Analysis
-
max time kernel
151s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 08:40
Static task
static1
Behavioral task
behavioral1
Sample
60811591e15d76d3d895758c5062f617.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
60811591e15d76d3d895758c5062f617.exe
Resource
win10v2004-20231215-en
General
-
Target
60811591e15d76d3d895758c5062f617.exe
-
Size
512KB
-
MD5
60811591e15d76d3d895758c5062f617
-
SHA1
6c238fed8fdafc5f07d66c6870c33cd0a929549f
-
SHA256
7e21541558b3b2dfda2382f0ff111f7364361e3dac62e823440fd4198daff50c
-
SHA512
70a6dbf1409c95c56617a0e352e52483ac485374bfae668ce3e8b278820647cb4b3a118720ffc272c1d73859df1dc203827e6846cf00f688d4323d7fe2b97f2a
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6f:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5u
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ogyidotamf.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ogyidotamf.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ogyidotamf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ogyidotamf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ogyidotamf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ogyidotamf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ogyidotamf.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ogyidotamf.exe -
Modifies Installed Components in the registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 5 IoCs
pid Process 2792 ogyidotamf.exe 2864 mgfjarrmsxafvpa.exe 2872 ccmnuhmu.exe 2740 oqppscbavjnnh.exe 1636 ccmnuhmu.exe -
Loads dropped DLL 5 IoCs
pid Process 1724 60811591e15d76d3d895758c5062f617.exe 1724 60811591e15d76d3d895758c5062f617.exe 1724 60811591e15d76d3d895758c5062f617.exe 1724 60811591e15d76d3d895758c5062f617.exe 2792 ogyidotamf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ogyidotamf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ogyidotamf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ogyidotamf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ogyidotamf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ogyidotamf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ogyidotamf.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\bzgiozxm = "ogyidotamf.exe" mgfjarrmsxafvpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cpfnxoom = "mgfjarrmsxafvpa.exe" mgfjarrmsxafvpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "oqppscbavjnnh.exe" mgfjarrmsxafvpa.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\n: ccmnuhmu.exe File opened (read-only) \??\t: ccmnuhmu.exe File opened (read-only) \??\j: ccmnuhmu.exe File opened (read-only) \??\j: ogyidotamf.exe File opened (read-only) \??\v: ogyidotamf.exe File opened (read-only) \??\u: ccmnuhmu.exe File opened (read-only) \??\y: ccmnuhmu.exe File opened (read-only) \??\t: ccmnuhmu.exe File opened (read-only) \??\w: ogyidotamf.exe File opened (read-only) \??\b: ccmnuhmu.exe File opened (read-only) \??\o: ogyidotamf.exe File opened (read-only) \??\x: ogyidotamf.exe File opened (read-only) \??\y: ogyidotamf.exe File opened (read-only) \??\k: ccmnuhmu.exe File opened (read-only) \??\x: ccmnuhmu.exe File opened (read-only) \??\a: ccmnuhmu.exe File opened (read-only) \??\e: ccmnuhmu.exe File opened (read-only) \??\z: ccmnuhmu.exe File opened (read-only) \??\m: ogyidotamf.exe File opened (read-only) \??\u: ogyidotamf.exe File opened (read-only) \??\b: ogyidotamf.exe File opened (read-only) \??\p: ccmnuhmu.exe File opened (read-only) \??\s: ccmnuhmu.exe File opened (read-only) \??\p: ccmnuhmu.exe File opened (read-only) \??\v: ccmnuhmu.exe File opened (read-only) \??\x: ccmnuhmu.exe File opened (read-only) \??\k: ccmnuhmu.exe File opened (read-only) \??\z: ogyidotamf.exe File opened (read-only) \??\i: ccmnuhmu.exe File opened (read-only) \??\k: ogyidotamf.exe File opened (read-only) \??\q: ogyidotamf.exe File opened (read-only) \??\m: ccmnuhmu.exe File opened (read-only) \??\a: ogyidotamf.exe File opened (read-only) \??\e: ogyidotamf.exe File opened (read-only) \??\g: ogyidotamf.exe File opened (read-only) \??\j: ccmnuhmu.exe File opened (read-only) \??\g: ccmnuhmu.exe File opened (read-only) \??\l: ccmnuhmu.exe File opened (read-only) \??\r: ccmnuhmu.exe File opened (read-only) \??\u: ccmnuhmu.exe File opened (read-only) \??\w: ccmnuhmu.exe File opened (read-only) \??\i: ogyidotamf.exe File opened (read-only) \??\n: ogyidotamf.exe File opened (read-only) \??\r: ogyidotamf.exe File opened (read-only) \??\m: ccmnuhmu.exe File opened (read-only) \??\o: ccmnuhmu.exe File opened (read-only) \??\i: ccmnuhmu.exe File opened (read-only) \??\o: ccmnuhmu.exe File opened (read-only) \??\y: ccmnuhmu.exe File opened (read-only) \??\q: ccmnuhmu.exe File opened (read-only) \??\v: ccmnuhmu.exe File opened (read-only) \??\z: ccmnuhmu.exe File opened (read-only) \??\s: ccmnuhmu.exe File opened (read-only) \??\l: ogyidotamf.exe File opened (read-only) \??\h: ccmnuhmu.exe File opened (read-only) \??\t: ogyidotamf.exe File opened (read-only) \??\g: ccmnuhmu.exe File opened (read-only) \??\l: ccmnuhmu.exe File opened (read-only) \??\r: ccmnuhmu.exe File opened (read-only) \??\b: ccmnuhmu.exe File opened (read-only) \??\h: ccmnuhmu.exe File opened (read-only) \??\q: ccmnuhmu.exe File opened (read-only) \??\p: ogyidotamf.exe File opened (read-only) \??\w: ccmnuhmu.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ogyidotamf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ogyidotamf.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1724-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x000b000000015c98-5.dat autoit_exe behavioral1/files/0x000b000000012731-17.dat autoit_exe behavioral1/files/0x000b000000015c98-21.dat autoit_exe behavioral1/files/0x000b000000015c98-25.dat autoit_exe behavioral1/files/0x000b000000015c98-34.dat autoit_exe behavioral1/files/0x0033000000016047-33.dat autoit_exe behavioral1/files/0x0007000000016577-35.dat autoit_exe behavioral1/files/0x0007000000016577-39.dat autoit_exe behavioral1/files/0x0033000000016047-27.dat autoit_exe behavioral1/files/0x0033000000016047-31.dat autoit_exe behavioral1/files/0x0006000000016fd5-73.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ogyidotamf.exe 60811591e15d76d3d895758c5062f617.exe File opened for modification C:\Windows\SysWOW64\mgfjarrmsxafvpa.exe 60811591e15d76d3d895758c5062f617.exe File opened for modification C:\Windows\SysWOW64\ccmnuhmu.exe 60811591e15d76d3d895758c5062f617.exe File created C:\Windows\SysWOW64\oqppscbavjnnh.exe 60811591e15d76d3d895758c5062f617.exe File opened for modification C:\Windows\SysWOW64\oqppscbavjnnh.exe 60811591e15d76d3d895758c5062f617.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ogyidotamf.exe File created C:\Windows\SysWOW64\ogyidotamf.exe 60811591e15d76d3d895758c5062f617.exe File created C:\Windows\SysWOW64\ccmnuhmu.exe 60811591e15d76d3d895758c5062f617.exe File created C:\Windows\SysWOW64\mgfjarrmsxafvpa.exe 60811591e15d76d3d895758c5062f617.exe -
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ccmnuhmu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ccmnuhmu.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ccmnuhmu.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ccmnuhmu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal ccmnuhmu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ccmnuhmu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal ccmnuhmu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ccmnuhmu.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ccmnuhmu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal ccmnuhmu.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ccmnuhmu.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 60811591e15d76d3d895758c5062f617.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat ogyidotamf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33372C7F9D2083566A4176A677222CDF7D8364DF" 60811591e15d76d3d895758c5062f617.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ogyidotamf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 60811591e15d76d3d895758c5062f617.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFEFCF94F5B826A9042D75D7D97BD97E634593667326330D79C" 60811591e15d76d3d895758c5062f617.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc ogyidotamf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ogyidotamf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2628 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1724 60811591e15d76d3d895758c5062f617.exe 1724 60811591e15d76d3d895758c5062f617.exe 1724 60811591e15d76d3d895758c5062f617.exe 1724 60811591e15d76d3d895758c5062f617.exe 1724 60811591e15d76d3d895758c5062f617.exe 1724 60811591e15d76d3d895758c5062f617.exe 1724 60811591e15d76d3d895758c5062f617.exe 1724 60811591e15d76d3d895758c5062f617.exe 2872 ccmnuhmu.exe 2872 ccmnuhmu.exe 2872 ccmnuhmu.exe 2872 ccmnuhmu.exe 2792 ogyidotamf.exe 2792 ogyidotamf.exe 2792 ogyidotamf.exe 2792 ogyidotamf.exe 2792 ogyidotamf.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2864 mgfjarrmsxafvpa.exe 2864 mgfjarrmsxafvpa.exe 2864 mgfjarrmsxafvpa.exe 2864 mgfjarrmsxafvpa.exe 2864 mgfjarrmsxafvpa.exe 1636 ccmnuhmu.exe 1636 ccmnuhmu.exe 1636 ccmnuhmu.exe 1636 ccmnuhmu.exe 2864 mgfjarrmsxafvpa.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2864 mgfjarrmsxafvpa.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2864 mgfjarrmsxafvpa.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2864 mgfjarrmsxafvpa.exe 2864 mgfjarrmsxafvpa.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2864 mgfjarrmsxafvpa.exe 2864 mgfjarrmsxafvpa.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2864 mgfjarrmsxafvpa.exe 2864 mgfjarrmsxafvpa.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2864 mgfjarrmsxafvpa.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2864 mgfjarrmsxafvpa.exe 2864 mgfjarrmsxafvpa.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 824 explorer.exe Token: SeShutdownPrivilege 824 explorer.exe Token: SeShutdownPrivilege 824 explorer.exe Token: SeShutdownPrivilege 824 explorer.exe Token: SeShutdownPrivilege 824 explorer.exe Token: SeShutdownPrivilege 824 explorer.exe Token: SeShutdownPrivilege 824 explorer.exe Token: SeShutdownPrivilege 824 explorer.exe Token: SeShutdownPrivilege 824 explorer.exe Token: SeShutdownPrivilege 824 explorer.exe Token: SeShutdownPrivilege 824 explorer.exe Token: SeShutdownPrivilege 824 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 2244 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1724 60811591e15d76d3d895758c5062f617.exe 1724 60811591e15d76d3d895758c5062f617.exe 1724 60811591e15d76d3d895758c5062f617.exe 2792 ogyidotamf.exe 2792 ogyidotamf.exe 2792 ogyidotamf.exe 2864 mgfjarrmsxafvpa.exe 2864 mgfjarrmsxafvpa.exe 2864 mgfjarrmsxafvpa.exe 2872 ccmnuhmu.exe 2872 ccmnuhmu.exe 2872 ccmnuhmu.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 1636 ccmnuhmu.exe 1636 ccmnuhmu.exe 1636 ccmnuhmu.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1724 60811591e15d76d3d895758c5062f617.exe 1724 60811591e15d76d3d895758c5062f617.exe 1724 60811591e15d76d3d895758c5062f617.exe 2792 ogyidotamf.exe 2792 ogyidotamf.exe 2792 ogyidotamf.exe 2864 mgfjarrmsxafvpa.exe 2864 mgfjarrmsxafvpa.exe 2864 mgfjarrmsxafvpa.exe 2872 ccmnuhmu.exe 2872 ccmnuhmu.exe 2872 ccmnuhmu.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 2740 oqppscbavjnnh.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 824 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 2244 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2628 WINWORD.EXE 2628 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2792 1724 60811591e15d76d3d895758c5062f617.exe 33 PID 1724 wrote to memory of 2792 1724 60811591e15d76d3d895758c5062f617.exe 33 PID 1724 wrote to memory of 2792 1724 60811591e15d76d3d895758c5062f617.exe 33 PID 1724 wrote to memory of 2792 1724 60811591e15d76d3d895758c5062f617.exe 33 PID 1724 wrote to memory of 2864 1724 60811591e15d76d3d895758c5062f617.exe 32 PID 1724 wrote to memory of 2864 1724 60811591e15d76d3d895758c5062f617.exe 32 PID 1724 wrote to memory of 2864 1724 60811591e15d76d3d895758c5062f617.exe 32 PID 1724 wrote to memory of 2864 1724 60811591e15d76d3d895758c5062f617.exe 32 PID 1724 wrote to memory of 2872 1724 60811591e15d76d3d895758c5062f617.exe 28 PID 1724 wrote to memory of 2872 1724 60811591e15d76d3d895758c5062f617.exe 28 PID 1724 wrote to memory of 2872 1724 60811591e15d76d3d895758c5062f617.exe 28 PID 1724 wrote to memory of 2872 1724 60811591e15d76d3d895758c5062f617.exe 28 PID 1724 wrote to memory of 2740 1724 60811591e15d76d3d895758c5062f617.exe 29 PID 1724 wrote to memory of 2740 1724 60811591e15d76d3d895758c5062f617.exe 29 PID 1724 wrote to memory of 2740 1724 60811591e15d76d3d895758c5062f617.exe 29 PID 1724 wrote to memory of 2740 1724 60811591e15d76d3d895758c5062f617.exe 29 PID 2792 wrote to memory of 1636 2792 ogyidotamf.exe 30 PID 2792 wrote to memory of 1636 2792 ogyidotamf.exe 30 PID 2792 wrote to memory of 1636 2792 ogyidotamf.exe 30 PID 2792 wrote to memory of 1636 2792 ogyidotamf.exe 30 PID 1724 wrote to memory of 2628 1724 60811591e15d76d3d895758c5062f617.exe 31 PID 1724 wrote to memory of 2628 1724 60811591e15d76d3d895758c5062f617.exe 31 PID 1724 wrote to memory of 2628 1724 60811591e15d76d3d895758c5062f617.exe 31 PID 1724 wrote to memory of 2628 1724 60811591e15d76d3d895758c5062f617.exe 31 PID 2628 wrote to memory of 364 2628 WINWORD.EXE 37 PID 2628 wrote to memory of 364 2628 WINWORD.EXE 37 PID 2628 wrote to memory of 364 2628 WINWORD.EXE 37 PID 2628 wrote to memory of 364 2628 WINWORD.EXE 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\60811591e15d76d3d895758c5062f617.exe"C:\Users\Admin\AppData\Local\Temp\60811591e15d76d3d895758c5062f617.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\ccmnuhmu.execcmnuhmu.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2872
-
-
C:\Windows\SysWOW64\oqppscbavjnnh.exeoqppscbavjnnh.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2740
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:364
-
-
-
C:\Windows\SysWOW64\mgfjarrmsxafvpa.exemgfjarrmsxafvpa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2864
-
-
C:\Windows\SysWOW64\ogyidotamf.exeogyidotamf.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2792
-
-
C:\Windows\SysWOW64\ccmnuhmu.exeC:\Windows\system32\ccmnuhmu.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1636
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:824
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2244
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:1804
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5a3c2ed2013af620e56abee3dc94ffc8c
SHA1ccca12ce5c098f20eb12e4d7c38af2e4fdaeec91
SHA2560f4c5021749d190361d1c512fc26ea15725af9eeabf633d9b1be8fcfc0e93a8b
SHA512d696033ddfb7bce41396b024297312afae0c7723d01a7dc5ddfa73281e44498364a1049951b4cfde48dc7f3618711340f270f93c280d594d615c733ab4ba6b76
-
Filesize
155KB
MD526b5a7e4cc3baa72e79e9b767faada8b
SHA1a042e9ea7e08ea6b5c03dc3d31e89c0a00754795
SHA2567e6657af4d3e312525d02ee62344d833fde562f60294377ded1df70a94bd9ee8
SHA5121d85c3dd14a1384deefe58e0c61477d04985841ebb5d0ffdf3c433931baa5256e063ea4b9fc5f60d8b8f6fc617a9620518a65816eb02c84caa0b6272bb5bf4b1
-
Filesize
92KB
MD56662b185f19fbf697c56a25c92de7961
SHA10df0c0df0de3724258df2549c583e3c934aca726
SHA256c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86
SHA512c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f
-
Filesize
93KB
MD5257f28bd5bdc2b725434b7ab570814e7
SHA1972446e0f8d210c5d6f42a57a921391a236d564d
SHA256d80f45a5995ba038d69dbe87f7c12827ffa2b53e79beedb0bc6ee91c10a61688
SHA512c27aa91c3c3605941a1a121021c840fc7886cf27d43e9d6b2c371888a276d9dfd39135600a4f933f62dfa3d46cb6e12de6e31b3f8b939676701ff37f8cc61575
-
Filesize
8KB
MD543f9963f8bbed07aae737ef9c9ada62f
SHA117b1f3e04a7a8c4234397ba4c683b2052ddbb4bd
SHA256682a11f0b991e056678e01644e67e13827a200c17aca17174ced840558e950a3
SHA5120c010aa1db86a8963062913ed1101e70d4b9dddec98db6d3941328320170bc0abc04280e335623923b7a44ce1fb7ffcf8b16d142f8992f2433433e1c9bfb7cff
-
Filesize
344KB
MD57eb3d81a166be608e03e69b090686df2
SHA136e2ae972d0206f7459d8affdad5087573729a35
SHA256d79d3a13b2c852b293596598349a83467245f8bc929fb7363abdeb30a327fc17
SHA5123ce2a70a8a4a74474163e81ef032265b43e65b51c0258002a08cabc929ac4bdcce468fb1c8d99859a9fcb4b9b338850ffdc79eb8ec1091db0a20fdb350ca1745
-
Filesize
512KB
MD53ca9c6f6d3b51e480aec92990aea5320
SHA1276d5c91c24bcecc2e4847e65bdc8fb300241765
SHA2565ff3c4b1484c80940a7ee5774064e225e7d429511b0114161343ddce7ba8ff0b
SHA51231866a1015c4619970b98332b1d56dc7bf4f601e3197e64fff36ea71107f63146976762148af880393eb0128cbdb7dbf178c7fd9161a37d24d9386962e8957a5
-
Filesize
103KB
MD5cb73c7116e8d5c4bdd45f1f7a843f23a
SHA1ed9a531635d5207f66ad128f2d9dec10a95f13c7
SHA2564bc86d86369d5e10a14e1558a2f1f6fa661ab8b8c208dd5a09098b51b35af825
SHA5128a2d08ef5892e3e3c47adeb478edada07765b3366816e315039b0d53c043a4e541f169df3e0a4cf2170979560069b01de9eaf4b54cde752029b2b41a2f621c18
-
Filesize
512KB
MD5043538dbdedce508db25aeaf9f551c3f
SHA109f49be6de45c7dbf7aa77332f321d70889c08c9
SHA2561b36e8431df78ba45f06d52c2ed475803286987b483661744f2e2185e88e6698
SHA512120ef92aa9cbd1c1e90a26d73ca4a14449c65ea1dabe048ace875e70d4a98ed90b1d70765d05747015a5f38a9981dfa987d6b2f6cb46e03d4847b53d894941c5
-
Filesize
23KB
MD5feec2623cbf415328f2814dd8c4fbe16
SHA181036963c7f2c7218c7b26457b5bb5aba5589411
SHA256329681dba2165d42e213bce023c181c9a9833ef2d4de6ed3f4eedd4f71184176
SHA512828439d7dcf704a1b1a13b4725c0c5717d4ea16480032b05b8047e07dfa817b2caf82c3df83872f140a12e16e32a8f19443d33cbeca51bfafe09fc40c86b45b5