Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
236s -
max time network
334s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 19:03
Behavioral task
behavioral1
Sample
20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe
Resource
win7-20221111-en
General
-
Target
20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe
-
Size
255KB
-
MD5
cc12ce02c458d651196298b6c478dd18
-
SHA1
05a2c264d9a57f3ce49e7d770ac846559b947309
-
SHA256
20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c
-
SHA512
b4a8cf8a775ee4be9f7c655bc8f2c4f06a32ed0bf371033569cd7066927a10a87bc5a629a32b7c3974a805b35a647ab7c903f2bf3753491f66557cd4fcd104b8
-
SSDEEP
6144:1xlZam+akqx6YQJXcNlEHUIQeE3mmBWFv67:Plf5j6zCNa0xeE3mu
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ihioxqnjgp.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ihioxqnjgp.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ihioxqnjgp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ihioxqnjgp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ihioxqnjgp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ihioxqnjgp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ihioxqnjgp.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ihioxqnjgp.exe -
Executes dropped EXE 5 IoCs
pid Process 1908 ihioxqnjgp.exe 788 tjpjmaxntshhmej.exe 1476 lfiyaxid.exe 868 fybnlznaqocaz.exe 1988 lfiyaxid.exe -
resource yara_rule behavioral1/memory/472-55-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/472-56-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x000b00000001230e-57.dat upx behavioral1/memory/472-58-0x00000000021D0000-0x0000000002270000-memory.dmp upx behavioral1/files/0x000a00000001231a-61.dat upx behavioral1/files/0x000a00000001231a-64.dat upx behavioral1/files/0x0009000000012324-65.dat upx behavioral1/files/0x000b00000001230e-60.dat upx behavioral1/files/0x000b00000001230e-67.dat upx behavioral1/files/0x000900000001232d-69.dat upx behavioral1/files/0x0009000000012324-71.dat upx behavioral1/files/0x000900000001232d-73.dat upx behavioral1/files/0x000a00000001231a-76.dat upx behavioral1/files/0x0009000000012324-75.dat upx behavioral1/files/0x000900000001232d-77.dat upx behavioral1/files/0x0009000000012324-78.dat upx behavioral1/files/0x0009000000012324-80.dat upx behavioral1/memory/472-83-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1908-85-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/788-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1476-88-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/868-89-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1988-90-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1908-95-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/788-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1476-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/868-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1988-100-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 1908 ihioxqnjgp.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ihioxqnjgp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ihioxqnjgp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ihioxqnjgp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ihioxqnjgp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ihioxqnjgp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ihioxqnjgp.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run tjpjmaxntshhmej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\hwfrslge = "ihioxqnjgp.exe" tjpjmaxntshhmej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\hhdsexjb = "tjpjmaxntshhmej.exe" tjpjmaxntshhmej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "fybnlznaqocaz.exe" tjpjmaxntshhmej.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\k: ihioxqnjgp.exe File opened (read-only) \??\n: ihioxqnjgp.exe File opened (read-only) \??\e: lfiyaxid.exe File opened (read-only) \??\k: lfiyaxid.exe File opened (read-only) \??\x: lfiyaxid.exe File opened (read-only) \??\m: ihioxqnjgp.exe File opened (read-only) \??\y: lfiyaxid.exe File opened (read-only) \??\m: lfiyaxid.exe File opened (read-only) \??\q: lfiyaxid.exe File opened (read-only) \??\h: ihioxqnjgp.exe File opened (read-only) \??\p: ihioxqnjgp.exe File opened (read-only) \??\v: lfiyaxid.exe File opened (read-only) \??\h: lfiyaxid.exe File opened (read-only) \??\y: lfiyaxid.exe File opened (read-only) \??\f: ihioxqnjgp.exe File opened (read-only) \??\s: ihioxqnjgp.exe File opened (read-only) \??\x: lfiyaxid.exe File opened (read-only) \??\f: lfiyaxid.exe File opened (read-only) \??\u: ihioxqnjgp.exe File opened (read-only) \??\x: ihioxqnjgp.exe File opened (read-only) \??\u: lfiyaxid.exe File opened (read-only) \??\n: lfiyaxid.exe File opened (read-only) \??\w: lfiyaxid.exe File opened (read-only) \??\e: lfiyaxid.exe File opened (read-only) \??\v: lfiyaxid.exe File opened (read-only) \??\z: lfiyaxid.exe File opened (read-only) \??\r: ihioxqnjgp.exe File opened (read-only) \??\a: lfiyaxid.exe File opened (read-only) \??\n: lfiyaxid.exe File opened (read-only) \??\p: lfiyaxid.exe File opened (read-only) \??\v: ihioxqnjgp.exe File opened (read-only) \??\s: lfiyaxid.exe File opened (read-only) \??\r: lfiyaxid.exe File opened (read-only) \??\k: lfiyaxid.exe File opened (read-only) \??\r: lfiyaxid.exe File opened (read-only) \??\j: lfiyaxid.exe File opened (read-only) \??\l: ihioxqnjgp.exe File opened (read-only) \??\o: ihioxqnjgp.exe File opened (read-only) \??\i: lfiyaxid.exe File opened (read-only) \??\j: lfiyaxid.exe File opened (read-only) \??\o: lfiyaxid.exe File opened (read-only) \??\b: ihioxqnjgp.exe File opened (read-only) \??\e: ihioxqnjgp.exe File opened (read-only) \??\g: ihioxqnjgp.exe File opened (read-only) \??\z: lfiyaxid.exe File opened (read-only) \??\i: lfiyaxid.exe File opened (read-only) \??\u: lfiyaxid.exe File opened (read-only) \??\a: ihioxqnjgp.exe File opened (read-only) \??\b: lfiyaxid.exe File opened (read-only) \??\f: lfiyaxid.exe File opened (read-only) \??\m: lfiyaxid.exe File opened (read-only) \??\j: ihioxqnjgp.exe File opened (read-only) \??\q: ihioxqnjgp.exe File opened (read-only) \??\p: lfiyaxid.exe File opened (read-only) \??\s: lfiyaxid.exe File opened (read-only) \??\z: ihioxqnjgp.exe File opened (read-only) \??\l: lfiyaxid.exe File opened (read-only) \??\y: ihioxqnjgp.exe File opened (read-only) \??\b: lfiyaxid.exe File opened (read-only) \??\g: lfiyaxid.exe File opened (read-only) \??\t: lfiyaxid.exe File opened (read-only) \??\q: lfiyaxid.exe File opened (read-only) \??\w: lfiyaxid.exe File opened (read-only) \??\o: lfiyaxid.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ihioxqnjgp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ihioxqnjgp.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/472-56-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/472-83-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1908-85-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/788-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1476-88-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/868-89-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1988-90-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1908-95-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/788-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1476-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/868-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1988-100-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ihioxqnjgp.exe 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe File created C:\Windows\SysWOW64\tjpjmaxntshhmej.exe 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ihioxqnjgp.exe File created C:\Windows\SysWOW64\fybnlznaqocaz.exe 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe File opened for modification C:\Windows\SysWOW64\fybnlznaqocaz.exe 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe File created C:\Windows\SysWOW64\ihioxqnjgp.exe 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe File opened for modification C:\Windows\SysWOW64\tjpjmaxntshhmej.exe 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe File created C:\Windows\SysWOW64\lfiyaxid.exe 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe File opened for modification C:\Windows\SysWOW64\lfiyaxid.exe 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ihioxqnjgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" ihioxqnjgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ihioxqnjgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf ihioxqnjgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ihioxqnjgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BC8FABEFE14F193837D3B4081EC39E6B38B038C43600348E1BA429E08A0" 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 616 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 1908 ihioxqnjgp.exe 1908 ihioxqnjgp.exe 1908 ihioxqnjgp.exe 1908 ihioxqnjgp.exe 1908 ihioxqnjgp.exe 788 tjpjmaxntshhmej.exe 788 tjpjmaxntshhmej.exe 788 tjpjmaxntshhmej.exe 788 tjpjmaxntshhmej.exe 788 tjpjmaxntshhmej.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 1476 lfiyaxid.exe 1476 lfiyaxid.exe 1476 lfiyaxid.exe 1476 lfiyaxid.exe 1988 lfiyaxid.exe 1988 lfiyaxid.exe 1988 lfiyaxid.exe 1988 lfiyaxid.exe 788 tjpjmaxntshhmej.exe 788 tjpjmaxntshhmej.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 788 tjpjmaxntshhmej.exe 788 tjpjmaxntshhmej.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 788 tjpjmaxntshhmej.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 788 tjpjmaxntshhmej.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 788 tjpjmaxntshhmej.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 788 tjpjmaxntshhmej.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 788 tjpjmaxntshhmej.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 788 tjpjmaxntshhmej.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 788 tjpjmaxntshhmej.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 788 tjpjmaxntshhmej.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 1908 ihioxqnjgp.exe 1908 ihioxqnjgp.exe 1908 ihioxqnjgp.exe 1476 lfiyaxid.exe 1476 lfiyaxid.exe 1476 lfiyaxid.exe 788 tjpjmaxntshhmej.exe 788 tjpjmaxntshhmej.exe 788 tjpjmaxntshhmej.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 1988 lfiyaxid.exe 1988 lfiyaxid.exe 1988 lfiyaxid.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 1908 ihioxqnjgp.exe 1908 ihioxqnjgp.exe 1908 ihioxqnjgp.exe 1476 lfiyaxid.exe 1476 lfiyaxid.exe 1476 lfiyaxid.exe 788 tjpjmaxntshhmej.exe 788 tjpjmaxntshhmej.exe 788 tjpjmaxntshhmej.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 868 fybnlznaqocaz.exe 1988 lfiyaxid.exe 1988 lfiyaxid.exe 1988 lfiyaxid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 616 WINWORD.EXE 616 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 472 wrote to memory of 1908 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 28 PID 472 wrote to memory of 1908 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 28 PID 472 wrote to memory of 1908 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 28 PID 472 wrote to memory of 1908 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 28 PID 472 wrote to memory of 788 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 29 PID 472 wrote to memory of 788 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 29 PID 472 wrote to memory of 788 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 29 PID 472 wrote to memory of 788 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 29 PID 472 wrote to memory of 1476 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 30 PID 472 wrote to memory of 1476 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 30 PID 472 wrote to memory of 1476 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 30 PID 472 wrote to memory of 1476 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 30 PID 472 wrote to memory of 868 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 31 PID 472 wrote to memory of 868 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 31 PID 472 wrote to memory of 868 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 31 PID 472 wrote to memory of 868 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 31 PID 1908 wrote to memory of 1988 1908 ihioxqnjgp.exe 32 PID 1908 wrote to memory of 1988 1908 ihioxqnjgp.exe 32 PID 1908 wrote to memory of 1988 1908 ihioxqnjgp.exe 32 PID 1908 wrote to memory of 1988 1908 ihioxqnjgp.exe 32 PID 472 wrote to memory of 616 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 33 PID 472 wrote to memory of 616 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 33 PID 472 wrote to memory of 616 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 33 PID 472 wrote to memory of 616 472 20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe 33 PID 616 wrote to memory of 1588 616 WINWORD.EXE 36 PID 616 wrote to memory of 1588 616 WINWORD.EXE 36 PID 616 wrote to memory of 1588 616 WINWORD.EXE 36 PID 616 wrote to memory of 1588 616 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe"C:\Users\Admin\AppData\Local\Temp\20d1cff3ade88e1313ad34e3cb857908831ae6cf18487037614a288cceb8472c.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\ihioxqnjgp.exeihioxqnjgp.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\lfiyaxid.exeC:\Windows\system32\lfiyaxid.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1988
-
-
-
C:\Windows\SysWOW64\tjpjmaxntshhmej.exetjpjmaxntshhmej.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:788
-
-
C:\Windows\SysWOW64\lfiyaxid.exelfiyaxid.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1476
-
-
C:\Windows\SysWOW64\fybnlznaqocaz.exefybnlznaqocaz.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:868
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1588
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD59e2c48a0eb27bc8431bd419717c7047f
SHA1326e852e0963ff34ccc5d20abf7235188353038c
SHA256daccddfd8f5a7965012d5cfbc87043237297993a70f0fc6ca3a8e9f1cdf322cc
SHA512528ea2c86efff05a007f3ac4ca23f3b3ec46eb9fa6214082150bc095880ea58adbc5ffec737765e9d7c782f25b1d0def3e10bc16c37e08cdc8694e86191147c9
-
Filesize
255KB
MD59e2c48a0eb27bc8431bd419717c7047f
SHA1326e852e0963ff34ccc5d20abf7235188353038c
SHA256daccddfd8f5a7965012d5cfbc87043237297993a70f0fc6ca3a8e9f1cdf322cc
SHA512528ea2c86efff05a007f3ac4ca23f3b3ec46eb9fa6214082150bc095880ea58adbc5ffec737765e9d7c782f25b1d0def3e10bc16c37e08cdc8694e86191147c9
-
Filesize
255KB
MD5c06f5456d1ba51c14c980081ba10510a
SHA1d4dd6b7896f3ca57cd318253f909074398e5f395
SHA256423d58b8b9e32be176572a5ef1c190c8bb91551a01e97ee0a0d492addc381d97
SHA512a3f9c0d77220ab61d28e6859b53ffa72bda04172ed2ca9c7cf63558ed6af36d126814ea087d78be65fc98e5a4a719f7ab789a0254ac399add3430db51c786364
-
Filesize
255KB
MD5c06f5456d1ba51c14c980081ba10510a
SHA1d4dd6b7896f3ca57cd318253f909074398e5f395
SHA256423d58b8b9e32be176572a5ef1c190c8bb91551a01e97ee0a0d492addc381d97
SHA512a3f9c0d77220ab61d28e6859b53ffa72bda04172ed2ca9c7cf63558ed6af36d126814ea087d78be65fc98e5a4a719f7ab789a0254ac399add3430db51c786364
-
Filesize
255KB
MD5fc22a961158ef5228061a48250a9c3b4
SHA18b5dada3388d548a4d74a91cf73054a4c7ee27f5
SHA256cbfafc8c4ceef8d962576dc3e49eba8e25ce869d6208f289f35d49b903a80d69
SHA5126be54cab3ca2af6967ddefca807581fcda7db93fd62d7a7fbc8e93d6f57b38884225b1d840ad9e8d783ec307dce83fc8f4759c25acdedc50ee727cdb47e8ab95
-
Filesize
255KB
MD5fc22a961158ef5228061a48250a9c3b4
SHA18b5dada3388d548a4d74a91cf73054a4c7ee27f5
SHA256cbfafc8c4ceef8d962576dc3e49eba8e25ce869d6208f289f35d49b903a80d69
SHA5126be54cab3ca2af6967ddefca807581fcda7db93fd62d7a7fbc8e93d6f57b38884225b1d840ad9e8d783ec307dce83fc8f4759c25acdedc50ee727cdb47e8ab95
-
Filesize
255KB
MD5fc22a961158ef5228061a48250a9c3b4
SHA18b5dada3388d548a4d74a91cf73054a4c7ee27f5
SHA256cbfafc8c4ceef8d962576dc3e49eba8e25ce869d6208f289f35d49b903a80d69
SHA5126be54cab3ca2af6967ddefca807581fcda7db93fd62d7a7fbc8e93d6f57b38884225b1d840ad9e8d783ec307dce83fc8f4759c25acdedc50ee727cdb47e8ab95
-
Filesize
255KB
MD5f02636b7607ddfd338520d5f08525d19
SHA108866d46336a5b0a35201f3d4f42e71a7fd1b8ee
SHA256a8488ca77d1540190cfb8a4c7e44ee626d11e03217cebf32c2bab2a25c0bd490
SHA51247112389e74d98ff4e63030677652c9609126d21ba417ddd17cc4896893fad458d31b1898b890b90120ce75b4e192b672cf356084cd4a3d460189d1b9218dc98
-
Filesize
255KB
MD5f02636b7607ddfd338520d5f08525d19
SHA108866d46336a5b0a35201f3d4f42e71a7fd1b8ee
SHA256a8488ca77d1540190cfb8a4c7e44ee626d11e03217cebf32c2bab2a25c0bd490
SHA51247112389e74d98ff4e63030677652c9609126d21ba417ddd17cc4896893fad458d31b1898b890b90120ce75b4e192b672cf356084cd4a3d460189d1b9218dc98
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD59e2c48a0eb27bc8431bd419717c7047f
SHA1326e852e0963ff34ccc5d20abf7235188353038c
SHA256daccddfd8f5a7965012d5cfbc87043237297993a70f0fc6ca3a8e9f1cdf322cc
SHA512528ea2c86efff05a007f3ac4ca23f3b3ec46eb9fa6214082150bc095880ea58adbc5ffec737765e9d7c782f25b1d0def3e10bc16c37e08cdc8694e86191147c9
-
Filesize
255KB
MD5c06f5456d1ba51c14c980081ba10510a
SHA1d4dd6b7896f3ca57cd318253f909074398e5f395
SHA256423d58b8b9e32be176572a5ef1c190c8bb91551a01e97ee0a0d492addc381d97
SHA512a3f9c0d77220ab61d28e6859b53ffa72bda04172ed2ca9c7cf63558ed6af36d126814ea087d78be65fc98e5a4a719f7ab789a0254ac399add3430db51c786364
-
Filesize
255KB
MD5fc22a961158ef5228061a48250a9c3b4
SHA18b5dada3388d548a4d74a91cf73054a4c7ee27f5
SHA256cbfafc8c4ceef8d962576dc3e49eba8e25ce869d6208f289f35d49b903a80d69
SHA5126be54cab3ca2af6967ddefca807581fcda7db93fd62d7a7fbc8e93d6f57b38884225b1d840ad9e8d783ec307dce83fc8f4759c25acdedc50ee727cdb47e8ab95
-
Filesize
255KB
MD5fc22a961158ef5228061a48250a9c3b4
SHA18b5dada3388d548a4d74a91cf73054a4c7ee27f5
SHA256cbfafc8c4ceef8d962576dc3e49eba8e25ce869d6208f289f35d49b903a80d69
SHA5126be54cab3ca2af6967ddefca807581fcda7db93fd62d7a7fbc8e93d6f57b38884225b1d840ad9e8d783ec307dce83fc8f4759c25acdedc50ee727cdb47e8ab95
-
Filesize
255KB
MD5f02636b7607ddfd338520d5f08525d19
SHA108866d46336a5b0a35201f3d4f42e71a7fd1b8ee
SHA256a8488ca77d1540190cfb8a4c7e44ee626d11e03217cebf32c2bab2a25c0bd490
SHA51247112389e74d98ff4e63030677652c9609126d21ba417ddd17cc4896893fad458d31b1898b890b90120ce75b4e192b672cf356084cd4a3d460189d1b9218dc98