Analysis
-
max time kernel
239s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
1ad801b4d7b2a6859ff4280df6c87804.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ad801b4d7b2a6859ff4280df6c87804.exe
Resource
win10v2004-20231215-en
General
-
Target
1ad801b4d7b2a6859ff4280df6c87804.exe
-
Size
512KB
-
MD5
1ad801b4d7b2a6859ff4280df6c87804
-
SHA1
5e0f2497d3b67dbb692adaade0a0e551d88d2c23
-
SHA256
799657ac1abcb7aeaf780cafbf07aef9d78faf415033941a5df2da27254c77bc
-
SHA512
b52cc01dd6ac437f592d1c467329a3c7494261ef01b8fb2e23a25b1ee48e7bf70acd6375cfa7a3468656123f9df4fee56bee6008bb860639e7eddae49903bd77
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6l:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5o
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" rlxbyguymt.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rlxbyguymt.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rlxbyguymt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rlxbyguymt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rlxbyguymt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rlxbyguymt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" rlxbyguymt.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" rlxbyguymt.exe -
Executes dropped EXE 5 IoCs
pid Process 1992 rlxbyguymt.exe 1648 exhcbrawhgookqk.exe 1936 yqewwdyp.exe 2536 smioeoufdsbvz.exe 2508 yqewwdyp.exe -
Loads dropped DLL 5 IoCs
pid Process 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 1992 rlxbyguymt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rlxbyguymt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" rlxbyguymt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rlxbyguymt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rlxbyguymt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rlxbyguymt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" rlxbyguymt.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\abjqryvd = "rlxbyguymt.exe" exhcbrawhgookqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\hglmyeme = "exhcbrawhgookqk.exe" exhcbrawhgookqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "smioeoufdsbvz.exe" exhcbrawhgookqk.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\m: yqewwdyp.exe File opened (read-only) \??\r: yqewwdyp.exe File opened (read-only) \??\e: yqewwdyp.exe File opened (read-only) \??\l: yqewwdyp.exe File opened (read-only) \??\j: yqewwdyp.exe File opened (read-only) \??\r: yqewwdyp.exe File opened (read-only) \??\z: rlxbyguymt.exe File opened (read-only) \??\k: rlxbyguymt.exe File opened (read-only) \??\m: rlxbyguymt.exe File opened (read-only) \??\x: rlxbyguymt.exe File opened (read-only) \??\q: yqewwdyp.exe File opened (read-only) \??\s: yqewwdyp.exe File opened (read-only) \??\e: yqewwdyp.exe File opened (read-only) \??\k: yqewwdyp.exe File opened (read-only) \??\p: yqewwdyp.exe File opened (read-only) \??\y: yqewwdyp.exe File opened (read-only) \??\b: yqewwdyp.exe File opened (read-only) \??\u: yqewwdyp.exe File opened (read-only) \??\y: rlxbyguymt.exe File opened (read-only) \??\m: yqewwdyp.exe File opened (read-only) \??\n: rlxbyguymt.exe File opened (read-only) \??\u: rlxbyguymt.exe File opened (read-only) \??\p: rlxbyguymt.exe File opened (read-only) \??\w: yqewwdyp.exe File opened (read-only) \??\x: yqewwdyp.exe File opened (read-only) \??\g: yqewwdyp.exe File opened (read-only) \??\y: yqewwdyp.exe File opened (read-only) \??\g: rlxbyguymt.exe File opened (read-only) \??\b: rlxbyguymt.exe File opened (read-only) \??\h: rlxbyguymt.exe File opened (read-only) \??\l: yqewwdyp.exe File opened (read-only) \??\n: yqewwdyp.exe File opened (read-only) \??\t: yqewwdyp.exe File opened (read-only) \??\o: yqewwdyp.exe File opened (read-only) \??\s: rlxbyguymt.exe File opened (read-only) \??\k: yqewwdyp.exe File opened (read-only) \??\n: yqewwdyp.exe File opened (read-only) \??\p: yqewwdyp.exe File opened (read-only) \??\t: yqewwdyp.exe File opened (read-only) \??\u: yqewwdyp.exe File opened (read-only) \??\o: yqewwdyp.exe File opened (read-only) \??\o: rlxbyguymt.exe File opened (read-only) \??\j: yqewwdyp.exe File opened (read-only) \??\x: yqewwdyp.exe File opened (read-only) \??\i: yqewwdyp.exe File opened (read-only) \??\l: rlxbyguymt.exe File opened (read-only) \??\b: yqewwdyp.exe File opened (read-only) \??\h: yqewwdyp.exe File opened (read-only) \??\h: yqewwdyp.exe File opened (read-only) \??\q: yqewwdyp.exe File opened (read-only) \??\z: yqewwdyp.exe File opened (read-only) \??\v: rlxbyguymt.exe File opened (read-only) \??\g: yqewwdyp.exe File opened (read-only) \??\e: rlxbyguymt.exe File opened (read-only) \??\i: rlxbyguymt.exe File opened (read-only) \??\q: rlxbyguymt.exe File opened (read-only) \??\z: yqewwdyp.exe File opened (read-only) \??\i: yqewwdyp.exe File opened (read-only) \??\v: yqewwdyp.exe File opened (read-only) \??\a: rlxbyguymt.exe File opened (read-only) \??\v: yqewwdyp.exe File opened (read-only) \??\j: rlxbyguymt.exe File opened (read-only) \??\r: rlxbyguymt.exe File opened (read-only) \??\a: yqewwdyp.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" rlxbyguymt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" rlxbyguymt.exe -
AutoIT Executable 17 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2768-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x001000000000b1f5-5.dat autoit_exe behavioral1/files/0x0004000000004ed7-17.dat autoit_exe behavioral1/files/0x0004000000004ed7-20.dat autoit_exe behavioral1/files/0x001000000000b1f5-26.dat autoit_exe behavioral1/files/0x000a000000014615-24.dat autoit_exe behavioral1/files/0x000a000000014615-30.dat autoit_exe behavioral1/files/0x0004000000004ed7-31.dat autoit_exe behavioral1/files/0x001000000000b1f5-33.dat autoit_exe behavioral1/files/0x0036000000014ad2-34.dat autoit_exe behavioral1/files/0x000a000000014615-40.dat autoit_exe behavioral1/files/0x0036000000014ad2-38.dat autoit_exe behavioral1/files/0x0036000000014ad2-41.dat autoit_exe behavioral1/files/0x000a000000014615-42.dat autoit_exe behavioral1/files/0x000a000000014615-43.dat autoit_exe behavioral1/files/0x00030000000001bf-93.dat autoit_exe behavioral1/files/0x000600000001660f-99.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\yqewwdyp.exe 1ad801b4d7b2a6859ff4280df6c87804.exe File opened for modification C:\Windows\SysWOW64\exhcbrawhgookqk.exe 1ad801b4d7b2a6859ff4280df6c87804.exe File opened for modification C:\Windows\SysWOW64\yqewwdyp.exe 1ad801b4d7b2a6859ff4280df6c87804.exe File created C:\Windows\SysWOW64\smioeoufdsbvz.exe 1ad801b4d7b2a6859ff4280df6c87804.exe File opened for modification C:\Windows\SysWOW64\smioeoufdsbvz.exe 1ad801b4d7b2a6859ff4280df6c87804.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll rlxbyguymt.exe File created C:\Windows\SysWOW64\rlxbyguymt.exe 1ad801b4d7b2a6859ff4280df6c87804.exe File opened for modification C:\Windows\SysWOW64\rlxbyguymt.exe 1ad801b4d7b2a6859ff4280df6c87804.exe File created C:\Windows\SysWOW64\exhcbrawhgookqk.exe 1ad801b4d7b2a6859ff4280df6c87804.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe yqewwdyp.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe yqewwdyp.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal yqewwdyp.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe yqewwdyp.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe yqewwdyp.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe yqewwdyp.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe yqewwdyp.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal yqewwdyp.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe yqewwdyp.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe yqewwdyp.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal yqewwdyp.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe yqewwdyp.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe yqewwdyp.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe yqewwdyp.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal yqewwdyp.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 1ad801b4d7b2a6859ff4280df6c87804.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 1ad801b4d7b2a6859ff4280df6c87804.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" rlxbyguymt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf rlxbyguymt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat rlxbyguymt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" rlxbyguymt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACFF9BCF965F1E3830B3A43869A3E96B0FE028843670349E1C5459A08A1" 1ad801b4d7b2a6859ff4280df6c87804.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" rlxbyguymt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F06BB7FE6E22D9D172D1A78B7F9111" 1ad801b4d7b2a6859ff4280df6c87804.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1480 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 1992 rlxbyguymt.exe 1992 rlxbyguymt.exe 1992 rlxbyguymt.exe 1992 rlxbyguymt.exe 1992 rlxbyguymt.exe 1648 exhcbrawhgookqk.exe 1648 exhcbrawhgookqk.exe 1648 exhcbrawhgookqk.exe 1648 exhcbrawhgookqk.exe 1648 exhcbrawhgookqk.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 1936 yqewwdyp.exe 1936 yqewwdyp.exe 1936 yqewwdyp.exe 1936 yqewwdyp.exe 2508 yqewwdyp.exe 2508 yqewwdyp.exe 2508 yqewwdyp.exe 2508 yqewwdyp.exe 1648 exhcbrawhgookqk.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 1648 exhcbrawhgookqk.exe 1648 exhcbrawhgookqk.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 1648 exhcbrawhgookqk.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 1648 exhcbrawhgookqk.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 1648 exhcbrawhgookqk.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 1648 exhcbrawhgookqk.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 1648 exhcbrawhgookqk.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 1648 exhcbrawhgookqk.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 1648 exhcbrawhgookqk.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 1648 exhcbrawhgookqk.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 1648 exhcbrawhgookqk.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 1992 rlxbyguymt.exe 1992 rlxbyguymt.exe 1992 rlxbyguymt.exe 1648 exhcbrawhgookqk.exe 1648 exhcbrawhgookqk.exe 1648 exhcbrawhgookqk.exe 1936 yqewwdyp.exe 2536 smioeoufdsbvz.exe 1936 yqewwdyp.exe 1936 yqewwdyp.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 2508 yqewwdyp.exe 2508 yqewwdyp.exe 2508 yqewwdyp.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 1992 rlxbyguymt.exe 1992 rlxbyguymt.exe 1992 rlxbyguymt.exe 1648 exhcbrawhgookqk.exe 1648 exhcbrawhgookqk.exe 1648 exhcbrawhgookqk.exe 1936 yqewwdyp.exe 2536 smioeoufdsbvz.exe 1936 yqewwdyp.exe 1936 yqewwdyp.exe 2536 smioeoufdsbvz.exe 2536 smioeoufdsbvz.exe 2508 yqewwdyp.exe 2508 yqewwdyp.exe 2508 yqewwdyp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1480 WINWORD.EXE 1480 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2768 wrote to memory of 1992 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 28 PID 2768 wrote to memory of 1992 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 28 PID 2768 wrote to memory of 1992 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 28 PID 2768 wrote to memory of 1992 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 28 PID 2768 wrote to memory of 1648 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 30 PID 2768 wrote to memory of 1648 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 30 PID 2768 wrote to memory of 1648 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 30 PID 2768 wrote to memory of 1648 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 30 PID 2768 wrote to memory of 1936 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 29 PID 2768 wrote to memory of 1936 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 29 PID 2768 wrote to memory of 1936 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 29 PID 2768 wrote to memory of 1936 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 29 PID 2768 wrote to memory of 2536 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 31 PID 2768 wrote to memory of 2536 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 31 PID 2768 wrote to memory of 2536 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 31 PID 2768 wrote to memory of 2536 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 31 PID 1992 wrote to memory of 2508 1992 rlxbyguymt.exe 32 PID 1992 wrote to memory of 2508 1992 rlxbyguymt.exe 32 PID 1992 wrote to memory of 2508 1992 rlxbyguymt.exe 32 PID 1992 wrote to memory of 2508 1992 rlxbyguymt.exe 32 PID 2768 wrote to memory of 1480 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 33 PID 2768 wrote to memory of 1480 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 33 PID 2768 wrote to memory of 1480 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 33 PID 2768 wrote to memory of 1480 2768 1ad801b4d7b2a6859ff4280df6c87804.exe 33 PID 1480 wrote to memory of 2112 1480 WINWORD.EXE 37 PID 1480 wrote to memory of 2112 1480 WINWORD.EXE 37 PID 1480 wrote to memory of 2112 1480 WINWORD.EXE 37 PID 1480 wrote to memory of 2112 1480 WINWORD.EXE 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ad801b4d7b2a6859ff4280df6c87804.exe"C:\Users\Admin\AppData\Local\Temp\1ad801b4d7b2a6859ff4280df6c87804.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\rlxbyguymt.exerlxbyguymt.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\yqewwdyp.exeC:\Windows\system32\yqewwdyp.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2508
-
-
-
C:\Windows\SysWOW64\yqewwdyp.exeyqewwdyp.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1936
-
-
C:\Windows\SysWOW64\exhcbrawhgookqk.exeexhcbrawhgookqk.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1648
-
-
C:\Windows\SysWOW64\smioeoufdsbvz.exesmioeoufdsbvz.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2536
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2112
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5a59b3dcfd1d42acf540b2cc5776c6498
SHA1bb66a3bccf4709ad21ec05bc6ca964da56021e2e
SHA25656c3841f38987c371c271ef2b7fc38ed8a05500b22036d1ef1d03723b1a49b5d
SHA5123a490b1b74c981f2379606e1565aa7937cd903c7751c53a1dbb42b0b270d3c1406d46b091fc1efcc991d661be959c3bdac8f489bf3c26cf789e50c24dcac4372
-
Filesize
20KB
MD55ef4f3d2a856c607f06d7ff8398d1c2d
SHA1558c87f9e45594c39244033efb5a33ef0a5eddbc
SHA256dc49fd22ec8f2045d0fee39f74f8c516393727b2216d35732e5a1c1fcc1dcc34
SHA512e30d994aa8751d5a060b7ed977b60af3595496e99998dedd5fdc3b30927b858979161d03ac56a1b07fca80a20fb09bae4275832f90696f30d6bfdf65c4386ebe
-
Filesize
481KB
MD5b37cab498a02dd865ba6c37d5479446e
SHA1f07604d60f88049c09f2bb131607cec03fffaf20
SHA25625edbc87d35f56a1f08dd60312aac7990c99a99f5b88c4134eb6b690d57a029a
SHA512198a0c379d3332a4db6e85c40fd0a6c91f2351a8c153da447cd1007fbc702d95d4a32c5912e65d60ab40c438211cc78a7e4636a5ff92a2afadff059ba0f10882
-
Filesize
328KB
MD565a7d1696958ebd0704a9ff27c8526f4
SHA17dc930d77a22e002c34be2aba7bc53a8ea0dcacc
SHA2568c5e500962632f04273d3220845205971043fe4508bbd51a4349044a1168e8de
SHA5127a829dcb81feff163fe9759110e97615471727e4296da4e4437e4dbadc3aab372341b0370e12f59a13d5f51166a857d0573111d4c6566c14b6bd565bfa1047a6
-
Filesize
512KB
MD59ed892ed4550d9b3bf8e91da8e9a4a62
SHA1ac482517662e3b6bb25559c8da4b4a42d3b3370e
SHA25609314afdbff2e7572db9e9e058b452725ca1c1a8f05af3e9155b19e0766a9151
SHA5125c6e3400870e6706c7f5c6ed204e03314badc0e3f74d2a0f2e5d54eae43e77b3b3002d9f80fbefac1cee27d052a025feb7496bff77c7222b239a53737238afda
-
Filesize
512KB
MD5ee38d05de676993ca52b5416a4512fdd
SHA19917c50f0c322a0ece675ab688eec72c82134ee3
SHA25601cb146f2433483204ef97afca2e2ae1a99a1fe268d4c839b8b28d4156b71d06
SHA51201666dc75419b69248925d1e0e043e5d3b445eb4142101e46db7a4999d5fca22596c7edfca644fed6b2be0059004fea861d42070c3477fc915a9fd8aa53c93ae
-
Filesize
339KB
MD559fa91bdcbbe06b2b1039357095c3cd2
SHA1e1ee0a03c7c76d7bef2a9998dbab3a2d9ff2365d
SHA2562ba2d1bd7e6ccc89ee060f2e044086db98846e92ca54902fac14555cb1300671
SHA51219b0dc08270edb7b454b8f65ea19ebfad32278b5a7319b689a58d2a974651dea566e367de6519e1f7b5739ad7f1b69b9e4be7f07e1c3e150a59c22237eca6fac
-
Filesize
361KB
MD51e958abd1c71c147241f7485338f24a1
SHA1b88cc67fb408ebc6dbf3ddbc4d24531f25276d2e
SHA256abeb3cf34d9be8cd61baff0fd91b3ce3564d3ba03272fcb557ac5f2735dcb03a
SHA51254abeaf9ac4fa277c03aa25c86942a8da62670ec67a0979ca1705966dfa90842bc5d8534d561d86fecf7dd2fb2ad88ca7707074fa656206b7966c4e8de40054f
-
Filesize
253KB
MD5017160b03af0b81cdc30677bde89f50a
SHA17b4b6c73f663aab4d19c041abb0762b20ce8c4a2
SHA256c08e79a279afd533f4e6a4a5fc316b2e839510cca20bfe418cf34a0e2c7dde53
SHA51217d29a03d4ae550650d997272b261af0dc08541c9cd3d04ec8af03d201dcd9b6e50cae43d8408a9ca1eaa4a45b1f51ce8c61d3e38fcda85ed815a5e3e0a4673e
-
Filesize
337KB
MD54a056abae8c43b0c9a031d5297c27245
SHA17900c0e92208e37db2bd9178d9f43ffd74d5bd7a
SHA256c16005d22682e1b86ec740a19df15609263fc8e06703c1feb2dde5e59c9ffc79
SHA512a8dfaceb0540bfbf34c0b27c723639947e396bae0158d1607871b2a376a2df57daa0455f306d29ffdded5c44448a2717f76ce81620946b264de1360333800a15
-
Filesize
256KB
MD5fb98549a70a153849f270956682db592
SHA1cd886327ce56d0f3ffa2e1b9407c85c38c570704
SHA2560db13b4ab00c434bdb397f90c83264ce31161272e0d842cb6feeb22b457e0d81
SHA512a74b5ee4a18e782ec2b509720ececd6c9e50e769fe739f418ccf25c82b9ce4ec4e6f032fce57ed98786e284e41f64f401c4b54fad1d5d758392c20ce1d0d51f5
-
Filesize
357KB
MD5593de7cb68db1efc52ca74ff9dc0ae12
SHA17b6bd2c66eefe8facfcb92311ff9fd4a84833b7f
SHA2566c844d79f49916421ab2ae948fd17a5b6744d03a1598fe595bf1746f12dc7a10
SHA512ced07edaeca9a4a0ac3ffdcfd89ec7a22918d5ab4bee4f750f3ad27e93dbd6f1364418ed6e37ca4ce9a35efa191b98176126113d98d81fb7eaefced44fdc5985
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5ea6998ec077327f303207b72bf7ae92d
SHA139ff3d5cfdef0034c394e009ea0e500949debf86
SHA256f7b8f29193ec2a1d5581f1072c2fe94fa224fa848a33b6356433d706fed3332e
SHA512c65b489a5d038a57bf18b34d5c4df70acceb93cb8e313c699630a1d302d63914c9268b0cfb6dd6806a4843da897661c6eaf083aeeef4aa5f5c60902d3fe00594
-
Filesize
25KB
MD5653386ff863cf8117a3a0b96a162bff2
SHA16fba087e2e0996370a2de9b8c0b189a4969937ec
SHA2563c27576824f0b8c367c62b79d36595e644dbf1a8dcd41866d41df4ce07e84c1e
SHA5123ad69964cac87ba22a45c9f55fb464d4777c6689484a1313037e5b7238af380909dc92a3b1ea605144f092c96d3019fade6453749b26d46d062f346e3a9bc28f
-
Filesize
268KB
MD5f1116fcad746690a1cfc6b392f1d35c2
SHA1460034186f55ba959286a8419c12e0bab2f3e91c
SHA25670a3e932c20ceed6d83f81f3f2a675edfcab9a003ab02fe0f84cded831464903
SHA5120935969add789d18abf7cfd50677d4b7e270f7ef627c7417786c8ff19c7b9d3eb841aeb86500bbc3f47b18fa3f0d92cb0d7c2e9bcc28b2a76584d83f4a0f2d31
-
Filesize
512KB
MD515b62427bc31f09fe893afd0198249c3
SHA1de08ab0400c3192e5dcab12230cb25937d33407a
SHA2568b2e260504510a022b7c2de00a4386d659a510118633d5bc452912a8e1c6f1c1
SHA5121f9eb5c2a940967aae86068dbe3912adc66918ae5c591943a56c90377d89a0fb84e172b04a65c0be57146150144a569ee07c9ac138bddc15554b479f269fe363
-
Filesize
255KB
MD520ef7338f59802452313b1391173479e
SHA1e0b32e38834c97aa74b829d2cea50e8ea364963b
SHA256314fbb48a29cf90358c6b85f15d9d90ccad2956750da165ae22dfba8c58f1d9f
SHA51229bbc76e4d9066b95da765d90edf3563a7de0cfa03db8dfc9c85e503bf8b1d14a69e9b95b9ba70b61e51cbc7f4c366b16c928bd4537f1b136f11d3deee8814a9