Analysis
-
max time kernel
188s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 19:05
Behavioral task
behavioral1
Sample
e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe
Resource
win7-20221111-en
General
-
Target
e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe
-
Size
255KB
-
MD5
8fe84d33389dfb1d715fd9c0ec7ac0f0
-
SHA1
a35b41ca29cb6fedb8e6ca7abfc105d2cf07ebc0
-
SHA256
e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7
-
SHA512
5c6b6e7fe410888ba74886b57882bdba85ee532a8bced89fe87aaeee94a9ba8dd7970c09fce4f06d364bf20a3925316bc44dceacf0920593c1cffa63d63ac833
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJk:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIT
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" tcslwmedij.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tcslwmedij.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tcslwmedij.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tcslwmedij.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tcslwmedij.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" tcslwmedij.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tcslwmedij.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" tcslwmedij.exe -
Executes dropped EXE 5 IoCs
pid Process 1004 tcslwmedij.exe 572 hyvskuivtwfbqmi.exe 776 qbssgjer.exe 268 tvhlxvcrdkuou.exe 560 qbssgjer.exe -
resource yara_rule behavioral1/memory/1456-55-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x000a00000001347b-56.dat upx behavioral1/files/0x000a00000001347b-58.dat upx behavioral1/files/0x000a00000001347b-60.dat upx behavioral1/files/0x00090000000139eb-61.dat upx behavioral1/files/0x0006000000014129-65.dat upx behavioral1/files/0x00090000000139eb-63.dat upx behavioral1/files/0x0006000000014129-67.dat upx behavioral1/files/0x0006000000014145-69.dat upx behavioral1/files/0x0006000000014129-70.dat upx behavioral1/files/0x0006000000014145-73.dat upx behavioral1/memory/1004-72-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0006000000014145-77.dat upx behavioral1/memory/572-76-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/776-79-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0006000000014129-80.dat upx behavioral1/files/0x0006000000014129-82.dat upx behavioral1/memory/1456-85-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/560-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/268-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1004-95-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/776-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/268-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/560-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0006000000014a4f-100.dat upx behavioral1/files/0x0006000000014b5d-102.dat upx -
Loads dropped DLL 5 IoCs
pid Process 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1004 tcslwmedij.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tcslwmedij.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tcslwmedij.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tcslwmedij.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" tcslwmedij.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tcslwmedij.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" tcslwmedij.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\o: tcslwmedij.exe File opened (read-only) \??\u: tcslwmedij.exe File opened (read-only) \??\v: tcslwmedij.exe File opened (read-only) \??\u: qbssgjer.exe File opened (read-only) \??\f: tcslwmedij.exe File opened (read-only) \??\e: qbssgjer.exe File opened (read-only) \??\p: qbssgjer.exe File opened (read-only) \??\r: qbssgjer.exe File opened (read-only) \??\q: qbssgjer.exe File opened (read-only) \??\s: qbssgjer.exe File opened (read-only) \??\b: tcslwmedij.exe File opened (read-only) \??\i: tcslwmedij.exe File opened (read-only) \??\q: tcslwmedij.exe File opened (read-only) \??\a: qbssgjer.exe File opened (read-only) \??\m: qbssgjer.exe File opened (read-only) \??\e: qbssgjer.exe File opened (read-only) \??\i: qbssgjer.exe File opened (read-only) \??\l: tcslwmedij.exe File opened (read-only) \??\j: qbssgjer.exe File opened (read-only) \??\q: qbssgjer.exe File opened (read-only) \??\a: qbssgjer.exe File opened (read-only) \??\w: qbssgjer.exe File opened (read-only) \??\h: tcslwmedij.exe File opened (read-only) \??\l: qbssgjer.exe File opened (read-only) \??\p: tcslwmedij.exe File opened (read-only) \??\s: tcslwmedij.exe File opened (read-only) \??\x: tcslwmedij.exe File opened (read-only) \??\o: qbssgjer.exe File opened (read-only) \??\s: qbssgjer.exe File opened (read-only) \??\m: tcslwmedij.exe File opened (read-only) \??\t: qbssgjer.exe File opened (read-only) \??\r: tcslwmedij.exe File opened (read-only) \??\g: qbssgjer.exe File opened (read-only) \??\y: qbssgjer.exe File opened (read-only) \??\g: qbssgjer.exe File opened (read-only) \??\j: qbssgjer.exe File opened (read-only) \??\o: qbssgjer.exe File opened (read-only) \??\k: tcslwmedij.exe File opened (read-only) \??\w: tcslwmedij.exe File opened (read-only) \??\f: qbssgjer.exe File opened (read-only) \??\l: qbssgjer.exe File opened (read-only) \??\m: qbssgjer.exe File opened (read-only) \??\h: qbssgjer.exe File opened (read-only) \??\v: qbssgjer.exe File opened (read-only) \??\x: qbssgjer.exe File opened (read-only) \??\e: tcslwmedij.exe File opened (read-only) \??\t: tcslwmedij.exe File opened (read-only) \??\w: qbssgjer.exe File opened (read-only) \??\p: qbssgjer.exe File opened (read-only) \??\a: tcslwmedij.exe File opened (read-only) \??\g: tcslwmedij.exe File opened (read-only) \??\k: qbssgjer.exe File opened (read-only) \??\r: qbssgjer.exe File opened (read-only) \??\k: qbssgjer.exe File opened (read-only) \??\t: qbssgjer.exe File opened (read-only) \??\v: qbssgjer.exe File opened (read-only) \??\y: tcslwmedij.exe File opened (read-only) \??\b: qbssgjer.exe File opened (read-only) \??\n: qbssgjer.exe File opened (read-only) \??\z: qbssgjer.exe File opened (read-only) \??\f: qbssgjer.exe File opened (read-only) \??\y: qbssgjer.exe File opened (read-only) \??\z: tcslwmedij.exe File opened (read-only) \??\h: qbssgjer.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" tcslwmedij.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" tcslwmedij.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1456-55-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1004-72-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/776-79-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1456-85-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/560-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/268-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1004-95-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/776-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/268-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/560-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\qbssgjer.exe e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe File opened for modification C:\Windows\SysWOW64\tvhlxvcrdkuou.exe e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll tcslwmedij.exe File created C:\Windows\SysWOW64\tcslwmedij.exe e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe File opened for modification C:\Windows\SysWOW64\tcslwmedij.exe e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe File created C:\Windows\SysWOW64\hyvskuivtwfbqmi.exe e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe File opened for modification C:\Windows\SysWOW64\hyvskuivtwfbqmi.exe e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe File created C:\Windows\SysWOW64\qbssgjer.exe e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe File created C:\Windows\SysWOW64\tvhlxvcrdkuou.exe e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qbssgjer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal qbssgjer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal qbssgjer.exe File opened for modification \??\c:\Program Files\WaitUnblock.doc.exe qbssgjer.exe File opened for modification C:\Program Files\WaitUnblock.nal qbssgjer.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qbssgjer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qbssgjer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal qbssgjer.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qbssgjer.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qbssgjer.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qbssgjer.exe File opened for modification C:\Program Files\WaitUnblock.doc.exe qbssgjer.exe File created \??\c:\Program Files\WaitUnblock.doc.exe qbssgjer.exe File opened for modification C:\Program Files\WaitUnblock.doc.exe qbssgjer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal qbssgjer.exe File opened for modification C:\Program Files\WaitUnblock.nal qbssgjer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qbssgjer.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qbssgjer.exe File opened for modification \??\c:\Program Files\WaitUnblock.doc.exe qbssgjer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qbssgjer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qbssgjer.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat tcslwmedij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1845C77914E1DAC7B8C97C92EDE434CE" e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABDF9BDFE6BF2E3837B3A4486EB3E97B38B03884315033BE2CF42ED08A3" e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" tcslwmedij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh tcslwmedij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78368B7FE1822D0D27AD0D18A0C906A" e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc tcslwmedij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF5FCF84828851D9030D6217D96BCEFE136593566426331D691" e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 112 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1004 tcslwmedij.exe 1004 tcslwmedij.exe 1004 tcslwmedij.exe 1004 tcslwmedij.exe 1004 tcslwmedij.exe 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 776 qbssgjer.exe 776 qbssgjer.exe 776 qbssgjer.exe 776 qbssgjer.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 560 qbssgjer.exe 560 qbssgjer.exe 560 qbssgjer.exe 560 qbssgjer.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1004 tcslwmedij.exe 1004 tcslwmedij.exe 1004 tcslwmedij.exe 776 qbssgjer.exe 776 qbssgjer.exe 776 qbssgjer.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 560 qbssgjer.exe 560 qbssgjer.exe 560 qbssgjer.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 1004 tcslwmedij.exe 1004 tcslwmedij.exe 1004 tcslwmedij.exe 776 qbssgjer.exe 776 qbssgjer.exe 776 qbssgjer.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 268 tvhlxvcrdkuou.exe 560 qbssgjer.exe 560 qbssgjer.exe 560 qbssgjer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 112 WINWORD.EXE 112 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1004 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 28 PID 1456 wrote to memory of 1004 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 28 PID 1456 wrote to memory of 1004 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 28 PID 1456 wrote to memory of 1004 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 28 PID 1456 wrote to memory of 572 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 29 PID 1456 wrote to memory of 572 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 29 PID 1456 wrote to memory of 572 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 29 PID 1456 wrote to memory of 572 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 29 PID 1456 wrote to memory of 776 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 30 PID 1456 wrote to memory of 776 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 30 PID 1456 wrote to memory of 776 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 30 PID 1456 wrote to memory of 776 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 30 PID 1456 wrote to memory of 268 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 31 PID 1456 wrote to memory of 268 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 31 PID 1456 wrote to memory of 268 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 31 PID 1456 wrote to memory of 268 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 31 PID 1004 wrote to memory of 560 1004 tcslwmedij.exe 32 PID 1004 wrote to memory of 560 1004 tcslwmedij.exe 32 PID 1004 wrote to memory of 560 1004 tcslwmedij.exe 32 PID 1004 wrote to memory of 560 1004 tcslwmedij.exe 32 PID 1456 wrote to memory of 112 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 33 PID 1456 wrote to memory of 112 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 33 PID 1456 wrote to memory of 112 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 33 PID 1456 wrote to memory of 112 1456 e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe 33 PID 112 wrote to memory of 1900 112 WINWORD.EXE 37 PID 112 wrote to memory of 1900 112 WINWORD.EXE 37 PID 112 wrote to memory of 1900 112 WINWORD.EXE 37 PID 112 wrote to memory of 1900 112 WINWORD.EXE 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe"C:\Users\Admin\AppData\Local\Temp\e3499c810133ef9cbe3bc74c44b5d1ca08ffc827f9124bf294641b7b892898f7.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\tcslwmedij.exetcslwmedij.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\qbssgjer.exeC:\Windows\system32\qbssgjer.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:560
-
-
-
C:\Windows\SysWOW64\hyvskuivtwfbqmi.exehyvskuivtwfbqmi.exe2⤵
- Executes dropped EXE
PID:572
-
-
C:\Windows\SysWOW64\qbssgjer.exeqbssgjer.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:776
-
-
C:\Windows\SysWOW64\tvhlxvcrdkuou.exetvhlxvcrdkuou.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:268
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1900
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5e110808294bcf95a86097af4b64c55e7
SHA1aca799dafdadcf61120d1d1660a177111a7ca8c4
SHA25610a1e187c7e98984b927350ad7e00e38d0bed3c534847c07187c3ab51d55fb1b
SHA512e89799fa000476b7ddb72cd17ceb9974c4d356d9e682dd36bd41ebf2089e848d7d718537efdb98918505c5669e47e29c708269581ed828ba534f8deaa5c3c014
-
Filesize
255KB
MD591be3f5063ffd58f64f1c2712af3423f
SHA1213073169f1a3e87c8548bf613513e8bb859ccb3
SHA256dcbfd2a85844d58ad2f93120e275cc33b21d9072c58e87bb30a34c478e15bd31
SHA5122dfdc4aaa501a34dc925288abc68714b6a587259bf82b88be51b214048340c103902f36affc25fe6b3aecd5bd5e2134dc8eb4e86e53936598f40b468f2c5642f
-
Filesize
255KB
MD5d835609b2162c844e219c08700a5f276
SHA11592a355536473da629c58683a47da833232e973
SHA256244dd15406ceb08151bcbb007ccc850bc56c0524008ca9a9bc5bd222d28db2d8
SHA51241b9ca4d6fab4a777172e37a671a718efb1e0748fa55c005f87e3702bb9e0b3b2a1115a9aaf9e624ed6bf6eacff42cbc1dcf3f6b4229cd67321bea77a0db5cd9
-
Filesize
255KB
MD5a2e00a07ead07c292390e5708b6f6a9a
SHA1890cb8d010072831174cb1798cb579f2c57a46a7
SHA256de339ac88f8ce2bfab1bade4a086b87952f1209b11842195d1165891a8059e4a
SHA5122752c5ec05b07e3051b176c52313757704a98254551e8344eaf8512ee3e4c46e21d723e0113907aeaa72db4598df84e939e683aef7a1f20049b98133b9ab598f
-
Filesize
255KB
MD5a2e00a07ead07c292390e5708b6f6a9a
SHA1890cb8d010072831174cb1798cb579f2c57a46a7
SHA256de339ac88f8ce2bfab1bade4a086b87952f1209b11842195d1165891a8059e4a
SHA5122752c5ec05b07e3051b176c52313757704a98254551e8344eaf8512ee3e4c46e21d723e0113907aeaa72db4598df84e939e683aef7a1f20049b98133b9ab598f
-
Filesize
255KB
MD5a2e00a07ead07c292390e5708b6f6a9a
SHA1890cb8d010072831174cb1798cb579f2c57a46a7
SHA256de339ac88f8ce2bfab1bade4a086b87952f1209b11842195d1165891a8059e4a
SHA5122752c5ec05b07e3051b176c52313757704a98254551e8344eaf8512ee3e4c46e21d723e0113907aeaa72db4598df84e939e683aef7a1f20049b98133b9ab598f
-
Filesize
255KB
MD5b03fe31d658829ea1848d16b6ce76ceb
SHA1905e91d27c05ebdba41b6df3c19c63b3facd9806
SHA25678f065184af6112dc84327a5a6772ff9a9e47a39752a528ea1144cc4fec111c3
SHA512bce4eb7b1694e3396b5c9cba7db0ce117f124552193ab2b01ba1cf51277fdb479a5decd398c6a06fae37b61a8b9f7d11c8d3a7c4cc6e6acd8284da1089320c0f
-
Filesize
255KB
MD5b03fe31d658829ea1848d16b6ce76ceb
SHA1905e91d27c05ebdba41b6df3c19c63b3facd9806
SHA25678f065184af6112dc84327a5a6772ff9a9e47a39752a528ea1144cc4fec111c3
SHA512bce4eb7b1694e3396b5c9cba7db0ce117f124552193ab2b01ba1cf51277fdb479a5decd398c6a06fae37b61a8b9f7d11c8d3a7c4cc6e6acd8284da1089320c0f
-
Filesize
255KB
MD571b7a384ccdb55e539706d7b8d3a2165
SHA13d990bb88d1d2a2e5c9023e6176ef7c0d6600b99
SHA25695720a5d8f68d945c48b2fb06c7051ee184433705eb09eb549ea2c71bc5aac13
SHA5124cad30ba88b7a4ae7937d114a8d09791c694f53e589f61a95c795009873a1b291e2f493f6b8a34690400a6e576bb43955877e360f928c4c03292e00bfb04a959
-
Filesize
255KB
MD571b7a384ccdb55e539706d7b8d3a2165
SHA13d990bb88d1d2a2e5c9023e6176ef7c0d6600b99
SHA25695720a5d8f68d945c48b2fb06c7051ee184433705eb09eb549ea2c71bc5aac13
SHA5124cad30ba88b7a4ae7937d114a8d09791c694f53e589f61a95c795009873a1b291e2f493f6b8a34690400a6e576bb43955877e360f928c4c03292e00bfb04a959
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5d835609b2162c844e219c08700a5f276
SHA11592a355536473da629c58683a47da833232e973
SHA256244dd15406ceb08151bcbb007ccc850bc56c0524008ca9a9bc5bd222d28db2d8
SHA51241b9ca4d6fab4a777172e37a671a718efb1e0748fa55c005f87e3702bb9e0b3b2a1115a9aaf9e624ed6bf6eacff42cbc1dcf3f6b4229cd67321bea77a0db5cd9
-
Filesize
255KB
MD5a2e00a07ead07c292390e5708b6f6a9a
SHA1890cb8d010072831174cb1798cb579f2c57a46a7
SHA256de339ac88f8ce2bfab1bade4a086b87952f1209b11842195d1165891a8059e4a
SHA5122752c5ec05b07e3051b176c52313757704a98254551e8344eaf8512ee3e4c46e21d723e0113907aeaa72db4598df84e939e683aef7a1f20049b98133b9ab598f
-
Filesize
255KB
MD5a2e00a07ead07c292390e5708b6f6a9a
SHA1890cb8d010072831174cb1798cb579f2c57a46a7
SHA256de339ac88f8ce2bfab1bade4a086b87952f1209b11842195d1165891a8059e4a
SHA5122752c5ec05b07e3051b176c52313757704a98254551e8344eaf8512ee3e4c46e21d723e0113907aeaa72db4598df84e939e683aef7a1f20049b98133b9ab598f
-
Filesize
255KB
MD5b03fe31d658829ea1848d16b6ce76ceb
SHA1905e91d27c05ebdba41b6df3c19c63b3facd9806
SHA25678f065184af6112dc84327a5a6772ff9a9e47a39752a528ea1144cc4fec111c3
SHA512bce4eb7b1694e3396b5c9cba7db0ce117f124552193ab2b01ba1cf51277fdb479a5decd398c6a06fae37b61a8b9f7d11c8d3a7c4cc6e6acd8284da1089320c0f
-
Filesize
255KB
MD571b7a384ccdb55e539706d7b8d3a2165
SHA13d990bb88d1d2a2e5c9023e6176ef7c0d6600b99
SHA25695720a5d8f68d945c48b2fb06c7051ee184433705eb09eb549ea2c71bc5aac13
SHA5124cad30ba88b7a4ae7937d114a8d09791c694f53e589f61a95c795009873a1b291e2f493f6b8a34690400a6e576bb43955877e360f928c4c03292e00bfb04a959