Analysis
-
max time kernel
133s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
c77f7a60ef57684afae3dcf19110dfba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c77f7a60ef57684afae3dcf19110dfba.exe
Resource
win10v2004-20231215-en
General
-
Target
c77f7a60ef57684afae3dcf19110dfba.exe
-
Size
512KB
-
MD5
c77f7a60ef57684afae3dcf19110dfba
-
SHA1
95db3302117728fd83b040d8794543a42491f7b1
-
SHA256
029dd7eb6b008bb295a8056f2a88b8f3f3ee6ea0f631692417307734a0ce3483
-
SHA512
79af59a90602202482479988975207b5631d84bf8b4b446bec2517bdfe7672006926ccfc33b53d7460ba84d0459fafc22b117b25aeb0752116055ccf58f6fd94
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5P
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lgfjdjgmow.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lgfjdjgmow.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" lgfjdjgmow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" lgfjdjgmow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" lgfjdjgmow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" lgfjdjgmow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" lgfjdjgmow.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lgfjdjgmow.exe -
Executes dropped EXE 5 IoCs
pid Process 2696 lgfjdjgmow.exe 2780 dwefixygehnybig.exe 2676 gxebumot.exe 1376 dkrnsnjowpaom.exe 2628 gxebumot.exe -
Loads dropped DLL 5 IoCs
pid Process 1768 c77f7a60ef57684afae3dcf19110dfba.exe 1768 c77f7a60ef57684afae3dcf19110dfba.exe 1768 c77f7a60ef57684afae3dcf19110dfba.exe 1768 c77f7a60ef57684afae3dcf19110dfba.exe 2696 lgfjdjgmow.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" lgfjdjgmow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" lgfjdjgmow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" lgfjdjgmow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" lgfjdjgmow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" lgfjdjgmow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" lgfjdjgmow.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xazfseyb = "lgfjdjgmow.exe" dwefixygehnybig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lshuyhrt = "dwefixygehnybig.exe" dwefixygehnybig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "dkrnsnjowpaom.exe" dwefixygehnybig.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\x: gxebumot.exe File opened (read-only) \??\j: gxebumot.exe File opened (read-only) \??\q: gxebumot.exe File opened (read-only) \??\l: lgfjdjgmow.exe File opened (read-only) \??\w: lgfjdjgmow.exe File opened (read-only) \??\h: gxebumot.exe File opened (read-only) \??\n: gxebumot.exe File opened (read-only) \??\l: gxebumot.exe File opened (read-only) \??\r: gxebumot.exe File opened (read-only) \??\v: gxebumot.exe File opened (read-only) \??\e: gxebumot.exe File opened (read-only) \??\e: lgfjdjgmow.exe File opened (read-only) \??\u: lgfjdjgmow.exe File opened (read-only) \??\k: gxebumot.exe File opened (read-only) \??\r: gxebumot.exe File opened (read-only) \??\j: gxebumot.exe File opened (read-only) \??\s: lgfjdjgmow.exe File opened (read-only) \??\t: lgfjdjgmow.exe File opened (read-only) \??\b: lgfjdjgmow.exe File opened (read-only) \??\h: lgfjdjgmow.exe File opened (read-only) \??\i: lgfjdjgmow.exe File opened (read-only) \??\k: lgfjdjgmow.exe File opened (read-only) \??\z: lgfjdjgmow.exe File opened (read-only) \??\k: gxebumot.exe File opened (read-only) \??\o: gxebumot.exe File opened (read-only) \??\w: gxebumot.exe File opened (read-only) \??\z: gxebumot.exe File opened (read-only) \??\g: gxebumot.exe File opened (read-only) \??\i: gxebumot.exe File opened (read-only) \??\u: gxebumot.exe File opened (read-only) \??\m: lgfjdjgmow.exe File opened (read-only) \??\m: gxebumot.exe File opened (read-only) \??\p: gxebumot.exe File opened (read-only) \??\m: gxebumot.exe File opened (read-only) \??\z: gxebumot.exe File opened (read-only) \??\x: lgfjdjgmow.exe File opened (read-only) \??\a: lgfjdjgmow.exe File opened (read-only) \??\y: lgfjdjgmow.exe File opened (read-only) \??\a: gxebumot.exe File opened (read-only) \??\o: lgfjdjgmow.exe File opened (read-only) \??\e: gxebumot.exe File opened (read-only) \??\y: gxebumot.exe File opened (read-only) \??\u: gxebumot.exe File opened (read-only) \??\b: gxebumot.exe File opened (read-only) \??\v: gxebumot.exe File opened (read-only) \??\p: gxebumot.exe File opened (read-only) \??\n: lgfjdjgmow.exe File opened (read-only) \??\g: gxebumot.exe File opened (read-only) \??\h: gxebumot.exe File opened (read-only) \??\n: gxebumot.exe File opened (read-only) \??\x: gxebumot.exe File opened (read-only) \??\y: gxebumot.exe File opened (read-only) \??\r: lgfjdjgmow.exe File opened (read-only) \??\t: gxebumot.exe File opened (read-only) \??\i: gxebumot.exe File opened (read-only) \??\t: gxebumot.exe File opened (read-only) \??\q: lgfjdjgmow.exe File opened (read-only) \??\a: gxebumot.exe File opened (read-only) \??\b: gxebumot.exe File opened (read-only) \??\s: gxebumot.exe File opened (read-only) \??\p: lgfjdjgmow.exe File opened (read-only) \??\w: gxebumot.exe File opened (read-only) \??\q: gxebumot.exe File opened (read-only) \??\v: lgfjdjgmow.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" lgfjdjgmow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" lgfjdjgmow.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1768-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x000b000000012255-17.dat autoit_exe behavioral1/files/0x000f000000015c2f-5.dat autoit_exe behavioral1/files/0x000b000000012255-24.dat autoit_exe behavioral1/files/0x002c0000000186bd-28.dat autoit_exe behavioral1/files/0x000f000000015c2f-33.dat autoit_exe behavioral1/files/0x0007000000018b5d-39.dat autoit_exe behavioral1/files/0x002c0000000186bd-36.dat autoit_exe behavioral1/files/0x000b000000012255-20.dat autoit_exe behavioral1/files/0x00050000000195a7-65.dat autoit_exe behavioral1/files/0x00050000000195b3-73.dat autoit_exe behavioral1/files/0x00050000000195b7-83.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\lgfjdjgmow.exe c77f7a60ef57684afae3dcf19110dfba.exe File created C:\Windows\SysWOW64\dwefixygehnybig.exe c77f7a60ef57684afae3dcf19110dfba.exe File created C:\Windows\SysWOW64\gxebumot.exe c77f7a60ef57684afae3dcf19110dfba.exe File opened for modification C:\Windows\SysWOW64\dkrnsnjowpaom.exe c77f7a60ef57684afae3dcf19110dfba.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll lgfjdjgmow.exe File opened for modification C:\Windows\SysWOW64\lgfjdjgmow.exe c77f7a60ef57684afae3dcf19110dfba.exe File opened for modification C:\Windows\SysWOW64\dwefixygehnybig.exe c77f7a60ef57684afae3dcf19110dfba.exe File opened for modification C:\Windows\SysWOW64\gxebumot.exe c77f7a60ef57684afae3dcf19110dfba.exe File created C:\Windows\SysWOW64\dkrnsnjowpaom.exe c77f7a60ef57684afae3dcf19110dfba.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification \??\c:\Program Files\PublishRevoke.doc.exe gxebumot.exe File opened for modification C:\Program Files\PublishRevoke.nal gxebumot.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gxebumot.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gxebumot.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal gxebumot.exe File opened for modification C:\Program Files\PublishRevoke.nal gxebumot.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gxebumot.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal gxebumot.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gxebumot.exe File opened for modification \??\c:\Program Files\PublishRevoke.doc.exe gxebumot.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal gxebumot.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gxebumot.exe File created \??\c:\Program Files\PublishRevoke.doc.exe gxebumot.exe File opened for modification C:\Program Files\PublishRevoke.doc.exe gxebumot.exe File opened for modification C:\Program Files\PublishRevoke.doc.exe gxebumot.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gxebumot.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gxebumot.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gxebumot.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gxebumot.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal gxebumot.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gxebumot.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf c77f7a60ef57684afae3dcf19110dfba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" lgfjdjgmow.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "334F2C7F9C5683556A4176A170212CAC7D8165DE" c77f7a60ef57684afae3dcf19110dfba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" lgfjdjgmow.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" lgfjdjgmow.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf lgfjdjgmow.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc lgfjdjgmow.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1356 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1768 c77f7a60ef57684afae3dcf19110dfba.exe 1768 c77f7a60ef57684afae3dcf19110dfba.exe 1768 c77f7a60ef57684afae3dcf19110dfba.exe 1768 c77f7a60ef57684afae3dcf19110dfba.exe 1768 c77f7a60ef57684afae3dcf19110dfba.exe 1768 c77f7a60ef57684afae3dcf19110dfba.exe 1768 c77f7a60ef57684afae3dcf19110dfba.exe 1768 c77f7a60ef57684afae3dcf19110dfba.exe 2780 dwefixygehnybig.exe 2780 dwefixygehnybig.exe 2780 dwefixygehnybig.exe 2780 dwefixygehnybig.exe 2780 dwefixygehnybig.exe 2696 lgfjdjgmow.exe 2696 lgfjdjgmow.exe 2696 lgfjdjgmow.exe 2696 lgfjdjgmow.exe 2696 lgfjdjgmow.exe 2676 gxebumot.exe 2676 gxebumot.exe 2676 gxebumot.exe 2676 gxebumot.exe 2780 dwefixygehnybig.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 2628 gxebumot.exe 2628 gxebumot.exe 2628 gxebumot.exe 2628 gxebumot.exe 2780 dwefixygehnybig.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 2780 dwefixygehnybig.exe 2780 dwefixygehnybig.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 2780 dwefixygehnybig.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 2780 dwefixygehnybig.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 2780 dwefixygehnybig.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 2780 dwefixygehnybig.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 2780 dwefixygehnybig.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 2780 dwefixygehnybig.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 2780 dwefixygehnybig.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 2780 dwefixygehnybig.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1768 c77f7a60ef57684afae3dcf19110dfba.exe 1768 c77f7a60ef57684afae3dcf19110dfba.exe 1768 c77f7a60ef57684afae3dcf19110dfba.exe 2696 lgfjdjgmow.exe 2696 lgfjdjgmow.exe 2696 lgfjdjgmow.exe 2780 dwefixygehnybig.exe 2780 dwefixygehnybig.exe 2780 dwefixygehnybig.exe 2676 gxebumot.exe 2676 gxebumot.exe 2676 gxebumot.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 2628 gxebumot.exe 2628 gxebumot.exe 2628 gxebumot.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1768 c77f7a60ef57684afae3dcf19110dfba.exe 1768 c77f7a60ef57684afae3dcf19110dfba.exe 1768 c77f7a60ef57684afae3dcf19110dfba.exe 2696 lgfjdjgmow.exe 2696 lgfjdjgmow.exe 2696 lgfjdjgmow.exe 2780 dwefixygehnybig.exe 2780 dwefixygehnybig.exe 2780 dwefixygehnybig.exe 2676 gxebumot.exe 2676 gxebumot.exe 2676 gxebumot.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 1376 dkrnsnjowpaom.exe 2628 gxebumot.exe 2628 gxebumot.exe 2628 gxebumot.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1356 WINWORD.EXE 1356 WINWORD.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2696 1768 c77f7a60ef57684afae3dcf19110dfba.exe 22 PID 1768 wrote to memory of 2696 1768 c77f7a60ef57684afae3dcf19110dfba.exe 22 PID 1768 wrote to memory of 2696 1768 c77f7a60ef57684afae3dcf19110dfba.exe 22 PID 1768 wrote to memory of 2696 1768 c77f7a60ef57684afae3dcf19110dfba.exe 22 PID 1768 wrote to memory of 2780 1768 c77f7a60ef57684afae3dcf19110dfba.exe 30 PID 1768 wrote to memory of 2780 1768 c77f7a60ef57684afae3dcf19110dfba.exe 30 PID 1768 wrote to memory of 2780 1768 c77f7a60ef57684afae3dcf19110dfba.exe 30 PID 1768 wrote to memory of 2780 1768 c77f7a60ef57684afae3dcf19110dfba.exe 30 PID 1768 wrote to memory of 2676 1768 c77f7a60ef57684afae3dcf19110dfba.exe 29 PID 1768 wrote to memory of 2676 1768 c77f7a60ef57684afae3dcf19110dfba.exe 29 PID 1768 wrote to memory of 2676 1768 c77f7a60ef57684afae3dcf19110dfba.exe 29 PID 1768 wrote to memory of 2676 1768 c77f7a60ef57684afae3dcf19110dfba.exe 29 PID 2780 wrote to memory of 2840 2780 dwefixygehnybig.exe 26 PID 2780 wrote to memory of 2840 2780 dwefixygehnybig.exe 26 PID 2780 wrote to memory of 2840 2780 dwefixygehnybig.exe 26 PID 2780 wrote to memory of 2840 2780 dwefixygehnybig.exe 26 PID 1768 wrote to memory of 1376 1768 c77f7a60ef57684afae3dcf19110dfba.exe 27 PID 1768 wrote to memory of 1376 1768 c77f7a60ef57684afae3dcf19110dfba.exe 27 PID 1768 wrote to memory of 1376 1768 c77f7a60ef57684afae3dcf19110dfba.exe 27 PID 1768 wrote to memory of 1376 1768 c77f7a60ef57684afae3dcf19110dfba.exe 27 PID 2696 wrote to memory of 2628 2696 lgfjdjgmow.exe 25 PID 2696 wrote to memory of 2628 2696 lgfjdjgmow.exe 25 PID 2696 wrote to memory of 2628 2696 lgfjdjgmow.exe 25 PID 2696 wrote to memory of 2628 2696 lgfjdjgmow.exe 25 PID 1768 wrote to memory of 1356 1768 c77f7a60ef57684afae3dcf19110dfba.exe 28 PID 1768 wrote to memory of 1356 1768 c77f7a60ef57684afae3dcf19110dfba.exe 28 PID 1768 wrote to memory of 1356 1768 c77f7a60ef57684afae3dcf19110dfba.exe 28 PID 1768 wrote to memory of 1356 1768 c77f7a60ef57684afae3dcf19110dfba.exe 28 PID 1356 wrote to memory of 1608 1356 WINWORD.EXE 38 PID 1356 wrote to memory of 1608 1356 WINWORD.EXE 38 PID 1356 wrote to memory of 1608 1356 WINWORD.EXE 38 PID 1356 wrote to memory of 1608 1356 WINWORD.EXE 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c77f7a60ef57684afae3dcf19110dfba.exe"C:\Users\Admin\AppData\Local\Temp\c77f7a60ef57684afae3dcf19110dfba.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\lgfjdjgmow.exelgfjdjgmow.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\gxebumot.exeC:\Windows\system32\gxebumot.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2628
-
-
-
C:\Windows\SysWOW64\dkrnsnjowpaom.exedkrnsnjowpaom.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1376
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1608
-
-
-
C:\Windows\SysWOW64\gxebumot.exegxebumot.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2676
-
-
C:\Windows\SysWOW64\dwefixygehnybig.exedwefixygehnybig.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2780
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c dkrnsnjowpaom.exe1⤵PID:2840
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD58bbc67aff9c0755ffd42533cc7673b44
SHA18b0d501cd80ab701d6494d5fe7e4c6fd3d42c02c
SHA25694caeeec4d036194547e484e78a84fa61d16251d9cf85f3d3f29d934014bd255
SHA512101785512fcf7834b77d310d4f3c89e220a4df52c1ee742f88f8b22fb157246966b2632fb64cd861687735126e6e4acb618889fb99747bfdb976b88b8c6cd3fc
-
Filesize
512KB
MD586ec0c0a9b95cd941d9efa6f771c9632
SHA11adb611e21f84d185901dc509acead29a70e680a
SHA256a509aff7198ef278110122054953cbcf6b2c228d350b13430fbfcf7a94d5d6e7
SHA512834f87de52979181ff001a73a057879dad1f0ce745598b8c74f452be9b6306e64c711114c713b75b4b40a49caebcf26ce42a22feae2d5b1126800805bb522a53
-
Filesize
20KB
MD5891835d70277c412629c5cb285c1e8b7
SHA1374a66a2646f45ae7d53f163425de2de3513a2ea
SHA256bf983201b021d64b090161991cc8d561b3071243c2878aaed7e557ca35781a57
SHA5124fd33640b3c20d2e2d2bbf9b82991d721dff7031341cdc5ef6767e258a595a6cfe70e92c132e4b27e15a4d5a025339efff2ca083fa1b75b85bffe4833ad8a127
-
Filesize
512KB
MD5118a457ec964fa0702a1b26c7d71f2ca
SHA191f453eb65213a95252344d867dc1d163b87becc
SHA256e3da57d6af9aad3dc3ab81f2be5012ce86665abbb3d2910a7d25517ecf8a0e43
SHA51270569381506137f6963d98d22975ee8d995d5ea2b33339a62dd71379924fb6c49d3e6010bf33290d5bf160ee50b60eb0ce77e32bc562bb84abcabe2f756ec681
-
Filesize
512KB
MD54757038ecc0f0b94966287e8556daa65
SHA1cd1cefc97945eeba4642a5cc95bb8ceff5f69fd5
SHA25697d297ca54d707713dddd1b1702825da060e0ef512f91da93922dd5dd45e49f4
SHA5129f20f0fd908fcc4b8fb6e71bba721e0cef32e5644f88d0bfe75f3a99e4eccbb113ed90a64e5a4e30c00cb78c35d88fb89e7f7d74690515bafe19ae1bf53583de
-
Filesize
512KB
MD5e3690474e7ef9d441caf9d86603ed3ab
SHA139cb23d51faef661c73739f7912598c84789df24
SHA25619871eea09fe77d487da670fd5bac5802098c072fdd0c9f5cbd3ea5178bbfd81
SHA512f9ebca328001b7198cbe6ce59e89915fd2160290bbe703e26a6b5f2714ccc0ce9d7fc88af39a2dd8e9451496dfd0549b91c6f7a41207b6cdcc6364c6d24becca
-
Filesize
407KB
MD53dfb7c1dbe638e327f923b2d8ee73a42
SHA138e8a7b90286f01f9c7f3059ba4c8500b48ef24d
SHA256e18621ee3c8616f683019118741ad96eff0bcbf003d7a1a33fa0aa77562a1c6c
SHA512452dd62087f37d1b8c7d7e28f0be6880d0b10356693f5ca6a43f0d492ffe525dd7084e4252bce6ceb85090a9c6b44f4abba14d60ca80855846f47e291b3c9a5a
-
Filesize
512KB
MD5fb021716402b163579f7f9e0a945e600
SHA19fe775cf6dcff7b252bbeace7f4bb90cbda36ab3
SHA2569289818bf86bd7ab3b1e69b5c37d5ecd72c14f9ad9400484709934402149b6b4
SHA512210829795c74b01086a398d3b918ee8973cd562dbdb3497dafd9889ccbaf4e653ce9b972b992065a2395dc45a5ae8b15769cfff861247c1ecb2591fc5fccfdd8
-
Filesize
512KB
MD5c76a8388c35d9b9dd1ab67e87b0619f4
SHA15fc0ed5361fc6cf9094dad8d1302d88c4b1ebd84
SHA2561e634cad92046a6055b3f25ca4c2411b024592b6bc6e29735b482dd4311a1728
SHA5128b9e550d013ab68444d2ba6dbda85fedd62317c2add1b8889c7c46e048ba28890b3cf9ef9c7838e23fdb54affca479a3f9720c14cc8175e40931873f9b90c27d
-
Filesize
457KB
MD56145a2f054f828fde75a208028f81d77
SHA1236052a265325d17c3ccdcf6696d41ef60207a20
SHA2563a8327970d21ae65772bc302ef616896ecdfcf54e34745a510b56255dea0daa5
SHA5123a5cb5ecb8230a4394fbcb8194656a16920cc0ac5c773bda5d25e0bf8db1d164b52365c8355aae1e792768aaf0ee6397c99eabf2acab3169775a991d8112afd2
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
348KB
MD5cbff73b0ceea9ec35a3c9164961e7296
SHA10c30c72b0d29f743d6118b97abd90fca13e0c7cd
SHA25605e82bb6bd6fdcb6973650245d56eb6d575835de9840b825d0374d5e6de8bf54
SHA5122f88e4367083912b4ef2bbe40722c6415abcaf6bb6f5562e014a61de1040757ba2eb14f13c2ba1d6e87d508c458141a01e20766e529cdddfcd45a3d82b5c3ac1
-
Filesize
475KB
MD59a35a08eb521477f02b05fd3ee548ac0
SHA14a900929bd1854cee90bdba9b2ece89e0fe77316
SHA256b6fbcc845b6d84b5f1341577f1f1f50887e22f22d4566103165daf0ce678f531
SHA5123141d9a13de0ec6aca38c5658b610ca64c6c5bcff43768fb741dc70260419657f0b759dd9f287fb6c6173373b94b11ec2421724d35f96179d0d7743a059e873f