Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:22
Static task
static1
Behavioral task
behavioral1
Sample
1df76fffd85fdcb914424f68c21ec57b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1df76fffd85fdcb914424f68c21ec57b.exe
Resource
win10v2004-20231215-en
General
-
Target
1df76fffd85fdcb914424f68c21ec57b.exe
-
Size
512KB
-
MD5
1df76fffd85fdcb914424f68c21ec57b
-
SHA1
87553925233cf61720a67788d904fb1767d5b9e9
-
SHA256
cd40e055e2f92afa14102e1a13ef3b8be2f96e84786f914c3ce8e8a8322139ec
-
SHA512
d707f53247cd99bf5547e96592f8e3bf2e20fef913beb27f15dd4e4b98acff6c09bde74f8b846f1dfcf7d1b9b92cd0f79aa27314881c1416f5f75c58e251d487
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6z:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm56
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" fgscsplmqn.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fgscsplmqn.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" fgscsplmqn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" fgscsplmqn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" fgscsplmqn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" fgscsplmqn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" fgscsplmqn.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" fgscsplmqn.exe -
Executes dropped EXE 5 IoCs
pid Process 2664 fgscsplmqn.exe 2732 femxpmzfsnvcvkr.exe 2648 oivvzeez.exe 2968 elfchzwfyvxrj.exe 2696 oivvzeez.exe -
Loads dropped DLL 5 IoCs
pid Process 1916 1df76fffd85fdcb914424f68c21ec57b.exe 1916 1df76fffd85fdcb914424f68c21ec57b.exe 1916 1df76fffd85fdcb914424f68c21ec57b.exe 1916 1df76fffd85fdcb914424f68c21ec57b.exe 2664 fgscsplmqn.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" fgscsplmqn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" fgscsplmqn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" fgscsplmqn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" fgscsplmqn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" fgscsplmqn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" fgscsplmqn.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\imkiingk = "fgscsplmqn.exe" femxpmzfsnvcvkr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\prqirtza = "femxpmzfsnvcvkr.exe" femxpmzfsnvcvkr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "elfchzwfyvxrj.exe" femxpmzfsnvcvkr.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\y: oivvzeez.exe File opened (read-only) \??\b: fgscsplmqn.exe File opened (read-only) \??\y: oivvzeez.exe File opened (read-only) \??\e: oivvzeez.exe File opened (read-only) \??\k: oivvzeez.exe File opened (read-only) \??\o: fgscsplmqn.exe File opened (read-only) \??\s: fgscsplmqn.exe File opened (read-only) \??\k: oivvzeez.exe File opened (read-only) \??\l: oivvzeez.exe File opened (read-only) \??\m: oivvzeez.exe File opened (read-only) \??\s: oivvzeez.exe File opened (read-only) \??\l: oivvzeez.exe File opened (read-only) \??\g: fgscsplmqn.exe File opened (read-only) \??\e: fgscsplmqn.exe File opened (read-only) \??\r: fgscsplmqn.exe File opened (read-only) \??\b: oivvzeez.exe File opened (read-only) \??\o: oivvzeez.exe File opened (read-only) \??\t: oivvzeez.exe File opened (read-only) \??\w: oivvzeez.exe File opened (read-only) \??\q: oivvzeez.exe File opened (read-only) \??\x: oivvzeez.exe File opened (read-only) \??\w: oivvzeez.exe File opened (read-only) \??\p: oivvzeez.exe File opened (read-only) \??\u: fgscsplmqn.exe File opened (read-only) \??\q: fgscsplmqn.exe File opened (read-only) \??\i: oivvzeez.exe File opened (read-only) \??\e: oivvzeez.exe File opened (read-only) \??\l: fgscsplmqn.exe File opened (read-only) \??\t: fgscsplmqn.exe File opened (read-only) \??\j: oivvzeez.exe File opened (read-only) \??\m: oivvzeez.exe File opened (read-only) \??\r: oivvzeez.exe File opened (read-only) \??\z: oivvzeez.exe File opened (read-only) \??\a: oivvzeez.exe File opened (read-only) \??\i: oivvzeez.exe File opened (read-only) \??\z: fgscsplmqn.exe File opened (read-only) \??\a: oivvzeez.exe File opened (read-only) \??\g: oivvzeez.exe File opened (read-only) \??\q: oivvzeez.exe File opened (read-only) \??\s: oivvzeez.exe File opened (read-only) \??\x: oivvzeez.exe File opened (read-only) \??\p: fgscsplmqn.exe File opened (read-only) \??\n: oivvzeez.exe File opened (read-only) \??\t: oivvzeez.exe File opened (read-only) \??\v: oivvzeez.exe File opened (read-only) \??\v: oivvzeez.exe File opened (read-only) \??\z: oivvzeez.exe File opened (read-only) \??\w: fgscsplmqn.exe File opened (read-only) \??\u: oivvzeez.exe File opened (read-only) \??\h: oivvzeez.exe File opened (read-only) \??\o: oivvzeez.exe File opened (read-only) \??\v: fgscsplmqn.exe File opened (read-only) \??\n: fgscsplmqn.exe File opened (read-only) \??\g: oivvzeez.exe File opened (read-only) \??\a: fgscsplmqn.exe File opened (read-only) \??\m: fgscsplmqn.exe File opened (read-only) \??\x: fgscsplmqn.exe File opened (read-only) \??\j: fgscsplmqn.exe File opened (read-only) \??\k: fgscsplmqn.exe File opened (read-only) \??\u: oivvzeez.exe File opened (read-only) \??\h: oivvzeez.exe File opened (read-only) \??\p: oivvzeez.exe File opened (read-only) \??\b: oivvzeez.exe File opened (read-only) \??\r: oivvzeez.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" fgscsplmqn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" fgscsplmqn.exe -
AutoIT Executable 21 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1916-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x002e000000016d2d-9.dat autoit_exe behavioral1/files/0x0007000000012281-17.dat autoit_exe behavioral1/files/0x0007000000012281-20.dat autoit_exe behavioral1/files/0x000c000000016cac-29.dat autoit_exe behavioral1/files/0x002e000000016d2d-28.dat autoit_exe behavioral1/files/0x002e000000016d2d-32.dat autoit_exe behavioral1/files/0x0007000000016d6c-34.dat autoit_exe behavioral1/files/0x000c000000016cac-26.dat autoit_exe behavioral1/files/0x0007000000016d6c-38.dat autoit_exe behavioral1/files/0x0007000000012281-23.dat autoit_exe behavioral1/files/0x002e000000016d2d-40.dat autoit_exe behavioral1/files/0x0007000000016d6c-41.dat autoit_exe behavioral1/files/0x000c000000016cac-22.dat autoit_exe behavioral1/files/0x002e000000016d2d-43.dat autoit_exe behavioral1/files/0x002e000000016d2d-42.dat autoit_exe behavioral1/files/0x000500000001948f-75.dat autoit_exe behavioral1/files/0x000500000001948f-72.dat autoit_exe behavioral1/files/0x000500000001948c-70.dat autoit_exe behavioral1/files/0x0005000000019493-79.dat autoit_exe behavioral1/files/0x00050000000194a8-85.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\femxpmzfsnvcvkr.exe 1df76fffd85fdcb914424f68c21ec57b.exe File opened for modification C:\Windows\SysWOW64\femxpmzfsnvcvkr.exe 1df76fffd85fdcb914424f68c21ec57b.exe File created C:\Windows\SysWOW64\elfchzwfyvxrj.exe 1df76fffd85fdcb914424f68c21ec57b.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll fgscsplmqn.exe File created C:\Windows\SysWOW64\fgscsplmqn.exe 1df76fffd85fdcb914424f68c21ec57b.exe File created C:\Windows\SysWOW64\oivvzeez.exe 1df76fffd85fdcb914424f68c21ec57b.exe File opened for modification C:\Windows\SysWOW64\oivvzeez.exe 1df76fffd85fdcb914424f68c21ec57b.exe File opened for modification C:\Windows\SysWOW64\elfchzwfyvxrj.exe 1df76fffd85fdcb914424f68c21ec57b.exe File opened for modification C:\Windows\SysWOW64\fgscsplmqn.exe 1df76fffd85fdcb914424f68c21ec57b.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe oivvzeez.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe oivvzeez.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe oivvzeez.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe oivvzeez.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe oivvzeez.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe oivvzeez.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal oivvzeez.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal oivvzeez.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe oivvzeez.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal oivvzeez.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe oivvzeez.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe oivvzeez.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe oivvzeez.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe oivvzeez.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal oivvzeez.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 1df76fffd85fdcb914424f68c21ec57b.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs fgscsplmqn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" fgscsplmqn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33452C7F9D5183256D3F77D070532CAC7C8F64D7" 1df76fffd85fdcb914424f68c21ec57b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh fgscsplmqn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" fgscsplmqn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2536 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1916 1df76fffd85fdcb914424f68c21ec57b.exe 1916 1df76fffd85fdcb914424f68c21ec57b.exe 1916 1df76fffd85fdcb914424f68c21ec57b.exe 1916 1df76fffd85fdcb914424f68c21ec57b.exe 1916 1df76fffd85fdcb914424f68c21ec57b.exe 1916 1df76fffd85fdcb914424f68c21ec57b.exe 1916 1df76fffd85fdcb914424f68c21ec57b.exe 1916 1df76fffd85fdcb914424f68c21ec57b.exe 2664 fgscsplmqn.exe 2664 fgscsplmqn.exe 2664 fgscsplmqn.exe 2664 fgscsplmqn.exe 2664 fgscsplmqn.exe 2732 femxpmzfsnvcvkr.exe 2732 femxpmzfsnvcvkr.exe 2732 femxpmzfsnvcvkr.exe 2732 femxpmzfsnvcvkr.exe 2732 femxpmzfsnvcvkr.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2648 oivvzeez.exe 2648 oivvzeez.exe 2648 oivvzeez.exe 2648 oivvzeez.exe 2696 oivvzeez.exe 2696 oivvzeez.exe 2696 oivvzeez.exe 2696 oivvzeez.exe 2732 femxpmzfsnvcvkr.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2732 femxpmzfsnvcvkr.exe 2732 femxpmzfsnvcvkr.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2732 femxpmzfsnvcvkr.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2732 femxpmzfsnvcvkr.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2732 femxpmzfsnvcvkr.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2732 femxpmzfsnvcvkr.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2732 femxpmzfsnvcvkr.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2732 femxpmzfsnvcvkr.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2732 femxpmzfsnvcvkr.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2732 femxpmzfsnvcvkr.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2732 femxpmzfsnvcvkr.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1916 1df76fffd85fdcb914424f68c21ec57b.exe 1916 1df76fffd85fdcb914424f68c21ec57b.exe 1916 1df76fffd85fdcb914424f68c21ec57b.exe 2664 fgscsplmqn.exe 2664 fgscsplmqn.exe 2664 fgscsplmqn.exe 2732 femxpmzfsnvcvkr.exe 2732 femxpmzfsnvcvkr.exe 2732 femxpmzfsnvcvkr.exe 2648 oivvzeez.exe 2648 oivvzeez.exe 2648 oivvzeez.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2696 oivvzeez.exe 2696 oivvzeez.exe 2696 oivvzeez.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1916 1df76fffd85fdcb914424f68c21ec57b.exe 1916 1df76fffd85fdcb914424f68c21ec57b.exe 1916 1df76fffd85fdcb914424f68c21ec57b.exe 2664 fgscsplmqn.exe 2664 fgscsplmqn.exe 2664 fgscsplmqn.exe 2732 femxpmzfsnvcvkr.exe 2732 femxpmzfsnvcvkr.exe 2732 femxpmzfsnvcvkr.exe 2648 oivvzeez.exe 2648 oivvzeez.exe 2648 oivvzeez.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2968 elfchzwfyvxrj.exe 2696 oivvzeez.exe 2696 oivvzeez.exe 2696 oivvzeez.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2536 WINWORD.EXE 2536 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2664 1916 1df76fffd85fdcb914424f68c21ec57b.exe 28 PID 1916 wrote to memory of 2664 1916 1df76fffd85fdcb914424f68c21ec57b.exe 28 PID 1916 wrote to memory of 2664 1916 1df76fffd85fdcb914424f68c21ec57b.exe 28 PID 1916 wrote to memory of 2664 1916 1df76fffd85fdcb914424f68c21ec57b.exe 28 PID 1916 wrote to memory of 2732 1916 1df76fffd85fdcb914424f68c21ec57b.exe 29 PID 1916 wrote to memory of 2732 1916 1df76fffd85fdcb914424f68c21ec57b.exe 29 PID 1916 wrote to memory of 2732 1916 1df76fffd85fdcb914424f68c21ec57b.exe 29 PID 1916 wrote to memory of 2732 1916 1df76fffd85fdcb914424f68c21ec57b.exe 29 PID 1916 wrote to memory of 2648 1916 1df76fffd85fdcb914424f68c21ec57b.exe 31 PID 1916 wrote to memory of 2648 1916 1df76fffd85fdcb914424f68c21ec57b.exe 31 PID 1916 wrote to memory of 2648 1916 1df76fffd85fdcb914424f68c21ec57b.exe 31 PID 1916 wrote to memory of 2648 1916 1df76fffd85fdcb914424f68c21ec57b.exe 31 PID 1916 wrote to memory of 2968 1916 1df76fffd85fdcb914424f68c21ec57b.exe 30 PID 1916 wrote to memory of 2968 1916 1df76fffd85fdcb914424f68c21ec57b.exe 30 PID 1916 wrote to memory of 2968 1916 1df76fffd85fdcb914424f68c21ec57b.exe 30 PID 1916 wrote to memory of 2968 1916 1df76fffd85fdcb914424f68c21ec57b.exe 30 PID 2664 wrote to memory of 2696 2664 fgscsplmqn.exe 32 PID 2664 wrote to memory of 2696 2664 fgscsplmqn.exe 32 PID 2664 wrote to memory of 2696 2664 fgscsplmqn.exe 32 PID 2664 wrote to memory of 2696 2664 fgscsplmqn.exe 32 PID 1916 wrote to memory of 2536 1916 1df76fffd85fdcb914424f68c21ec57b.exe 33 PID 1916 wrote to memory of 2536 1916 1df76fffd85fdcb914424f68c21ec57b.exe 33 PID 1916 wrote to memory of 2536 1916 1df76fffd85fdcb914424f68c21ec57b.exe 33 PID 1916 wrote to memory of 2536 1916 1df76fffd85fdcb914424f68c21ec57b.exe 33 PID 2536 wrote to memory of 2936 2536 WINWORD.EXE 36 PID 2536 wrote to memory of 2936 2536 WINWORD.EXE 36 PID 2536 wrote to memory of 2936 2536 WINWORD.EXE 36 PID 2536 wrote to memory of 2936 2536 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\1df76fffd85fdcb914424f68c21ec57b.exe"C:\Users\Admin\AppData\Local\Temp\1df76fffd85fdcb914424f68c21ec57b.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\fgscsplmqn.exefgscsplmqn.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\oivvzeez.exeC:\Windows\system32\oivvzeez.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2696
-
-
-
C:\Windows\SysWOW64\femxpmzfsnvcvkr.exefemxpmzfsnvcvkr.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2732
-
-
C:\Windows\SysWOW64\elfchzwfyvxrj.exeelfchzwfyvxrj.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2968
-
-
C:\Windows\SysWOW64\oivvzeez.exeoivvzeez.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2648
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2936
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD52b6f3e2b69c7fa9ebbebf31846bf2ff0
SHA163a987196733314abd2330ad81e0bbf145ec77b5
SHA2569d861bff24fb7dec1586d7c555bcfbe2b6b68e596a284ee57b86bc514e1116a4
SHA5127cfe3db660813fa499f2b21bdd5dbfe6afa52e9e198858a790cc77131789a1fe69130447424abae90bcdffea8893957605430498ef233d6df8a378b5a87d77ca
-
Filesize
257KB
MD5b0d01235bc73a093602eff00195098d3
SHA1ed1ed6463006ca96ce6a696776d535f24f1a4537
SHA2561ab4ec56df02bf23e6106deba26c0782a6cd214f776d5d265733c5669159cbbc
SHA51270ec3346aafc8ce6bc3063776752387a5d8453f4252c73a231cbeb6b37a6c85939ce6c11a2625717d2dbddfbccaa0904e3791254ce5d34b42effa57f10841f6a
-
Filesize
383KB
MD52d6a77962cbbc48396ea104fceffa68f
SHA1a82955732798a857dcacece48087331e1a23e4fd
SHA25693463db2063dabcf4419edbb7fb2bd55688ed4b7a3442e06d971a2b471672243
SHA5123454c787f237ae5291a3a0735225e6d2dc703d87f4ea317e0ce43d9e7ab9be120ac50ad5c2d7b2c41a723cf7357d09e777ab183ea2e08855bb4cc6527235c960
-
Filesize
512KB
MD555a0e51cb8598c0430fc283e17e818fb
SHA15a3a062fcce8cf3bafc56308e9f9f287adf050e8
SHA25631758649ffa0d9fe7a4b214cc29680dbe51ae33f96fcad00b6048944c65f8066
SHA51265fcc2219ab029251778560e4d051849d075a0988b8f95fa198d055aeeccdda69d44cdc7c91e9a4d7dafb299af9e2a1430922c89531fc0ed6e6bb01fb06c9ecf
-
Filesize
20KB
MD5bba4d84b452b8f9838269bb171e292e0
SHA1648d429d66c8d4d4c1ce47e831f882946f6ff03f
SHA256f7926f1fc54f83c1041aa6cf0f24dfc140040e14284d5767967d873f4c82554d
SHA512fe1dcc151b7bea85e5cf02e9ed174ebac079f47a4cb7727873e139be6839fe85e8560c73ee7c819f55b3c8f224f843e189a7e30f8b80fe7ff85a8237feee4272
-
Filesize
512KB
MD57fe5e693953b63c4bd8987bdd21c22bf
SHA11d76fbeab3498bc5935362856b7058b5a31787b2
SHA256f59c7c7909baa76929b242aee0088e03a038da6ceae8c650f7317c38552557af
SHA512d0e2a14b6fda23178b1c0b62386701a5bad9bd35373474d671ab1dec354e1760753d4d6059ff6d6927c1782677c0316b2d126a9a8cd9878d133cd7a412bce0b7
-
Filesize
126KB
MD535b31added9b50ee8dac8edbb88f3200
SHA13a360a9b4d6843fb4a1cec8a73a8540b3f0d1555
SHA2566df18dfb1f1cb6a0af3e7e54058435e86ffc41ce6041ff0761932c469f380279
SHA512dde2ffb0f20fe82b81548fb22aff06c16f2b99e3120da10835a6d34f45f8f0d06222517ec8a2b9d40668dccbb4a26f75b7f70649965744c0f5410997b5c44dc5
-
Filesize
124KB
MD5657539f5624fb4a225986907b2de9a03
SHA1b2c34697aaeb9075060015d66de8e893605ddce3
SHA2563c6211a8c0cfba039d4fde3df09d3cdf86cc76d2ffb56434cb928159aa67f24e
SHA5126087a5bcdfbc54cbaf3745d02289f76f5b18df1746981d341a284ce4948fe297618ed165349189241b142f78cae14c7cbe003bac05cc2736239d3ee68b1ff6fe
-
Filesize
223KB
MD58fc354eb0a4e72f42bc89e2588c7ea65
SHA1b0670e696c723ff8aced95f22408f137847264ca
SHA256700b79437aa46f2396bb07929bb5c79867307bd76311a2b949313bfaeb5c5522
SHA5125e3e567bdf43ee167386e40eb432e16cc78ee0efd73454b0343ce1dcf3262c6065e5c9a5b46c28972bccfa675d8ca02e5a5775cb4137389bb3d1e8c0e8984e1f
-
Filesize
138KB
MD5324240ba0a7f497ef3889c7ea350568d
SHA174b3b1f8e22c3279bae72dc6ed790263a59c11e6
SHA25660038c5a0cbeeae6b2b4dd9c38f29c1a1ce8773795bda91d39fe298f18960af5
SHA512e50b5487e05e43f39a211a3be2b3fde73fcbd5cb634dd6d2e4522a622a069c85b0636592b664fd534bcbad4e1b2a5c713ef95d1c8e3f98f7008e8fe52ee70924
-
Filesize
310KB
MD5e36c8218b483250c45965d5e32656bf9
SHA1b656db25adc701a8ebf38576e4391cf4abc6d502
SHA2567eed2b8e6344e276765a5841787f45fa8dc5d05596f1c2730f72359ba174284b
SHA512f3768d3377ab05f9e9f8c953ddb9e7f6f70ff17529395cad834e4a0ddcd0967a0ff545701b09b8c818133529c7f2d5d83fcee59fe6b7972fdffca348938a7ea6
-
Filesize
63KB
MD580a2853427f1b4177d31b87a9b80323c
SHA1f0fe55b0a8d8a67de5da4f7e94ea8b1c96324892
SHA2563fe9410d5c07963487d28bd0f2f10a8a4f835748b95bc8805a420bcc60671898
SHA51232197864c3d97118b6576b092e9df0623b4d7be8b56cc5db9d2d69626db5e2567fe994b5e34bd3da8987e8cee53a2a1dd5fdcb9a830df323e8da1127a32d6395
-
Filesize
91KB
MD5d92040455a1eb24d358dfe856dd9e6c6
SHA129f39c54c2edc3f5282eebb01243f12caab19aee
SHA2565430a89c0fd7eee41b1ab06eda5853d608cdc6892dc107d42a6ebd6a2634ed19
SHA5127d6ffe69b8549e7f036af7796d4d12f4e1ee4479821bb383cf4e28ae3fd12ec20deda26774107368e3da5e6337a841cf6657a8e52193f7cf64fcbd16ba9db143
-
Filesize
62KB
MD5c276525ed52873b280090c7abc7d1e6a
SHA1e98bbb358b24bfe52a6f0dee840d0e5fd5d7c97e
SHA256295036ef0c46cae4c1a0217dd648b9a4e594ad2c7c2f708f891301b9faf7c11e
SHA5127c3f5d2cc039d8ba6e321b4db4f8faf6d3fd8c1985c0697ea1dfa3d952709b245fd1b1e016106f836b40e4614b10751a3b8cf8a9e9b346a59f762344daf09059
-
Filesize
52KB
MD51f53731c1b44fabd21cbce723e050b38
SHA108c9422cdf687ece7fa01e4b12de8db4ee113708
SHA2565f66fa3de0809854101bfce515f8016e2da9461b69729e4dce0e3a035d9c0940
SHA51285f1becfdf13b815faf29559c64932490e4d417b1e9ed5662430d5dfd9df38fd5c74f3d53a29f84affdb945fe1a0e77fec589ec4188ebf6272ed90b6fc0ace94
-
Filesize
512KB
MD5a3e2ce2c27b93947c65aa341c3104d0a
SHA157a66a3d73e842e6e5be38ef4936e8b7aff83ed6
SHA256ba329826f07a8b464be6065841edbde257871caf58a66ec62ad68f1d4c5e2065
SHA512124f6a765e61ed127307836dabd19027f7283704e74f74ed53202132b38c682e6f789c5f21cca3e9dd735ffa0c8169a09e8a66d4d322b37a02e6cedc4b5532b6
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
88KB
MD5cdd385a346b83a0e9d6342950521995b
SHA1ebc6d27c127c8165926e55db37bc9f7693d66994
SHA256a7e5ca20bf881e06886f1ae50c17e587af661f244f8463dfdd55e5a2f552c0d7
SHA5120fe77107765d4992157d850cfb5a4571bbd203efb9d37ce55c057b80bc567f68203eb08fe1de0d54b46c10eb59c66c95b5c759bdf027518c1ef6a5872c8b1170
-
Filesize
208KB
MD5f32d60442b0fe0372df847f2a1ad5f38
SHA14f70898332ab62f1f5bb4a50d855247d8e8722bf
SHA256e1b2dbb6c010996003191ff5fa1430f86d3733961656d98cb79174901d7a9f69
SHA5125bd0c19db7d6770ebb8f555866fde14e4f8041d805236fbbe2acc1a798f1f9eeed78366c1d16131715527574cb8aea3dac67e25c331cb87adf7a570b3c46bd7e
-
Filesize
388KB
MD521ac2f4862e8fec7c7499cca9240bf00
SHA11dc387dc173eb9134337afad3c389588bea829cf
SHA256c0bd54fd32a22c08bf24d4fed2fb42a01aed30cd19f54f7887f7b5a2c8a2b41d
SHA512a2506278dc98c6920fc7085825dbd625f1a92de61cd55f77f699ef291ac3155b2c848d82df093ca2447f9a569f96c81bb16acae61a25c41996fbe7b66324f1c7
-
Filesize
120KB
MD5f7594e8d0cebcb7a405a32ce50662bbd
SHA1ae6fbf867a690033d991974c46413f0aa9376a0b
SHA256c86140b76b30a07f3e5096e2b33224f11324e7a26e3c84a9a30db8d219abb969
SHA5121e9198ad325bf1d76f23b467ed86c32989cc85fe8aa5cccc0fcefc6fb507432c08acbd9760cffe7037b066dd5ec626278fcd6c7eceffe917e685f934915629d1
-
Filesize
80KB
MD537a0a2dacf7281e62ef667a6ac02989e
SHA12249a6a9ec28e604ed4f93905869e6a9d5cf223b
SHA256dc5de236740642eea82d09f1061646fe0e1e2bec9ff5caaebecc77d8706a6a65
SHA51266678483220de9a753c48187d69c9664cf07d5a80642b583837ba31b916c8696b569b2fc27f966d836de56479fc8747cf1e696d58b26356c4e2744657db763af