Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
1af82dcb653fdb7b76bda1abfdedbbfe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1af82dcb653fdb7b76bda1abfdedbbfe.exe
Resource
win10v2004-20231222-en
General
-
Target
1af82dcb653fdb7b76bda1abfdedbbfe.exe
-
Size
512KB
-
MD5
1af82dcb653fdb7b76bda1abfdedbbfe
-
SHA1
0a4dc744486aeb247e582bdbae41091cc624bc2a
-
SHA256
289fb07890b4fbca5d0bd8a9e5e80a8f2e4d29ebc7c937b8b16e50fdeafac831
-
SHA512
1d3b9a17b2b2419cee8edd4748ad7d8532accc549a69ca4bc5d2922f902c61aae8df9b24ff17dc73d35f41d5fa0eeb092cf3432ce72e57ad100ae88be5f1106e
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm55
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" pomsglqadr.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pomsglqadr.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" pomsglqadr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" pomsglqadr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" pomsglqadr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" pomsglqadr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" pomsglqadr.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pomsglqadr.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 5 IoCs
pid Process 2788 pomsglqadr.exe 2748 tucarjmoqoxmizc.exe 2988 tmvvagzm.exe 2628 patikrfsnybfn.exe 2592 tmvvagzm.exe -
Loads dropped DLL 5 IoCs
pid Process 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2788 pomsglqadr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" pomsglqadr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" pomsglqadr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" pomsglqadr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" pomsglqadr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" pomsglqadr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" pomsglqadr.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xuxgneez = "pomsglqadr.exe" tucarjmoqoxmizc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\tuierdzu = "tucarjmoqoxmizc.exe" tucarjmoqoxmizc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "patikrfsnybfn.exe" tucarjmoqoxmizc.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\o: tmvvagzm.exe File opened (read-only) \??\g: tmvvagzm.exe File opened (read-only) \??\n: tmvvagzm.exe File opened (read-only) \??\p: tmvvagzm.exe File opened (read-only) \??\q: tmvvagzm.exe File opened (read-only) \??\r: pomsglqadr.exe File opened (read-only) \??\w: pomsglqadr.exe File opened (read-only) \??\a: tmvvagzm.exe File opened (read-only) \??\v: tmvvagzm.exe File opened (read-only) \??\l: pomsglqadr.exe File opened (read-only) \??\e: tmvvagzm.exe File opened (read-only) \??\o: tmvvagzm.exe File opened (read-only) \??\q: tmvvagzm.exe File opened (read-only) \??\x: tmvvagzm.exe File opened (read-only) \??\l: tmvvagzm.exe File opened (read-only) \??\r: tmvvagzm.exe File opened (read-only) \??\s: tmvvagzm.exe File opened (read-only) \??\x: pomsglqadr.exe File opened (read-only) \??\z: pomsglqadr.exe File opened (read-only) \??\i: tmvvagzm.exe File opened (read-only) \??\u: tmvvagzm.exe File opened (read-only) \??\x: tmvvagzm.exe File opened (read-only) \??\s: pomsglqadr.exe File opened (read-only) \??\u: pomsglqadr.exe File opened (read-only) \??\w: tmvvagzm.exe File opened (read-only) \??\i: pomsglqadr.exe File opened (read-only) \??\p: tmvvagzm.exe File opened (read-only) \??\r: tmvvagzm.exe File opened (read-only) \??\k: tmvvagzm.exe File opened (read-only) \??\b: pomsglqadr.exe File opened (read-only) \??\k: pomsglqadr.exe File opened (read-only) \??\y: pomsglqadr.exe File opened (read-only) \??\j: pomsglqadr.exe File opened (read-only) \??\v: tmvvagzm.exe File opened (read-only) \??\n: tmvvagzm.exe File opened (read-only) \??\p: pomsglqadr.exe File opened (read-only) \??\t: pomsglqadr.exe File opened (read-only) \??\h: tmvvagzm.exe File opened (read-only) \??\s: tmvvagzm.exe File opened (read-only) \??\z: tmvvagzm.exe File opened (read-only) \??\a: tmvvagzm.exe File opened (read-only) \??\g: pomsglqadr.exe File opened (read-only) \??\q: pomsglqadr.exe File opened (read-only) \??\b: tmvvagzm.exe File opened (read-only) \??\j: tmvvagzm.exe File opened (read-only) \??\m: pomsglqadr.exe File opened (read-only) \??\l: tmvvagzm.exe File opened (read-only) \??\w: tmvvagzm.exe File opened (read-only) \??\h: pomsglqadr.exe File opened (read-only) \??\y: tmvvagzm.exe File opened (read-only) \??\k: tmvvagzm.exe File opened (read-only) \??\b: tmvvagzm.exe File opened (read-only) \??\m: tmvvagzm.exe File opened (read-only) \??\y: tmvvagzm.exe File opened (read-only) \??\n: pomsglqadr.exe File opened (read-only) \??\o: pomsglqadr.exe File opened (read-only) \??\j: tmvvagzm.exe File opened (read-only) \??\e: tmvvagzm.exe File opened (read-only) \??\h: tmvvagzm.exe File opened (read-only) \??\g: tmvvagzm.exe File opened (read-only) \??\u: tmvvagzm.exe File opened (read-only) \??\i: tmvvagzm.exe File opened (read-only) \??\t: tmvvagzm.exe File opened (read-only) \??\z: tmvvagzm.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" pomsglqadr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" pomsglqadr.exe -
AutoIT Executable 19 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2416-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x00360000000152bc-5.dat autoit_exe behavioral1/files/0x0009000000012270-17.dat autoit_exe behavioral1/files/0x00360000000152bc-21.dat autoit_exe behavioral1/files/0x0009000000012270-20.dat autoit_exe behavioral1/files/0x0007000000015606-32.dat autoit_exe behavioral1/files/0x000700000001562f-38.dat autoit_exe behavioral1/files/0x000700000001562f-33.dat autoit_exe behavioral1/files/0x0007000000015606-29.dat autoit_exe behavioral1/files/0x000700000001562f-41.dat autoit_exe behavioral1/files/0x0007000000015606-40.dat autoit_exe behavioral1/files/0x00360000000152bc-28.dat autoit_exe behavioral1/files/0x0007000000015606-43.dat autoit_exe behavioral1/files/0x0007000000015606-42.dat autoit_exe behavioral1/files/0x00360000000152bc-26.dat autoit_exe behavioral1/files/0x0009000000012270-24.dat autoit_exe behavioral1/files/0x00060000000167e4-76.dat autoit_exe behavioral1/files/0x00060000000167e4-74.dat autoit_exe behavioral1/files/0x00060000000165e4-70.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\patikrfsnybfn.exe 1af82dcb653fdb7b76bda1abfdedbbfe.exe File opened for modification C:\Windows\SysWOW64\patikrfsnybfn.exe 1af82dcb653fdb7b76bda1abfdedbbfe.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll pomsglqadr.exe File created C:\Windows\SysWOW64\pomsglqadr.exe 1af82dcb653fdb7b76bda1abfdedbbfe.exe File opened for modification C:\Windows\SysWOW64\pomsglqadr.exe 1af82dcb653fdb7b76bda1abfdedbbfe.exe File created C:\Windows\SysWOW64\tucarjmoqoxmizc.exe 1af82dcb653fdb7b76bda1abfdedbbfe.exe File opened for modification C:\Windows\SysWOW64\tmvvagzm.exe 1af82dcb653fdb7b76bda1abfdedbbfe.exe File opened for modification C:\Windows\SysWOW64\tucarjmoqoxmizc.exe 1af82dcb653fdb7b76bda1abfdedbbfe.exe File created C:\Windows\SysWOW64\tmvvagzm.exe 1af82dcb653fdb7b76bda1abfdedbbfe.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification C:\Program Files\SearchFormat.nal tmvvagzm.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe tmvvagzm.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe tmvvagzm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal tmvvagzm.exe File opened for modification \??\c:\Program Files\SearchFormat.doc.exe tmvvagzm.exe File created \??\c:\Program Files\SearchFormat.doc.exe tmvvagzm.exe File opened for modification \??\c:\Program Files\SearchFormat.doc.exe tmvvagzm.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe tmvvagzm.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe tmvvagzm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe tmvvagzm.exe File opened for modification C:\Program Files\SearchFormat.nal tmvvagzm.exe File opened for modification C:\Program Files\SearchFormat.doc.exe tmvvagzm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal tmvvagzm.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe tmvvagzm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe tmvvagzm.exe File opened for modification C:\Program Files\SearchFormat.doc.exe tmvvagzm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe tmvvagzm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal tmvvagzm.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe tmvvagzm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal tmvvagzm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe tmvvagzm.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 1af82dcb653fdb7b76bda1abfdedbbfe.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" pomsglqadr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" pomsglqadr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh pomsglqadr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BC8F9B1F911F198840B3B4B869639E5B38E02FB4260034FE1BE45EA08A9" 1af82dcb653fdb7b76bda1abfdedbbfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E08668B0FF6C21DFD27ED0D28A7C9060" 1af82dcb653fdb7b76bda1abfdedbbfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" pomsglqadr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat pomsglqadr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf pomsglqadr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2656 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2788 pomsglqadr.exe 2788 pomsglqadr.exe 2788 pomsglqadr.exe 2788 pomsglqadr.exe 2788 pomsglqadr.exe 2748 tucarjmoqoxmizc.exe 2748 tucarjmoqoxmizc.exe 2748 tucarjmoqoxmizc.exe 2748 tucarjmoqoxmizc.exe 2748 tucarjmoqoxmizc.exe 2988 tmvvagzm.exe 2988 tmvvagzm.exe 2988 tmvvagzm.exe 2988 tmvvagzm.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2592 tmvvagzm.exe 2592 tmvvagzm.exe 2592 tmvvagzm.exe 2592 tmvvagzm.exe 2748 tucarjmoqoxmizc.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2748 tucarjmoqoxmizc.exe 2748 tucarjmoqoxmizc.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2748 tucarjmoqoxmizc.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2748 tucarjmoqoxmizc.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2748 tucarjmoqoxmizc.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2748 tucarjmoqoxmizc.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2748 tucarjmoqoxmizc.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2748 tucarjmoqoxmizc.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2748 tucarjmoqoxmizc.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2748 tucarjmoqoxmizc.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2748 tucarjmoqoxmizc.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 920 explorer.exe Token: SeShutdownPrivilege 920 explorer.exe Token: SeShutdownPrivilege 920 explorer.exe Token: SeShutdownPrivilege 920 explorer.exe Token: SeShutdownPrivilege 920 explorer.exe Token: SeShutdownPrivilege 920 explorer.exe Token: SeShutdownPrivilege 920 explorer.exe Token: SeShutdownPrivilege 920 explorer.exe Token: SeShutdownPrivilege 920 explorer.exe Token: SeShutdownPrivilege 920 explorer.exe Token: SeShutdownPrivilege 920 explorer.exe Token: SeShutdownPrivilege 920 explorer.exe -
Suspicious use of FindShellTrayWindow 46 IoCs
pid Process 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2788 pomsglqadr.exe 2788 pomsglqadr.exe 2788 pomsglqadr.exe 2748 tucarjmoqoxmizc.exe 2748 tucarjmoqoxmizc.exe 2748 tucarjmoqoxmizc.exe 2988 tmvvagzm.exe 2988 tmvvagzm.exe 2988 tmvvagzm.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2592 tmvvagzm.exe 2592 tmvvagzm.exe 2592 tmvvagzm.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 2788 pomsglqadr.exe 2788 pomsglqadr.exe 2788 pomsglqadr.exe 2748 tucarjmoqoxmizc.exe 2748 tucarjmoqoxmizc.exe 2748 tucarjmoqoxmizc.exe 2988 tmvvagzm.exe 2988 tmvvagzm.exe 2988 tmvvagzm.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 2628 patikrfsnybfn.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe 920 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2656 WINWORD.EXE 2656 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2788 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 28 PID 2416 wrote to memory of 2788 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 28 PID 2416 wrote to memory of 2788 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 28 PID 2416 wrote to memory of 2788 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 28 PID 2416 wrote to memory of 2748 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 29 PID 2416 wrote to memory of 2748 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 29 PID 2416 wrote to memory of 2748 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 29 PID 2416 wrote to memory of 2748 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 29 PID 2416 wrote to memory of 2988 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 30 PID 2416 wrote to memory of 2988 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 30 PID 2416 wrote to memory of 2988 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 30 PID 2416 wrote to memory of 2988 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 30 PID 2416 wrote to memory of 2628 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 31 PID 2416 wrote to memory of 2628 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 31 PID 2416 wrote to memory of 2628 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 31 PID 2416 wrote to memory of 2628 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 31 PID 2788 wrote to memory of 2592 2788 pomsglqadr.exe 32 PID 2788 wrote to memory of 2592 2788 pomsglqadr.exe 32 PID 2788 wrote to memory of 2592 2788 pomsglqadr.exe 32 PID 2788 wrote to memory of 2592 2788 pomsglqadr.exe 32 PID 2416 wrote to memory of 2656 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 33 PID 2416 wrote to memory of 2656 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 33 PID 2416 wrote to memory of 2656 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 33 PID 2416 wrote to memory of 2656 2416 1af82dcb653fdb7b76bda1abfdedbbfe.exe 33 PID 2656 wrote to memory of 2200 2656 WINWORD.EXE 37 PID 2656 wrote to memory of 2200 2656 WINWORD.EXE 37 PID 2656 wrote to memory of 2200 2656 WINWORD.EXE 37 PID 2656 wrote to memory of 2200 2656 WINWORD.EXE 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1af82dcb653fdb7b76bda1abfdedbbfe.exe"C:\Users\Admin\AppData\Local\Temp\1af82dcb653fdb7b76bda1abfdedbbfe.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\pomsglqadr.exepomsglqadr.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\tmvvagzm.exeC:\Windows\system32\tmvvagzm.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2592
-
-
-
C:\Windows\SysWOW64\tucarjmoqoxmizc.exetucarjmoqoxmizc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2748
-
-
C:\Windows\SysWOW64\tmvvagzm.exetmvvagzm.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2988
-
-
C:\Windows\SysWOW64\patikrfsnybfn.exepatikrfsnybfn.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2628
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2200
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:920
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110KB
MD5009f8b68bad69af59cad29fb86f70817
SHA149a02f65bdaf47c28760ec41e619489da8c6f90e
SHA256c364b16f5e8b4d8472f14f94a28ac085eb70fcd392a29ae33fe839fe7fe83ba8
SHA5124625b3de42d258146c7bba42c971cf58b6d166f7dc098a99df0ea31df349c2cac3e24e244208172c58fef634cf21db4e96881b738e43348be7c9e40e6a91a2f1
-
Filesize
85KB
MD5328820f13b21271afa7548dd63f0bcbf
SHA1448b29b6a017b753837601d034d9aafc3a9ae0a9
SHA2565d8d9c13b2e11566490755a3f3b9bdfaa08e910820bd6ce0858173112166025a
SHA51285bc9f2a4c512cb8ae56482844482d61871424308e3cc19c169051ed33e4bcc1d4fbcc02a0dee7c5f47d8aa61d2086a557d132f181eee24cc3dea455d79078e6
-
Filesize
160KB
MD5d2c5bc698b712a3f1a74121301851078
SHA15fbe998db4f7d0618bf2217289ebbe9daacb525c
SHA25653414b7e48af33be8d44e4f7fd6025c40852314daf1321c05ae02014bc878021
SHA5127f9d5732b708727b538ae86e4405e3d1e533587c361c12358d172c965962cd600ee282270f15e80bd44a17d8dc230a29ea569ddd69dd1f52f146a186bf5bcb71
-
Filesize
187KB
MD581d4481525fe9eccb28942a084a46f63
SHA189b31dfdd76db8251f311da55ecf225cf44d6d35
SHA25637c4eae35060afe91365374a869112f149ffac2ab0db0747a42fae53ad0cd61d
SHA51210580e7854b5d65cb046a3c672bd724cf9073228a20b53e6c67dfe14bae6207a7a407819cc548ec8dc1d80b0636a1f44e6bd90fa57f30ff81bc143db05b8ba12
-
Filesize
270KB
MD5006ccbf8e808364f82a294b5ccffef46
SHA15569c7fde3333c099a62e350b587a2bc5a40b0b6
SHA25685a6882620b74694768db1cfc32fbefe75f7e344f156dce217e4b2c4845eeb09
SHA512d83a6f874bdf9f5fecad45bf9c2e211bd44196c21d73f438fe6a00aa4948c7b5467ddcb058fbc4e2d221791f2699727879f208945a7cdd9a2d7971b769c00012
-
Filesize
201KB
MD586afecf9ae6275c385deae87e10e5956
SHA188bd5e1d7e818994195d788080ca1b8ae531a389
SHA256de5cdc015f741ed0ad916a4b50075724e38e682dfce995007fa2b6c6f73dec83
SHA512ddcf188bfecc0225ef13697561055a4cbfa6ab7e4d255ecf84f9be2a17f487e42771a6e9ab57ab60b7ba8218dc4a4c856946249805647b462de319b643893491
-
Filesize
218KB
MD5a2251f4e685c4a26195758aa13c129c7
SHA1851cdcbc4337ddac3d05450905f9b0228980f403
SHA256887ef9bda3609f99686b75b8fdc4b9572449f07de17e4e4e591b301f88a7c81d
SHA512641d15f73223760f7226f1b79ad83500d08d54de7ba7778ed63ddf84fe3bc6d9ca3d882d4487c1a73034abcfb6a0b456e9048c270b59c75fdd5e077498630464
-
Filesize
140KB
MD55bbb7aa5eb6499905906089647b0a062
SHA1c1cc5ce5b94fbf1d132552d513d6597c8d6e2f11
SHA25643813f797f24e078ddffe9b9601ecc5843cc2758ed8f06b4d45b63da56f5ce85
SHA51208cf301f27232369f688d35f2ce023cdc631e263e20ddc745ee26373be30bca1578b2b5b3b7b67894f93f866f0e55aa64e163dab0c01fe1d8e800d489a565bae
-
Filesize
197KB
MD536649300e19561c7761c05d14a0f5ee6
SHA17f9a05e634cce9abe5fba7951d84fdd7244d7b4a
SHA2565ca7ca648fe6129357d9a3d326278804f5b5ea6c072317999b4b93636ac86eff
SHA51233cdc8423cec6bde0fae2076a3608d73557ffe23338a47fac59b86fa02ca12a9c919ddef28633d46dc9f61437ca0bf79300c14e849162cd6b344355699bded71
-
Filesize
202KB
MD5422b5ccce4b3db37ca222b69abd256ab
SHA1b0b12e771885759b03bebdba8f727b699a345057
SHA2563a961386ec974c2c3ef22a05bb8aab6cf2bfd65f1f87992d00c6398c45f32e19
SHA51296bc6e1f5536584e0aee87a56bc72511c89830465926a961467ca139ac7b6f5d3c77d71c0b58bb49280d96b55326e9677e4f53d47c081c28562fcd7dd3c4533a
-
Filesize
261KB
MD57532b77c98033f52ab44807bc3bef32e
SHA1332dc85c01bcf008e71ab62e048701866e6c7399
SHA2566f30b86cf720a5614a17d99437280ae81448c7e5d7cf818b6677d48795361211
SHA5122aedf421070cd68097949c864013d96ec9d59178f2caf5f6e8366ee9ef1d73a5d5c6ed4151a170c0d923bf9d736714106f22254468c5a0206a0eb638c055443d
-
Filesize
312KB
MD507190537549264329d3fba8d82462b60
SHA11d1bfdff7daf5514bd90a387cf4ecca27a4d3af8
SHA256b32427ec508cba1b50f81c373f4e6165d2e0a67fef39762afbe1e667d4e0ddc0
SHA5121c6acd2ed634086785163b1c142cec31ec7885a42b985b4da99a1c7c7104390127ba150bb07445eb35d47673c878cd43f092b42dd85781ceb4a720924e1ff7a9
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
105KB
MD5600ebe265f61003ff05b266a68c49f9a
SHA103bc1ad1610af154b3d936201fdb39aa01444e5d
SHA25681e3dd826f95c2297fe66ed66d5bb9f22bdf1743c2945ec6b70e071eafe1a2b1
SHA512d22ac92060b45320f4e4809ac1c4280af891e6104b9ee8fc05f60edd639fc3a6f446a13f2d0e613d642ac37bb2e9d03242820611d38455b520e20a8f4945d867
-
Filesize
295KB
MD5f50993c63e4929cdb9f0036a11181204
SHA15959bd47ae12907676995905c642ff70ec605016
SHA2566aae046986f78aa24ec765151b363be1e90e84ec9a0ff72331cdb4426c207f2d
SHA512dcaaf8e819f1cb0ca2365b803fb82da32b979b87ee14de9d3916fd307420ed9374c9d3611900a6fb7bf0d7bbfeb21d8f24488ba34b0adbd3afa546183f221da9
-
Filesize
318KB
MD5da657497fd2bdd826116b74b371e5637
SHA1e2c45907d6e721e9cd8f223bae6182debc18429f
SHA2567b3d14d329ed51bc8938b56d616694082b1a9a1bb60467c2ee141a39ca9deb27
SHA5122ca6e7da9f89cf2bb79041adfe7cfb8ccf8ca9e279f0857fcca53cf182ff66b6298915dc296f676d1393b7bf211d281225f88dedaa6cd55460ddc0b0db426fc6
-
Filesize
203KB
MD53145eba33852b6ce557fd5aaa6bcd4dd
SHA1a8240a69ca4355b970761116723dd06ced599eae
SHA256beac68cf1d79d63d1fcc6041ddfabaa93d75f53c619657687d1a6f83533d9c6a
SHA51252077a227c834aca2ac8dc4b34588b5aff274a9400c0f63a24b8789a356300efd62cf8b42fa9126e4ccb5a73c9d77c5839d3d72952a781da14eadb141a5cdd8e
-
Filesize
152KB
MD53866b6472bc57a9ff6fb25dca20185db
SHA1629fcac71397fc5ce2d63baaee45a934cfe31245
SHA256bc6740c78a35e6e989dafdf53301cc5c2d7837b04c04c18588f66051e7bd28ed
SHA5124198b6983d802c3730d44014dd04bd9a56d29021f4aea45f8a77ebd86fc4fb11642250769d376438b21d9dc2bab26e1b99980b9788c36797ea6f8c5370515561
-
Filesize
174KB
MD5bd34abfeb921c8a8120b76801b312308
SHA1eb6541d321401020c9ed8f250f4ff9946e1d04de
SHA25676b51910415f9572b6a622d7e23654a1689e72c154e8f1e612a147f1f5fa2151
SHA512ebca676070f619f98728218ed07684464d0fb2149158af1206d58bdb2f1cd320ca013d1dcf70edaceb78fac72132fa5867876d85a922315064e13c59aee93a42