Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-10-2022 06:41
Behavioral task
behavioral1
Sample
IMG00120474.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
IMG00120474.xls
Resource
win10v2004-20220901-en
General
-
Target
IMG00120474.xls
-
Size
504KB
-
MD5
2da13a1f88dfb75e1f1a37fc4212adf4
-
SHA1
ae03c0d7a946d97b148af77436f7495e0d9096a4
-
SHA256
55c32a9bd16c2d9113c92d2b57f2204aee9f1685c0496cea083309bb70d86c6f
-
SHA512
0eaa617bebb16c433a6a7b02faf9c9f96094cc400087baf5b358a50becd2dbec4a3e4a238792102bd8475644bb9b9451b56b102d1636d22a4034f74dba9d9e32
-
SSDEEP
12288:Sf7+Zft5H0dos08l9ZLB/m9UCNB6xRNZw:STB08lzL9qNB6xRN
Malware Config
Extracted
nanocore
1.2.2.0
37.139.128.94:6000
407839af-e81b-4512-9071-482887f971db
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-08-07T10:00:20.190590236Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
6000
-
default_group
client
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
407839af-e81b-4512-9071-482887f971db
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
37.139.128.94
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
agenttesla
http://107.189.4.253/boots/inc/a155b6dca5b411.php
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
svchost.exegst.exeakfng.exefwlpehujtj.exepid process 1268 svchost.exe 1348 gst.exe 1888 akfng.exe 1320 fwlpehujtj.exe -
Drops startup file 3 IoCs
Processes:
akfng.exefwlpehujtj.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start.lnk akfng.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start.lnk fwlpehujtj.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start.lnk akfng.exe -
Loads dropped DLL 6 IoCs
Processes:
EXCEL.EXEsvchost.exeWScript.exeWScript.exepid process 988 EXCEL.EXE 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1280 WScript.exe 1384 WScript.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
fwlpehujtj.exeakfng.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9_86\\FWLPEH~1.EXE C:\\Users\\Admin\\AppData\\Local\\Temp\\9_86\\rhjpodvp.wug" fwlpehujtj.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce akfng.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\9_105 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9_105\\start.vbs" akfng.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce fwlpehujtj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\9_86 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9_86\\start.vbs" fwlpehujtj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run akfng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9_105\\akfng.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\9_105\\whofhgk.sos" akfng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run fwlpehujtj.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org 7 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
Processes:
akfng.exefwlpehujtj.exedescription pid process target process PID 1888 set thread context of 1600 1888 akfng.exe RegSvcs.exe PID 1320 set thread context of 1716 1320 fwlpehujtj.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 988 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
RegSvcs.exeRegSvcs.exepid process 1600 RegSvcs.exe 1600 RegSvcs.exe 1600 RegSvcs.exe 1600 RegSvcs.exe 1716 RegSvcs.exe 1716 RegSvcs.exe 1716 RegSvcs.exe 1716 RegSvcs.exe 1600 RegSvcs.exe 1600 RegSvcs.exe 1600 RegSvcs.exe 1716 RegSvcs.exe 1716 RegSvcs.exe 1716 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RegSvcs.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 1716 RegSvcs.exe Token: SeDebugPrivilege 1600 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid process 988 EXCEL.EXE 988 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
EXCEL.EXERegSvcs.exepid process 988 EXCEL.EXE 988 EXCEL.EXE 988 EXCEL.EXE 1716 RegSvcs.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
EXCEL.EXEsvchost.exegst.exeWScript.exeWScript.exeakfng.exefwlpehujtj.exedescription pid process target process PID 988 wrote to memory of 1268 988 EXCEL.EXE svchost.exe PID 988 wrote to memory of 1268 988 EXCEL.EXE svchost.exe PID 988 wrote to memory of 1268 988 EXCEL.EXE svchost.exe PID 988 wrote to memory of 1268 988 EXCEL.EXE svchost.exe PID 1268 wrote to memory of 1348 1268 svchost.exe gst.exe PID 1268 wrote to memory of 1348 1268 svchost.exe gst.exe PID 1268 wrote to memory of 1348 1268 svchost.exe gst.exe PID 1268 wrote to memory of 1348 1268 svchost.exe gst.exe PID 1268 wrote to memory of 1384 1268 svchost.exe WScript.exe PID 1268 wrote to memory of 1384 1268 svchost.exe WScript.exe PID 1268 wrote to memory of 1384 1268 svchost.exe WScript.exe PID 1268 wrote to memory of 1384 1268 svchost.exe WScript.exe PID 1348 wrote to memory of 1280 1348 gst.exe WScript.exe PID 1348 wrote to memory of 1280 1348 gst.exe WScript.exe PID 1348 wrote to memory of 1280 1348 gst.exe WScript.exe PID 1348 wrote to memory of 1280 1348 gst.exe WScript.exe PID 1384 wrote to memory of 1320 1384 WScript.exe fwlpehujtj.exe PID 1384 wrote to memory of 1320 1384 WScript.exe fwlpehujtj.exe PID 1384 wrote to memory of 1320 1384 WScript.exe fwlpehujtj.exe PID 1384 wrote to memory of 1320 1384 WScript.exe fwlpehujtj.exe PID 1280 wrote to memory of 1888 1280 WScript.exe akfng.exe PID 1280 wrote to memory of 1888 1280 WScript.exe akfng.exe PID 1280 wrote to memory of 1888 1280 WScript.exe akfng.exe PID 1280 wrote to memory of 1888 1280 WScript.exe akfng.exe PID 1888 wrote to memory of 1600 1888 akfng.exe RegSvcs.exe PID 1888 wrote to memory of 1600 1888 akfng.exe RegSvcs.exe PID 1888 wrote to memory of 1600 1888 akfng.exe RegSvcs.exe PID 1888 wrote to memory of 1600 1888 akfng.exe RegSvcs.exe PID 1888 wrote to memory of 1600 1888 akfng.exe RegSvcs.exe PID 1888 wrote to memory of 1600 1888 akfng.exe RegSvcs.exe PID 1888 wrote to memory of 1600 1888 akfng.exe RegSvcs.exe PID 1888 wrote to memory of 1600 1888 akfng.exe RegSvcs.exe PID 1888 wrote to memory of 1600 1888 akfng.exe RegSvcs.exe PID 1320 wrote to memory of 1716 1320 fwlpehujtj.exe RegSvcs.exe PID 1320 wrote to memory of 1716 1320 fwlpehujtj.exe RegSvcs.exe PID 1320 wrote to memory of 1716 1320 fwlpehujtj.exe RegSvcs.exe PID 1320 wrote to memory of 1716 1320 fwlpehujtj.exe RegSvcs.exe PID 1320 wrote to memory of 1716 1320 fwlpehujtj.exe RegSvcs.exe PID 1320 wrote to memory of 1716 1320 fwlpehujtj.exe RegSvcs.exe PID 1320 wrote to memory of 1716 1320 fwlpehujtj.exe RegSvcs.exe PID 1320 wrote to memory of 1716 1320 fwlpehujtj.exe RegSvcs.exe PID 1320 wrote to memory of 1716 1320 fwlpehujtj.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\IMG00120474.xls1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\temp\9_86\gst.exe"C:\Users\Admin\AppData\Local\temp\9_86\gst.exe" A Pakistan International Airlines passenger aircraft (pictured)3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\9_105\pmsg.vbe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\9_105\akfng.exe"C:\Users\Admin\AppData\Local\Temp\9_105\akfng.exe" whofhgk.sos5⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\9_86\qhqt.vbe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\9_86\fwlpehujtj.exe"C:\Users\Admin\AppData\Local\Temp\9_86\fwlpehujtj.exe" rhjpodvp.wug4⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1716
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
915KB
MD5303c86d5e26a663bdb09481f93be2e90
SHA1b269a394afcf82a26150a8e16daa933176c1d3b2
SHA2561f13ccb643426fc2b63d2b8492ffd29eb86eb5de53ce3a7f598823fb5311263f
SHA5127c239f299d29ecd4015e8b53da93188dc814d135597e49b81178ac3da7be1faed8cf2eef41d3eb8b6bbd8f06e6e09fd49b3e0346f1bd3a5c5acca1703b6de955
-
Filesize
915KB
MD5303c86d5e26a663bdb09481f93be2e90
SHA1b269a394afcf82a26150a8e16daa933176c1d3b2
SHA2561f13ccb643426fc2b63d2b8492ffd29eb86eb5de53ce3a7f598823fb5311263f
SHA5127c239f299d29ecd4015e8b53da93188dc814d135597e49b81178ac3da7be1faed8cf2eef41d3eb8b6bbd8f06e6e09fd49b3e0346f1bd3a5c5acca1703b6de955
-
Filesize
59KB
MD5aa511ad88b62774609eccded56fe6921
SHA1bc7995786dd2f464ca72e472588d0d2f8441cba5
SHA256e1411732032805d54c5c51af508764272d144bb559ca7e45dff1e036049c741d
SHA5127ec89454e2b09cb0d1dc2cfb8e97e9ca3c27ff552e206d5069ad117c961f607644e2512ff7eb76d78c3ee429c4a044f32c44931e710ba8f600ce36e2b516e960
-
Filesize
79.3MB
MD5111689a0b6b4f08522b7b577692c1001
SHA15e88d66c4e5d21676ed9f7117669efbda2e71778
SHA25692a969067cee6fa37cbe337baaebf53a2a1912975f09be78ef90384eeda6deda
SHA512f11d8d57295ddb7ae812abfb77cbea08227b1d4751e3d93a9e6c6af7e8d130a2621fc8b30a1bcd0a1a3c41220f89289c10591ab8a7a42b6e29657d377678fcf6
-
Filesize
405KB
MD581db3971acf8ec7739e75f8861885f89
SHA12f2b8a2302c29e72a28697afa6b7728819469c8e
SHA2564ce2fd6069f41e43443cc1666a24ebc9e02833b70ba407b6c343cd1c1a3acc3a
SHA512b237c9d227d69a8d3f42428040e6e162f7868a932272ef48ac92616281bb2ec8f28bc071e248de6b9ce4d762f5f673eef2c362cafac4badc54fc8e08e1abef13
-
Filesize
909KB
MD5ec66a21d2b1035b5faec4b4f6ab4e1bc
SHA13b716747ee3c7e89113b5ad912fdc585adc6eaec
SHA2566e173092867146eaefd6f99ba599f7d2bd2809f34977e7d83c88bb46a977c70e
SHA5128d553c4cf36e88561a21f6c4a2df58587e9f2583186851b018e0e27a356fa0bebaf7292f598031aba75e5b7b584377afcd6cdfd4e384d4a8a7519ac9fd577f28
-
Filesize
909KB
MD5ec66a21d2b1035b5faec4b4f6ab4e1bc
SHA13b716747ee3c7e89113b5ad912fdc585adc6eaec
SHA2566e173092867146eaefd6f99ba599f7d2bd2809f34977e7d83c88bb46a977c70e
SHA5128d553c4cf36e88561a21f6c4a2df58587e9f2583186851b018e0e27a356fa0bebaf7292f598031aba75e5b7b584377afcd6cdfd4e384d4a8a7519ac9fd577f28
-
Filesize
1.1MB
MD5110281413953d3f0417e6444b0004644
SHA1236630dbc2635dbcb704a78278892948ea224c5d
SHA256046d38d00b4703467e142264a3b66bea51ed16ca07da98ccf410e90ddd6e95c2
SHA512a8abd219c73f8742cff7ea7b3ac73bc7276c9040c2f6ba6d868029129fd95c04c5346534bd6a83f0dd32d7ee6b81b45c702958914557cffc87a355648de84f84
-
Filesize
63KB
MD5c75a07b4dc917809570a5597b2628faf
SHA1ac88ee731c1a96ff161d867e10490570345922a2
SHA256b2917246f6f5f9cc9c43f9df042bec22b8f3869d66920a22a40e2df62a9ca154
SHA512bd21d64add7dee83d69be00df48fcf24c42ebd1583bc730461a1162db0978afaa6a56dd13b91894d48b7f26a873df74d919a343c6aefe26b9c6ba72b4c28c9b7
-
Filesize
178.8MB
MD57708186e0ad8d0f6ee84223ed6498fbc
SHA11750e78ab03805078e95aa09c8cdcb4a4c93c028
SHA256295773951567b38187ff0de17a20b8f3bb000076bada3a99e55b5faa08439b6c
SHA512ee4f9a20e09f92e447df8f70151b2001d755c71944173c99a2c6cb823e3aa667a69dc69cbcab232be1da12002c14c605ec58b8afbd6b8843b92bbfe95bcfe04f
-
Filesize
436KB
MD5af2456f4858947d8fdf5969905181cb7
SHA12b08d6d169f20e98947775fd9eafe070bf3e3fc8
SHA25650d763aa205ebdacbb06aadb3e1f67854b867be7fc40b21e55f53119993b561b
SHA51297893dfa9989c9b68068549eff6aa3671d2d3aaeeef8ecbd8f0247c82e32514502db2646007625a8083b92864ec24854b559b277b4928f91f75001e0612fc5e3
-
Filesize
2.1MB
MD53cd3653500f1ed1e3e9c5042c86e473d
SHA1f2ede83868bb50ee9494c9d5da807f79e084542f
SHA25605eb5d5bcd4c6af5626eb67b20323c8cc179ccf26a00670b352494b50e19f1a7
SHA5127fa04ab572991bf53e1949a5cd871d0b898040b5ba80cd5dd2c6e2ed0d608a1709918bd2430e4c90113288628ed72c94a236177785a0580ff6dbd6b28f643c6d
-
Filesize
2.1MB
MD53cd3653500f1ed1e3e9c5042c86e473d
SHA1f2ede83868bb50ee9494c9d5da807f79e084542f
SHA25605eb5d5bcd4c6af5626eb67b20323c8cc179ccf26a00670b352494b50e19f1a7
SHA5127fa04ab572991bf53e1949a5cd871d0b898040b5ba80cd5dd2c6e2ed0d608a1709918bd2430e4c90113288628ed72c94a236177785a0580ff6dbd6b28f643c6d
-
Filesize
32KB
MD5dbeb963635b0737ceca13c7f9bc566d7
SHA110b6334645131d81b311c71eca7a8f9ccde127d1
SHA25601299ecd0169896c320e2690a782a45a7e8f2d94cbc221dbe153ceb694febbe6
SHA512b48d909051ecbb73ab47c89fcfee3cbdb9a08c5a246e3e0ec4780e64e402e01d16ff2f2fa3025bc11f2efaaf28b47496aa83f1957db8d131e9ea8e7a20bef3d9
-
Filesize
1.1MB
MD5110281413953d3f0417e6444b0004644
SHA1236630dbc2635dbcb704a78278892948ea224c5d
SHA256046d38d00b4703467e142264a3b66bea51ed16ca07da98ccf410e90ddd6e95c2
SHA512a8abd219c73f8742cff7ea7b3ac73bc7276c9040c2f6ba6d868029129fd95c04c5346534bd6a83f0dd32d7ee6b81b45c702958914557cffc87a355648de84f84
-
Filesize
24KB
MD5b9dfdc313d3480fd8a8fc433d5776fad
SHA1466dddc8ef532d45d3415001cf9cc0d452614664
SHA2563132cae6ab52f4241c392ea336eca9afee49183be456fc788f3c87ec510077a0
SHA51241821b13204ae835b8ccd5f1a2a9a81b04d4290e7a5e20fdf6a7fb76df0e639ee69068b5faf34e0c7be6b1fb878910470dd8eb97bf65d1e296016422910d39b0
-
Filesize
1009B
MD5baa3c0f3c98e234a7bcde332b2421de6
SHA1ed5c59427a628a39ef544b4fe6e8a9c75fe1a601
SHA256d90318807503407929a6162bb5856448fb5661ec3a00942e174657f38acd835b
SHA512ba9cf63f9926e453f63f478cebb9b6d97129a9b5dff9b0c4f637b3ddeb747fbaa22a2604927e9b9e96dc56c4094fe2417abfd0cf5cb85f42945a52c574972f1a
-
Filesize
1014B
MD5e909f4172b1dff917ef4daeb9e4573bc
SHA14d9161f47da1924111531b3c463c4c95eb433308
SHA256dc9da9dc21a9c40defee1d0b2a7900090e3487e9d1cf8cfe86eb554b82cbfff5
SHA512f48f920676af2a710b59fbede72de71128c249d28dc2181fe4b7d6d1c2d9b541c32b1b45f9da3186526e700f4a63cfbcacf6611ea49a21e37158dbef67b35e39
-
Filesize
1009B
MD5baa3c0f3c98e234a7bcde332b2421de6
SHA1ed5c59427a628a39ef544b4fe6e8a9c75fe1a601
SHA256d90318807503407929a6162bb5856448fb5661ec3a00942e174657f38acd835b
SHA512ba9cf63f9926e453f63f478cebb9b6d97129a9b5dff9b0c4f637b3ddeb747fbaa22a2604927e9b9e96dc56c4094fe2417abfd0cf5cb85f42945a52c574972f1a
-
Filesize
1014B
MD5e909f4172b1dff917ef4daeb9e4573bc
SHA14d9161f47da1924111531b3c463c4c95eb433308
SHA256dc9da9dc21a9c40defee1d0b2a7900090e3487e9d1cf8cfe86eb554b82cbfff5
SHA512f48f920676af2a710b59fbede72de71128c249d28dc2181fe4b7d6d1c2d9b541c32b1b45f9da3186526e700f4a63cfbcacf6611ea49a21e37158dbef67b35e39
-
Filesize
1009B
MD5baa3c0f3c98e234a7bcde332b2421de6
SHA1ed5c59427a628a39ef544b4fe6e8a9c75fe1a601
SHA256d90318807503407929a6162bb5856448fb5661ec3a00942e174657f38acd835b
SHA512ba9cf63f9926e453f63f478cebb9b6d97129a9b5dff9b0c4f637b3ddeb747fbaa22a2604927e9b9e96dc56c4094fe2417abfd0cf5cb85f42945a52c574972f1a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1009B
MD589e95f3fcf0f95a03095de12c5e051e1
SHA11dad6e86a48e5178b15c59bb2c8169b4812ea66d
SHA256789f6ec2aa0e61a699e2d07afbd8a34a338ee88d406e17603c7a2fe9a8041032
SHA51216aed0e67f5edabce693c723665e8160806067fb6cf57ae1571c5195ca7a6f8b681ef76b597d727f52e5ce06d75f16b09f47d2f9ed1181181045b4b41b8bdbe9
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
Filesize
1009B
MD589e95f3fcf0f95a03095de12c5e051e1
SHA11dad6e86a48e5178b15c59bb2c8169b4812ea66d
SHA256789f6ec2aa0e61a699e2d07afbd8a34a338ee88d406e17603c7a2fe9a8041032
SHA51216aed0e67f5edabce693c723665e8160806067fb6cf57ae1571c5195ca7a6f8b681ef76b597d727f52e5ce06d75f16b09f47d2f9ed1181181045b4b41b8bdbe9
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
Filesize
1009B
MD589e95f3fcf0f95a03095de12c5e051e1
SHA11dad6e86a48e5178b15c59bb2c8169b4812ea66d
SHA256789f6ec2aa0e61a699e2d07afbd8a34a338ee88d406e17603c7a2fe9a8041032
SHA51216aed0e67f5edabce693c723665e8160806067fb6cf57ae1571c5195ca7a6f8b681ef76b597d727f52e5ce06d75f16b09f47d2f9ed1181181045b4b41b8bdbe9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1009B
MD589e95f3fcf0f95a03095de12c5e051e1
SHA11dad6e86a48e5178b15c59bb2c8169b4812ea66d
SHA256789f6ec2aa0e61a699e2d07afbd8a34a338ee88d406e17603c7a2fe9a8041032
SHA51216aed0e67f5edabce693c723665e8160806067fb6cf57ae1571c5195ca7a6f8b681ef76b597d727f52e5ce06d75f16b09f47d2f9ed1181181045b4b41b8bdbe9
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
Filesize
1009B
MD589e95f3fcf0f95a03095de12c5e051e1
SHA11dad6e86a48e5178b15c59bb2c8169b4812ea66d
SHA256789f6ec2aa0e61a699e2d07afbd8a34a338ee88d406e17603c7a2fe9a8041032
SHA51216aed0e67f5edabce693c723665e8160806067fb6cf57ae1571c5195ca7a6f8b681ef76b597d727f52e5ce06d75f16b09f47d2f9ed1181181045b4b41b8bdbe9
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
Filesize
1009B
MD589e95f3fcf0f95a03095de12c5e051e1
SHA11dad6e86a48e5178b15c59bb2c8169b4812ea66d
SHA256789f6ec2aa0e61a699e2d07afbd8a34a338ee88d406e17603c7a2fe9a8041032
SHA51216aed0e67f5edabce693c723665e8160806067fb6cf57ae1571c5195ca7a6f8b681ef76b597d727f52e5ce06d75f16b09f47d2f9ed1181181045b4b41b8bdbe9
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
Filesize
1009B
MD589e95f3fcf0f95a03095de12c5e051e1
SHA11dad6e86a48e5178b15c59bb2c8169b4812ea66d
SHA256789f6ec2aa0e61a699e2d07afbd8a34a338ee88d406e17603c7a2fe9a8041032
SHA51216aed0e67f5edabce693c723665e8160806067fb6cf57ae1571c5195ca7a6f8b681ef76b597d727f52e5ce06d75f16b09f47d2f9ed1181181045b4b41b8bdbe9
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
Filesize
1009B
MD589e95f3fcf0f95a03095de12c5e051e1
SHA11dad6e86a48e5178b15c59bb2c8169b4812ea66d
SHA256789f6ec2aa0e61a699e2d07afbd8a34a338ee88d406e17603c7a2fe9a8041032
SHA51216aed0e67f5edabce693c723665e8160806067fb6cf57ae1571c5195ca7a6f8b681ef76b597d727f52e5ce06d75f16b09f47d2f9ed1181181045b4b41b8bdbe9
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
Filesize
1009B
MD589e95f3fcf0f95a03095de12c5e051e1
SHA11dad6e86a48e5178b15c59bb2c8169b4812ea66d
SHA256789f6ec2aa0e61a699e2d07afbd8a34a338ee88d406e17603c7a2fe9a8041032
SHA51216aed0e67f5edabce693c723665e8160806067fb6cf57ae1571c5195ca7a6f8b681ef76b597d727f52e5ce06d75f16b09f47d2f9ed1181181045b4b41b8bdbe9
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
Filesize
1009B
MD589e95f3fcf0f95a03095de12c5e051e1
SHA11dad6e86a48e5178b15c59bb2c8169b4812ea66d
SHA256789f6ec2aa0e61a699e2d07afbd8a34a338ee88d406e17603c7a2fe9a8041032
SHA51216aed0e67f5edabce693c723665e8160806067fb6cf57ae1571c5195ca7a6f8b681ef76b597d727f52e5ce06d75f16b09f47d2f9ed1181181045b4b41b8bdbe9
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1014B
MD5903c364ef9801bf7167d896ad64b100e
SHA1689766a4ceeb51690e8db1e8e0d3c6c7b8004c10
SHA256c2baf1dddd44b74bc983cc9667e1187791b6aaf0c6b2dd95e285d5c8af6e0bc3
SHA512edde4957d0ac1f40584ca1ad219a0325812892154180fd06dbb82a17f25bc7df679ecbab7b9ab123cb4b289ae53059832cbbbf32569f8aa2e036e3f63dae33eb
-
Filesize
1009B
MD589e95f3fcf0f95a03095de12c5e051e1
SHA11dad6e86a48e5178b15c59bb2c8169b4812ea66d
SHA256789f6ec2aa0e61a699e2d07afbd8a34a338ee88d406e17603c7a2fe9a8041032
SHA51216aed0e67f5edabce693c723665e8160806067fb6cf57ae1571c5195ca7a6f8b681ef76b597d727f52e5ce06d75f16b09f47d2f9ed1181181045b4b41b8bdbe9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
915KB
MD5303c86d5e26a663bdb09481f93be2e90
SHA1b269a394afcf82a26150a8e16daa933176c1d3b2
SHA2561f13ccb643426fc2b63d2b8492ffd29eb86eb5de53ce3a7f598823fb5311263f
SHA5127c239f299d29ecd4015e8b53da93188dc814d135597e49b81178ac3da7be1faed8cf2eef41d3eb8b6bbd8f06e6e09fd49b3e0346f1bd3a5c5acca1703b6de955
-
Filesize
909KB
MD5ec66a21d2b1035b5faec4b4f6ab4e1bc
SHA13b716747ee3c7e89113b5ad912fdc585adc6eaec
SHA2566e173092867146eaefd6f99ba599f7d2bd2809f34977e7d83c88bb46a977c70e
SHA5128d553c4cf36e88561a21f6c4a2df58587e9f2583186851b018e0e27a356fa0bebaf7292f598031aba75e5b7b584377afcd6cdfd4e384d4a8a7519ac9fd577f28
-
Filesize
1.1MB
MD5110281413953d3f0417e6444b0004644
SHA1236630dbc2635dbcb704a78278892948ea224c5d
SHA256046d38d00b4703467e142264a3b66bea51ed16ca07da98ccf410e90ddd6e95c2
SHA512a8abd219c73f8742cff7ea7b3ac73bc7276c9040c2f6ba6d868029129fd95c04c5346534bd6a83f0dd32d7ee6b81b45c702958914557cffc87a355648de84f84
-
Filesize
1.1MB
MD5110281413953d3f0417e6444b0004644
SHA1236630dbc2635dbcb704a78278892948ea224c5d
SHA256046d38d00b4703467e142264a3b66bea51ed16ca07da98ccf410e90ddd6e95c2
SHA512a8abd219c73f8742cff7ea7b3ac73bc7276c9040c2f6ba6d868029129fd95c04c5346534bd6a83f0dd32d7ee6b81b45c702958914557cffc87a355648de84f84
-
Filesize
1.1MB
MD5110281413953d3f0417e6444b0004644
SHA1236630dbc2635dbcb704a78278892948ea224c5d
SHA256046d38d00b4703467e142264a3b66bea51ed16ca07da98ccf410e90ddd6e95c2
SHA512a8abd219c73f8742cff7ea7b3ac73bc7276c9040c2f6ba6d868029129fd95c04c5346534bd6a83f0dd32d7ee6b81b45c702958914557cffc87a355648de84f84
-
Filesize
2.1MB
MD53cd3653500f1ed1e3e9c5042c86e473d
SHA1f2ede83868bb50ee9494c9d5da807f79e084542f
SHA25605eb5d5bcd4c6af5626eb67b20323c8cc179ccf26a00670b352494b50e19f1a7
SHA5127fa04ab572991bf53e1949a5cd871d0b898040b5ba80cd5dd2c6e2ed0d608a1709918bd2430e4c90113288628ed72c94a236177785a0580ff6dbd6b28f643c6d