Analysis
-
max time kernel
227s -
max time network
243s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:06
Behavioral task
behavioral1
Sample
2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe
Resource
win10v2004-20221111-en
General
-
Target
2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe
-
Size
255KB
-
MD5
72eb5945bda4d97f6d24459274c9df40
-
SHA1
bdab67f20e8a28fe9218f9da5412ff4495e7983d
-
SHA256
2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec
-
SHA512
48f0c7acafd8f52d2c276f521a733af3b01d0f0a1c8a228728ec9096d1f5f6198bed95c3ddfe9d404a2782915b8d47c0186220282e229c7e90a3cf95f4027c2f
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJb:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIq
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
oamxlqfkyw.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" oamxlqfkyw.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
oamxlqfkyw.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" oamxlqfkyw.exe -
Processes:
oamxlqfkyw.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" oamxlqfkyw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" oamxlqfkyw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" oamxlqfkyw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" oamxlqfkyw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" oamxlqfkyw.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
oamxlqfkyw.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" oamxlqfkyw.exe -
Executes dropped EXE 5 IoCs
Processes:
oamxlqfkyw.exeggvnyevobmocrmm.exelfireosa.exemtabpmafctfms.exelfireosa.exepid process 2360 oamxlqfkyw.exe 1180 ggvnyevobmocrmm.exe 2696 lfireosa.exe 1812 mtabpmafctfms.exe 2108 lfireosa.exe -
Processes:
resource yara_rule behavioral2/memory/1556-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\oamxlqfkyw.exe upx C:\Windows\SysWOW64\oamxlqfkyw.exe upx C:\Windows\SysWOW64\ggvnyevobmocrmm.exe upx C:\Windows\SysWOW64\ggvnyevobmocrmm.exe upx C:\Windows\SysWOW64\lfireosa.exe upx C:\Windows\SysWOW64\lfireosa.exe upx C:\Windows\SysWOW64\mtabpmafctfms.exe upx C:\Windows\SysWOW64\mtabpmafctfms.exe upx behavioral2/memory/2360-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1180-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2696-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1812-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\lfireosa.exe upx behavioral2/memory/1556-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2108-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2360-154-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1180-155-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2696-156-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1812-157-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2108-158-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe -
Processes:
oamxlqfkyw.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" oamxlqfkyw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" oamxlqfkyw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" oamxlqfkyw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" oamxlqfkyw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" oamxlqfkyw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" oamxlqfkyw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ggvnyevobmocrmm.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xzqmxgrl = "ggvnyevobmocrmm.exe" ggvnyevobmocrmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "mtabpmafctfms.exe" ggvnyevobmocrmm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ggvnyevobmocrmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mjgkoqyf = "oamxlqfkyw.exe" ggvnyevobmocrmm.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
lfireosa.exeoamxlqfkyw.exelfireosa.exedescription ioc process File opened (read-only) \??\g: lfireosa.exe File opened (read-only) \??\m: lfireosa.exe File opened (read-only) \??\w: lfireosa.exe File opened (read-only) \??\h: oamxlqfkyw.exe File opened (read-only) \??\p: lfireosa.exe File opened (read-only) \??\z: lfireosa.exe File opened (read-only) \??\b: oamxlqfkyw.exe File opened (read-only) \??\q: lfireosa.exe File opened (read-only) \??\h: lfireosa.exe File opened (read-only) \??\x: lfireosa.exe File opened (read-only) \??\s: oamxlqfkyw.exe File opened (read-only) \??\u: oamxlqfkyw.exe File opened (read-only) \??\v: lfireosa.exe File opened (read-only) \??\l: lfireosa.exe File opened (read-only) \??\y: lfireosa.exe File opened (read-only) \??\o: oamxlqfkyw.exe File opened (read-only) \??\t: oamxlqfkyw.exe File opened (read-only) \??\v: lfireosa.exe File opened (read-only) \??\a: lfireosa.exe File opened (read-only) \??\o: lfireosa.exe File opened (read-only) \??\p: lfireosa.exe File opened (read-only) \??\w: oamxlqfkyw.exe File opened (read-only) \??\k: lfireosa.exe File opened (read-only) \??\w: lfireosa.exe File opened (read-only) \??\y: lfireosa.exe File opened (read-only) \??\n: oamxlqfkyw.exe File opened (read-only) \??\i: lfireosa.exe File opened (read-only) \??\s: lfireosa.exe File opened (read-only) \??\i: lfireosa.exe File opened (read-only) \??\q: lfireosa.exe File opened (read-only) \??\m: oamxlqfkyw.exe File opened (read-only) \??\v: oamxlqfkyw.exe File opened (read-only) \??\a: lfireosa.exe File opened (read-only) \??\o: lfireosa.exe File opened (read-only) \??\t: lfireosa.exe File opened (read-only) \??\e: oamxlqfkyw.exe File opened (read-only) \??\j: lfireosa.exe File opened (read-only) \??\m: lfireosa.exe File opened (read-only) \??\i: oamxlqfkyw.exe File opened (read-only) \??\j: oamxlqfkyw.exe File opened (read-only) \??\y: oamxlqfkyw.exe File opened (read-only) \??\f: lfireosa.exe File opened (read-only) \??\k: lfireosa.exe File opened (read-only) \??\p: oamxlqfkyw.exe File opened (read-only) \??\r: oamxlqfkyw.exe File opened (read-only) \??\e: lfireosa.exe File opened (read-only) \??\g: lfireosa.exe File opened (read-only) \??\n: lfireosa.exe File opened (read-only) \??\r: lfireosa.exe File opened (read-only) \??\e: lfireosa.exe File opened (read-only) \??\a: oamxlqfkyw.exe File opened (read-only) \??\q: oamxlqfkyw.exe File opened (read-only) \??\z: oamxlqfkyw.exe File opened (read-only) \??\t: lfireosa.exe File opened (read-only) \??\x: lfireosa.exe File opened (read-only) \??\h: lfireosa.exe File opened (read-only) \??\z: lfireosa.exe File opened (read-only) \??\f: oamxlqfkyw.exe File opened (read-only) \??\l: oamxlqfkyw.exe File opened (read-only) \??\x: oamxlqfkyw.exe File opened (read-only) \??\b: lfireosa.exe File opened (read-only) \??\f: lfireosa.exe File opened (read-only) \??\j: lfireosa.exe File opened (read-only) \??\u: lfireosa.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
oamxlqfkyw.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" oamxlqfkyw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" oamxlqfkyw.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1556-132-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2360-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1180-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2696-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1812-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1556-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2108-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2360-154-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1180-155-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2696-156-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1812-157-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2108-158-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exeoamxlqfkyw.exedescription ioc process File created C:\Windows\SysWOW64\oamxlqfkyw.exe 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe File opened for modification C:\Windows\SysWOW64\oamxlqfkyw.exe 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe File created C:\Windows\SysWOW64\ggvnyevobmocrmm.exe 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe File created C:\Windows\SysWOW64\lfireosa.exe 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe File opened for modification C:\Windows\SysWOW64\ggvnyevobmocrmm.exe 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe File opened for modification C:\Windows\SysWOW64\lfireosa.exe 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe File created C:\Windows\SysWOW64\mtabpmafctfms.exe 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe File opened for modification C:\Windows\SysWOW64\mtabpmafctfms.exe 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll oamxlqfkyw.exe -
Drops file in Program Files directory 14 IoCs
Processes:
lfireosa.exelfireosa.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lfireosa.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lfireosa.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lfireosa.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lfireosa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal lfireosa.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lfireosa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lfireosa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal lfireosa.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lfireosa.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lfireosa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal lfireosa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lfireosa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal lfireosa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lfireosa.exe -
Drops file in Windows directory 3 IoCs
Processes:
2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
SearchApp.exeWINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe -
Modifies registry class 53 IoCs
Processes:
SearchApp.exe2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exeoamxlqfkyw.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "162" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2214" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "6683" SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1948C77B14E3DAB6B9CC7CE3ECE734BE" 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat oamxlqfkyw.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "19601" SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" oamxlqfkyw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf oamxlqfkyw.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC7B12C47E7389953CBBADD33EFD7BC" 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs oamxlqfkyw.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "129" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "6683" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33372C799C2482576A3077D170202CAE7C8765DE" 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "129" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2214" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1156" SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" oamxlqfkyw.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "162" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AC9FACAFE6BF19784793B44819D39E5B08D02F94367033AE2CC42ED08A7" 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" oamxlqfkyw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg oamxlqfkyw.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1156" SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7FC6BC6FE1A21AAD27FD1D68B099117" 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" oamxlqfkyw.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "162" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "19601" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc oamxlqfkyw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFCFC83485885139047D72A7D94BD92E131584367416333D6EE" 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh oamxlqfkyw.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "129" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2214" SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" oamxlqfkyw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" oamxlqfkyw.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1156" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "19601" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "6683" SearchApp.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 808 WINWORD.EXE 808 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exeoamxlqfkyw.exeggvnyevobmocrmm.exelfireosa.exemtabpmafctfms.exepid process 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 2360 oamxlqfkyw.exe 2360 oamxlqfkyw.exe 2360 oamxlqfkyw.exe 2360 oamxlqfkyw.exe 2360 oamxlqfkyw.exe 2360 oamxlqfkyw.exe 2360 oamxlqfkyw.exe 2360 oamxlqfkyw.exe 2360 oamxlqfkyw.exe 2360 oamxlqfkyw.exe 1180 ggvnyevobmocrmm.exe 1180 ggvnyevobmocrmm.exe 1180 ggvnyevobmocrmm.exe 1180 ggvnyevobmocrmm.exe 1180 ggvnyevobmocrmm.exe 1180 ggvnyevobmocrmm.exe 1180 ggvnyevobmocrmm.exe 1180 ggvnyevobmocrmm.exe 1180 ggvnyevobmocrmm.exe 1180 ggvnyevobmocrmm.exe 2696 lfireosa.exe 2696 lfireosa.exe 2696 lfireosa.exe 2696 lfireosa.exe 2696 lfireosa.exe 2696 lfireosa.exe 2696 lfireosa.exe 2696 lfireosa.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1180 ggvnyevobmocrmm.exe 1180 ggvnyevobmocrmm.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1180 ggvnyevobmocrmm.exe 1180 ggvnyevobmocrmm.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exeoamxlqfkyw.exeggvnyevobmocrmm.exelfireosa.exemtabpmafctfms.exelfireosa.exepid process 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 2360 oamxlqfkyw.exe 2360 oamxlqfkyw.exe 2360 oamxlqfkyw.exe 1180 ggvnyevobmocrmm.exe 1180 ggvnyevobmocrmm.exe 1180 ggvnyevobmocrmm.exe 2696 lfireosa.exe 2696 lfireosa.exe 2696 lfireosa.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 2108 lfireosa.exe 2108 lfireosa.exe 2108 lfireosa.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exeoamxlqfkyw.exeggvnyevobmocrmm.exelfireosa.exemtabpmafctfms.exelfireosa.exepid process 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe 2360 oamxlqfkyw.exe 2360 oamxlqfkyw.exe 2360 oamxlqfkyw.exe 1180 ggvnyevobmocrmm.exe 1180 ggvnyevobmocrmm.exe 1180 ggvnyevobmocrmm.exe 2696 lfireosa.exe 2696 lfireosa.exe 2696 lfireosa.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 1812 mtabpmafctfms.exe 2108 lfireosa.exe 2108 lfireosa.exe 2108 lfireosa.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXESearchApp.exepid process 808 WINWORD.EXE 808 WINWORD.EXE 808 WINWORD.EXE 808 WINWORD.EXE 808 WINWORD.EXE 808 WINWORD.EXE 808 WINWORD.EXE 2208 SearchApp.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exeoamxlqfkyw.exedescription pid process target process PID 1556 wrote to memory of 2360 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe oamxlqfkyw.exe PID 1556 wrote to memory of 2360 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe oamxlqfkyw.exe PID 1556 wrote to memory of 2360 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe oamxlqfkyw.exe PID 1556 wrote to memory of 1180 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe ggvnyevobmocrmm.exe PID 1556 wrote to memory of 1180 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe ggvnyevobmocrmm.exe PID 1556 wrote to memory of 1180 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe ggvnyevobmocrmm.exe PID 1556 wrote to memory of 2696 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe lfireosa.exe PID 1556 wrote to memory of 2696 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe lfireosa.exe PID 1556 wrote to memory of 2696 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe lfireosa.exe PID 1556 wrote to memory of 1812 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe mtabpmafctfms.exe PID 1556 wrote to memory of 1812 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe mtabpmafctfms.exe PID 1556 wrote to memory of 1812 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe mtabpmafctfms.exe PID 2360 wrote to memory of 2108 2360 oamxlqfkyw.exe lfireosa.exe PID 2360 wrote to memory of 2108 2360 oamxlqfkyw.exe lfireosa.exe PID 2360 wrote to memory of 2108 2360 oamxlqfkyw.exe lfireosa.exe PID 1556 wrote to memory of 808 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe WINWORD.EXE PID 1556 wrote to memory of 808 1556 2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe"C:\Users\Admin\AppData\Local\Temp\2194386471f859a5180bad7a31a490ef0ccfb673da1446ffa78766823e7b33ec.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\oamxlqfkyw.exeoamxlqfkyw.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\lfireosa.exeC:\Windows\system32\lfireosa.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2108
-
-
-
C:\Windows\SysWOW64\ggvnyevobmocrmm.exeggvnyevobmocrmm.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1180
-
-
C:\Windows\SysWOW64\lfireosa.exelfireosa.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2696
-
-
C:\Windows\SysWOW64\mtabpmafctfms.exemtabpmafctfms.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1812
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:808
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2208
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5d74d78b143e4aa07e477cfc391a837d8
SHA108624c85e8e7e545fc9eb3c63af4992adf2e4903
SHA256a82b403bd12283595d05bb8ce2aceba6c2a81f1cdf738928e3970939aa3649da
SHA51264c8ffd7737a3d442357f3e23ef8a3dfe858aa806933f6c4fa8afa250b21819896f63a978cd9ae17ee65caf6a1273951f4cca542fb7288be6f524228b1d7720c
-
Filesize
255KB
MD5b92fd5f6968d921d36bb76d813583a66
SHA12ec3a9c6567110ad928a2cb950e4e0e04a64fba4
SHA2562bdab67b8570062c759b6fedc6796bba01cf478544eaaa129be99119a902a03d
SHA5123d232c8c1fe13b6437dfdbd89a7ad21ae95759cb1c2ed66dba39582f354490ebdc8c9692976898123acb6c5ea91080b6130aabe70206a6a9f764d18bfa77d45d
-
Filesize
255KB
MD577885496a97f71093ae31b95b75b15de
SHA1dc9dbcd43dd7e15d9406e850e664c1e6965d69f7
SHA256dc14f59f00cefc5abb6416ce4a988a272ffe26d6d09bb56e380808737300869a
SHA51253d67e377bec7b24a992c22de1353e94096c4295160838360386a336e4329346e9851da76210b38fd442460ecf139dd461d2377adafc614834adaea0cee68391
-
Filesize
255KB
MD577885496a97f71093ae31b95b75b15de
SHA1dc9dbcd43dd7e15d9406e850e664c1e6965d69f7
SHA256dc14f59f00cefc5abb6416ce4a988a272ffe26d6d09bb56e380808737300869a
SHA51253d67e377bec7b24a992c22de1353e94096c4295160838360386a336e4329346e9851da76210b38fd442460ecf139dd461d2377adafc614834adaea0cee68391
-
Filesize
255KB
MD5b62da09d564f760531aa1378b2f2f4a4
SHA1f9089eeb61211974d5690f531e9b780c27eb40d4
SHA256d027085a732bb9122dfeebeedab3487d539a3555299d1b1890acff831c192f34
SHA5121072e2b817cdad1754cfe8e19f9908c44d5423a08ba829ebb46ad34a4712e9180ecf30e92af8b34c334017f82fd722df411003c92efda9709d13995b71969f02
-
Filesize
255KB
MD5b62da09d564f760531aa1378b2f2f4a4
SHA1f9089eeb61211974d5690f531e9b780c27eb40d4
SHA256d027085a732bb9122dfeebeedab3487d539a3555299d1b1890acff831c192f34
SHA5121072e2b817cdad1754cfe8e19f9908c44d5423a08ba829ebb46ad34a4712e9180ecf30e92af8b34c334017f82fd722df411003c92efda9709d13995b71969f02
-
Filesize
255KB
MD5b62da09d564f760531aa1378b2f2f4a4
SHA1f9089eeb61211974d5690f531e9b780c27eb40d4
SHA256d027085a732bb9122dfeebeedab3487d539a3555299d1b1890acff831c192f34
SHA5121072e2b817cdad1754cfe8e19f9908c44d5423a08ba829ebb46ad34a4712e9180ecf30e92af8b34c334017f82fd722df411003c92efda9709d13995b71969f02
-
Filesize
255KB
MD5385e9a9080a8e6fc6559afb95a914700
SHA1c5c5a65e7af1489246307bbf5e6efa34dc30360f
SHA256fa616a8d1c7b5dc702e3304a11c08646512def032dc70ba4a46c1a72ed227954
SHA51285c253e7c0cdf427f4cea8ea8657da13ae476163f8f7ab6453d73b2f94e708d3bf3a6cd3c7e51daddaaffede3a8b2c5268f76fcb39f9020f12ac71e7747a07fb
-
Filesize
255KB
MD5385e9a9080a8e6fc6559afb95a914700
SHA1c5c5a65e7af1489246307bbf5e6efa34dc30360f
SHA256fa616a8d1c7b5dc702e3304a11c08646512def032dc70ba4a46c1a72ed227954
SHA51285c253e7c0cdf427f4cea8ea8657da13ae476163f8f7ab6453d73b2f94e708d3bf3a6cd3c7e51daddaaffede3a8b2c5268f76fcb39f9020f12ac71e7747a07fb
-
Filesize
255KB
MD55eedada677d71388d52b5c3bea43be57
SHA1269df5f5bb1f036e5a85efbed900927b56fbf73c
SHA256db10b5b8afd7f42a1141dc5549c649f6f04549a46b9264f2b1cfc49ef4a7fa82
SHA5120c752df1ea3d7766d06e26e4dba56d4a05ee71d0a8f736af9545a65e7f0e836be1a887ed090559bd2d45832bfb3b0de7da0de44230a384c306e7959818c90235
-
Filesize
255KB
MD55eedada677d71388d52b5c3bea43be57
SHA1269df5f5bb1f036e5a85efbed900927b56fbf73c
SHA256db10b5b8afd7f42a1141dc5549c649f6f04549a46b9264f2b1cfc49ef4a7fa82
SHA5120c752df1ea3d7766d06e26e4dba56d4a05ee71d0a8f736af9545a65e7f0e836be1a887ed090559bd2d45832bfb3b0de7da0de44230a384c306e7959818c90235
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7