of 1616 1380 WScript.exe ddkvmcjj.exe PID 1380 wrote to memory of 1616 1380 WScript.exe ddkvmcjj.exe PID 1092 wrote to memory of 1792 1092 WScript.exe akfng.exe PID 1092 wrote to memory of 1792 1092 WScript.exe akfng.exe PID 1092 wrote to memory of 1792 1092 WScript.exe akfng.exe PID 1092 wrote to memory of 1792 1092 WScript.exe akfng.exe PID 1616 wrote to memory of 1780 1616 ddkvmcjj.exe RegSvcs.exe PID 1616 wrote to memory of 1780 1616 ddkvmcjj.exe RegSvcs.exe PID 1616 wrote to memory of 1780 1616 ddkvmcjj.exe RegSvcs.exe PID 1616 wrote to memory of 1780 1616 ddkvmcjj.exe RegSvcs.exe PID 1616 wrote to memory of 1780 1616 ddkvmcjj.exe RegSvcs.exe PID 1616 wrote to memory of 1780 1616 ddkvmcjj.exe RegSvcs.exe PID 1616 wrote to memory of 1780 1616 ddkvmcjj.exe RegSvcs.exe PID 1792 wrote to memory of 1012 1792 akfng.exe RegSvcs.exe PID 1792 wrote to memory of 1012 1792 akfng.exe RegSvcs.exe PID 1792 wrote to memory of 1012 1792 akfng.exe RegSvcs.exe PID 1792 wrote to memory of 1012 1792 akfng.exe RegSvcs.exe PID 1792 wrote to memory of 1012 1792 akfng.exe RegSvcs.exe PID 1792 wrote to memory of 1012 1792 akfng.exe RegSvcs.exe PID 1792 wrote to memory of 1012 1792 akfng.exe RegSvcs.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Ref671005018.xls1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\temp\6_910\gst.exe"C:\Users\Admin\AppData\Local\temp\6_910\gst.exe" Saint-Étienne-du-Mont is a church located on the Montagne Sainte-Geneviève3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\9_105\pmsg.vbe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\9_105\akfng.exe"C:\Users\Admin\AppData\Local\Temp\9_105\akfng.exe" whofhgk.sos5⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"6⤵PID:1012
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\6_910\npssxoovaq.vbe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\6_910\ddkvmcjj.exe"C:\Users\Admin\AppData\Local\Temp\6_910\ddkvmcjj.exe" cjnm.edm4⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵PID:1780
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5783d3de8de9f375875e62b690541c6fc
SHA1bd76af531029b646f383f24095ddbb327877abde
SHA2561529dda9873dbc7882fde74f145d8aba3c63091e573968c294e6a6187fc709f2
SHA512af3875fe94118c774edc6e7de9ba3ec0368d6c1959ba3c40478751e94dc87197d0bdd2a4bb34eeebb2647df743c18419e16738647c68e25076e9a6b2fb87b8d6
-
Filesize
144.9MB
MD5cbbc308c7a75e37ed4135bfbecbdfbbc
SHA16205245d1ce6b0682aef9079aeeee096b99ccb9d
SHA25617770d3cec381de78db80be431bb5450ed477b99a1ed288ee3f6c7048f0563f5
SHA5128991da2bc43747d1079fa18162d0f5a6e87009c8161c701750ebbb9592b6b81242b75e6f412cc47d9a6edd390735bbe55a183811ffaf3322e47758eae29ffdfa
-
Filesize
911KB
MD581221edd11b5995e95e971646d9653c0
SHA1f1b09d14995f24270af8d67050b4e5a38de074f3
SHA256c809f3429bcc2c666d4b6135c720c8df30ff1ede2f76e73308b82202bd904a6f
SHA5126780988267df3368e3aec9d1a58c7a9700117b6439bf9545291417cc490ed069ef6068d682138fe870093dab6c8a389a1b5f1256e21c103eb4681b1ac236248a
-
Filesize
911KB
MD581221edd11b5995e95e971646d9653c0
SHA1f1b09d14995f24270af8d67050b4e5a38de074f3
SHA256c809f3429bcc2c666d4b6135c720c8df30ff1ede2f76e73308b82202bd904a6f
SHA5126780988267df3368e3aec9d1a58c7a9700117b6439bf9545291417cc490ed069ef6068d682138fe870093dab6c8a389a1b5f1256e21c103eb4681b1ac236248a
-
Filesize
1.1MB
MD5110281413953d3f0417e6444b0004644
SHA1236630dbc2635dbcb704a78278892948ea224c5d
SHA256046d38d00b4703467e142264a3b66bea51ed16ca07da98ccf410e90ddd6e95c2
SHA512a8abd219c73f8742cff7ea7b3ac73bc7276c9040c2f6ba6d868029129fd95c04c5346534bd6a83f0dd32d7ee6b81b45c702958914557cffc87a355648de84f84
-
Filesize
436KB
MD5dd9aaeff1f2e6f7572b0a59c68e5f0dc
SHA1e32da5f93c5c94f8b4b12ccb4069a0e8e94dd038
SHA256b3dff265c8ec050020c7213d027ca1e5aaad1d9895dafedaaf58cd98ba1e7861
SHA5125d8ae10375edce231721368e5d8a6ceef3d7475d0286aeaace11514e0f9c2c2694b2c7b637bc7712dc7ed894430081ce5370142c3eade4becca9034cfbabf6a8
-
Filesize
915KB
MD5303c86d5e26a663bdb09481f93be2e90
SHA1b269a394afcf82a26150a8e16daa933176c1d3b2
SHA2561f13ccb643426fc2b63d2b8492ffd29eb86eb5de53ce3a7f598823fb5311263f
SHA5127c239f299d29ecd4015e8b53da93188dc814d135597e49b81178ac3da7be1faed8cf2eef41d3eb8b6bbd8f06e6e09fd49b3e0346f1bd3a5c5acca1703b6de955
-
Filesize
915KB
MD5303c86d5e26a663bdb09481f93be2e90
SHA1b269a394afcf82a26150a8e16daa933176c1d3b2
SHA2561f13ccb643426fc2b63d2b8492ffd29eb86eb5de53ce3a7f598823fb5311263f
SHA5127c239f299d29ecd4015e8b53da93188dc814d135597e49b81178ac3da7be1faed8cf2eef41d3eb8b6bbd8f06e6e09fd49b3e0346f1bd3a5c5acca1703b6de955
-
Filesize
59KB
MD5aa511ad88b62774609eccded56fe6921
SHA1bc7995786dd2f464ca72e472588d0d2f8441cba5
SHA256e1411732032805d54c5c51af508764272d144bb559ca7e45dff1e036049c741d
SHA5127ec89454e2b09cb0d1dc2cfb8e97e9ca3c27ff552e206d5069ad117c961f607644e2512ff7eb76d78c3ee429c4a044f32c44931e710ba8f600ce36e2b516e960
-
Filesize
79.3MB
MD5111689a0b6b4f08522b7b577692c1001
SHA15e88d66c4e5d21676ed9f7117669efbda2e71778
SHA25692a969067cee6fa37cbe337baaebf53a2a1912975f09be78ef90384eeda6deda
SHA512f11d8d57295ddb7ae812abfb77cbea08227b1d4751e3d93a9e6c6af7e8d130a2621fc8b30a1bcd0a1a3c41220f89289c10591ab8a7a42b6e29657d377678fcf6
-
Filesize
405KB
MD581db3971acf8ec7739e75f8861885f89
SHA12f2b8a2302c29e72a28697afa6b7728819469c8e
SHA2564ce2fd6069f41e43443cc1666a24ebc9e02833b70ba407b6c343cd1c1a3acc3a
SHA512b237c9d227d69a8d3f42428040e6e162f7868a932272ef48ac92616281bb2ec8f28bc071e248de6b9ce4d762f5f673eef2c362cafac4badc54fc8e08e1abef13
-
Filesize
2.1MB
MD571bc3a380454c4bf0c29f7ce462f5a44
SHA113d0575bffee9c37a4bd83f9636b1f0cd028f975
SHA256c3b54b1b12f48682ca31c77c5783db4c235268c52fcf11f2f7a3ee0364c9f8df
SHA51203da38432163c1c5f4b063eae32933492b9f60e21f6016c0a1c5c27d46d447672002fe0b82fbb648f497c35549497c999a6f8f68dc2567d350f30bf1eb6db5aa
-
Filesize
2.1MB
MD571bc3a380454c4bf0c29f7ce462f5a44
SHA113d0575bffee9c37a4bd83f9636b1f0cd028f975
SHA256c3b54b1b12f48682ca31c77c5783db4c235268c52fcf11f2f7a3ee0364c9f8df
SHA51203da38432163c1c5f4b063eae32933492b9f60e21f6016c0a1c5c27d46d447672002fe0b82fbb648f497c35549497c999a6f8f68dc2567d350f30bf1eb6db5aa
-
Filesize
1.1MB
MD5110281413953d3f0417e6444b0004644
SHA1236630dbc2635dbcb704a78278892948ea224c5d
SHA256046d38d00b4703467e142264a3b66bea51ed16ca07da98ccf410e90ddd6e95c2
SHA512a8abd219c73f8742cff7ea7b3ac73bc7276c9040c2f6ba6d868029129fd95c04c5346534bd6a83f0dd32d7ee6b81b45c702958914557cffc87a355648de84f84
-
Filesize
28KB
MD5e84f87dacfb7eb1b00eeec1aaac1d4cf
SHA1b263f4462b1d3ecb6e0dfeae04ef6dadd96f608c
SHA256c91dc9fae6dbf85acddcba2c0966de01d6a48e56a779488fec5731e6fda2e242
SHA512a0449c4648f2e7356c9334fc0d7b6c201e7e646661e444d53961b6c9b847e7b53a772e06fb7be25f26019b70b78f51d67120fb2ee70ff7eee561526d2b3917c9
-
Filesize
32KB
MD5dbeb963635b0737ceca13c7f9bc566d7
SHA110b6334645131d81b311c71eca7a8f9ccde127d1
SHA25601299ecd0169896c320e2690a782a45a7e8f2d94cbc221dbe153ceb694febbe6
SHA512b48d909051ecbb73ab47c89fcfee3cbdb9a08c5a246e3e0ec4780e64e402e01d16ff2f2fa3025bc11f2efaaf28b47496aa83f1957db8d131e9ea8e7a20bef3d9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
Filesize
1006B
MD53ce8b9a81dfcd8024566bb90e94f5ae3
SHA18876db0047423964315bb9958c86a49fe7332571
SHA2565367b356d7453c796a6f1017799e816eb5e031d781ae5f17b5989a65d6d6ceff
SHA512320ff90df2828ee622547be343c910f491fdbf06f2cdf9cf811dc7acd4ee404ee9c018727d6d0f8f45926b48f1e859fefec451781179a497cd9759864570e5c8
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
Filesize
1006B
MD53ce8b9a81dfcd8024566bb90e94f5ae3
SHA18876db0047423964315bb9958c86a49fe7332571
SHA2565367b356d7453c796a6f1017799e816eb5e031d781ae5f17b5989a65d6d6ceff
SHA512320ff90df2828ee622547be343c910f491fdbf06f2cdf9cf811dc7acd4ee404ee9c018727d6d0f8f45926b48f1e859fefec451781179a497cd9759864570e5c8
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
Filesize
1006B
MD53ce8b9a81dfcd8024566bb90e94f5ae3
SHA18876db0047423964315bb9958c86a49fe7332571
SHA2565367b356d7453c796a6f1017799e816eb5e031d781ae5f17b5989a65d6d6ceff
SHA512320ff90df2828ee622547be343c910f491fdbf06f2cdf9cf811dc7acd4ee404ee9c018727d6d0f8f45926b48f1e859fefec451781179a497cd9759864570e5c8
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
Filesize
1006B
MD53ce8b9a81dfcd8024566bb90e94f5ae3
SHA18876db0047423964315bb9958c86a49fe7332571
SHA2565367b356d7453c796a6f1017799e816eb5e031d781ae5f17b5989a65d6d6ceff
SHA512320ff90df2828ee622547be343c910f491fdbf06f2cdf9cf811dc7acd4ee404ee9c018727d6d0f8f45926b48f1e859fefec451781179a497cd9759864570e5c8
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1006B
MD53ce8b9a81dfcd8024566bb90e94f5ae3
SHA18876db0047423964315bb9958c86a49fe7332571
SHA2565367b356d7453c796a6f1017799e816eb5e031d781ae5f17b5989a65d6d6ceff
SHA512320ff90df2828ee622547be343c910f491fdbf06f2cdf9cf811dc7acd4ee404ee9c018727d6d0f8f45926b48f1e859fefec451781179a497cd9759864570e5c8
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
Filesize
1006B
MD53ce8b9a81dfcd8024566bb90e94f5ae3
SHA18876db0047423964315bb9958c86a49fe7332571
SHA2565367b356d7453c796a6f1017799e816eb5e031d781ae5f17b5989a65d6d6ceff
SHA512320ff90df2828ee622547be343c910f491fdbf06f2cdf9cf811dc7acd4ee404ee9c018727d6d0f8f45926b48f1e859fefec451781179a497cd9759864570e5c8
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1006B
MD5d7e39fc32b270835287c892fc469ac26
SHA1656c0cfb393ad918e6fa3a407c0e2466fb47a21f
SHA256a1e9fcfbfd3adf5a6e71972e15476245ab9b5f151e7fe4afcc7328f97727af4d
SHA512abb3a0523e7d3379b172244aa8480f74e4e73dc05c671943e506b2f3078008b47e2586dfb0227b0b9760944cb7d11b10a1d5da6c1e303d096b9e30282d441982
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
911KB
MD581221edd11b5995e95e971646d9653c0
SHA1f1b09d14995f24270af8d67050b4e5a38de074f3
SHA256c809f3429bcc2c666d4b6135c720c8df30ff1ede2f76e73308b82202bd904a6f
SHA5126780988267df3368e3aec9d1a58c7a9700117b6439bf9545291417cc490ed069ef6068d682138fe870093dab6c8a389a1b5f1256e21c103eb4681b1ac236248a
-
Filesize
1.1MB
MD5110281413953d3f0417e6444b0004644
SHA1236630dbc2635dbcb704a78278892948ea224c5d
SHA256046d38d00b4703467e142264a3b66bea51ed16ca07da98ccf410e90ddd6e95c2
SHA512a8abd219c73f8742cff7ea7b3ac73bc7276c9040c2f6ba6d868029129fd95c04c5346534bd6a83f0dd32d7ee6b81b45c702958914557cffc87a355648de84f84
-
Filesize
1.1MB
MD5110281413953d3f0417e6444b0004644
SHA1236630dbc2635dbcb704a78278892948ea224c5d
SHA256046d38d00b4703467e142264a3b66bea51ed16ca07da98ccf410e90ddd6e95c2
SHA512a8abd219c73f8742cff7ea7b3ac73bc7276c9040c2f6ba6d868029129fd95c04c5346534bd6a83f0dd32d7ee6b81b45c702958914557cffc87a355648de84f84
-
Filesize
1.1MB
MD5110281413953d3f0417e6444b0004644
SHA1236630dbc2635dbcb704a78278892948ea224c5d
SHA256046d38d00b4703467e142264a3b66bea51ed16ca07da98ccf410e90ddd6e95c2
SHA512a8abd219c73f8742cff7ea7b3ac73bc7276c9040c2f6ba6d868029129fd95c04c5346534bd6a83f0dd32d7ee6b81b45c702958914557cffc87a355648de84f84
-
Filesize
915KB
MD5303c86d5e26a663bdb09481f93be2e90
SHA1b269a394afcf82a26150a8e16daa933176c1d3b2
SHA2561f13ccb643426fc2b63d2b8492ffd29eb86eb5de53ce3a7f598823fb5311263f
SHA5127c239f299d29ecd4015e8b53da93188dc814d135597e49b81178ac3da7be1faed8cf2eef41d3eb8b6bbd8f06e6e09fd49b3e0346f1bd3a5c5acca1703b6de955
-
Filesize
2.1MB
MD571bc3a380454c4bf0c29f7ce462f5a44
SHA113d0575bffee9c37a4bd83f9636b1f0cd028f975
SHA256c3b54b1b12f48682ca31c77c5783db4c235268c52fcf11f2f7a3ee0364c9f8df
SHA51203da38432163c1c5f4b063eae32933492b9f60e21f6016c0a1c5c27d46d447672002fe0b82fbb648f497c35549497c999a6f8f68dc2567d350f30bf1eb6db5aa