Analysis
-
max time kernel
196s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
2979fb1ea36b4828faf9b0bc325be0f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2979fb1ea36b4828faf9b0bc325be0f5.exe
Resource
win10v2004-20231215-en
General
-
Target
2979fb1ea36b4828faf9b0bc325be0f5.exe
-
Size
512KB
-
MD5
2979fb1ea36b4828faf9b0bc325be0f5
-
SHA1
4ab0a49668ae43b5ac1c4f46dfcdeeeac65e1c91
-
SHA256
4ee6bd8bda75a3e0a097cd71919f5186cac99ab88b4d0b90021d69e88b6c5dc9
-
SHA512
1a00d9318c3cff3952064002ddd05c7b2cb59afe2da7e6fed1dc195583dc7b7f94a6c1da7d4e2b004168895e42aeb2436fb95950410a0dd64127e1b8e2e3eea8
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6D:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5m
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" tzauhhvdlj.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tzauhhvdlj.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tzauhhvdlj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tzauhhvdlj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tzauhhvdlj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tzauhhvdlj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" tzauhhvdlj.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" tzauhhvdlj.exe -
Executes dropped EXE 5 IoCs
pid Process 3024 tzauhhvdlj.exe 1916 jquadgvsteasmbk.exe 2848 mqpelzlk.exe 2732 truxyphzaodak.exe 1068 mqpelzlk.exe -
Loads dropped DLL 5 IoCs
pid Process 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 3024 tzauhhvdlj.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tzauhhvdlj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tzauhhvdlj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tzauhhvdlj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" tzauhhvdlj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tzauhhvdlj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" tzauhhvdlj.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ieysfjgc = "tzauhhvdlj.exe" jquadgvsteasmbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\eczwiebi = "jquadgvsteasmbk.exe" jquadgvsteasmbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "truxyphzaodak.exe" jquadgvsteasmbk.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\y: mqpelzlk.exe File opened (read-only) \??\e: tzauhhvdlj.exe File opened (read-only) \??\n: tzauhhvdlj.exe File opened (read-only) \??\p: tzauhhvdlj.exe File opened (read-only) \??\y: mqpelzlk.exe File opened (read-only) \??\q: mqpelzlk.exe File opened (read-only) \??\k: tzauhhvdlj.exe File opened (read-only) \??\h: mqpelzlk.exe File opened (read-only) \??\o: mqpelzlk.exe File opened (read-only) \??\r: mqpelzlk.exe File opened (read-only) \??\v: tzauhhvdlj.exe File opened (read-only) \??\a: mqpelzlk.exe File opened (read-only) \??\j: mqpelzlk.exe File opened (read-only) \??\l: tzauhhvdlj.exe File opened (read-only) \??\s: tzauhhvdlj.exe File opened (read-only) \??\x: tzauhhvdlj.exe File opened (read-only) \??\n: mqpelzlk.exe File opened (read-only) \??\b: mqpelzlk.exe File opened (read-only) \??\h: mqpelzlk.exe File opened (read-only) \??\m: mqpelzlk.exe File opened (read-only) \??\z: mqpelzlk.exe File opened (read-only) \??\m: mqpelzlk.exe File opened (read-only) \??\n: mqpelzlk.exe File opened (read-only) \??\u: mqpelzlk.exe File opened (read-only) \??\z: mqpelzlk.exe File opened (read-only) \??\m: tzauhhvdlj.exe File opened (read-only) \??\v: mqpelzlk.exe File opened (read-only) \??\a: tzauhhvdlj.exe File opened (read-only) \??\h: tzauhhvdlj.exe File opened (read-only) \??\p: mqpelzlk.exe File opened (read-only) \??\i: mqpelzlk.exe File opened (read-only) \??\t: mqpelzlk.exe File opened (read-only) \??\x: mqpelzlk.exe File opened (read-only) \??\o: tzauhhvdlj.exe File opened (read-only) \??\w: tzauhhvdlj.exe File opened (read-only) \??\v: mqpelzlk.exe File opened (read-only) \??\p: mqpelzlk.exe File opened (read-only) \??\i: tzauhhvdlj.exe File opened (read-only) \??\t: tzauhhvdlj.exe File opened (read-only) \??\i: mqpelzlk.exe File opened (read-only) \??\u: mqpelzlk.exe File opened (read-only) \??\e: mqpelzlk.exe File opened (read-only) \??\k: mqpelzlk.exe File opened (read-only) \??\l: mqpelzlk.exe File opened (read-only) \??\w: mqpelzlk.exe File opened (read-only) \??\q: tzauhhvdlj.exe File opened (read-only) \??\g: tzauhhvdlj.exe File opened (read-only) \??\j: tzauhhvdlj.exe File opened (read-only) \??\b: mqpelzlk.exe File opened (read-only) \??\o: mqpelzlk.exe File opened (read-only) \??\w: mqpelzlk.exe File opened (read-only) \??\s: mqpelzlk.exe File opened (read-only) \??\u: tzauhhvdlj.exe File opened (read-only) \??\g: mqpelzlk.exe File opened (read-only) \??\j: mqpelzlk.exe File opened (read-only) \??\k: mqpelzlk.exe File opened (read-only) \??\l: mqpelzlk.exe File opened (read-only) \??\q: mqpelzlk.exe File opened (read-only) \??\x: mqpelzlk.exe File opened (read-only) \??\b: tzauhhvdlj.exe File opened (read-only) \??\z: tzauhhvdlj.exe File opened (read-only) \??\a: mqpelzlk.exe File opened (read-only) \??\r: mqpelzlk.exe File opened (read-only) \??\g: mqpelzlk.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" tzauhhvdlj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" tzauhhvdlj.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2528-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x0034000000014f12-9.dat autoit_exe behavioral1/files/0x001000000000b1f5-17.dat autoit_exe behavioral1/files/0x000d00000001231d-22.dat autoit_exe behavioral1/files/0x0036000000015009-38.dat autoit_exe behavioral1/files/0x00020000000001bf-50.dat autoit_exe behavioral1/files/0x0006000000016c22-84.dat autoit_exe behavioral1/files/0x0006000000016c2c-91.dat autoit_exe behavioral1/files/0x0006000000016c2c-89.dat autoit_exe behavioral1/files/0x0006000000016c2c-86.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\tzauhhvdlj.exe 2979fb1ea36b4828faf9b0bc325be0f5.exe File opened for modification C:\Windows\SysWOW64\tzauhhvdlj.exe 2979fb1ea36b4828faf9b0bc325be0f5.exe File opened for modification C:\Windows\SysWOW64\mqpelzlk.exe 2979fb1ea36b4828faf9b0bc325be0f5.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll tzauhhvdlj.exe File created C:\Windows\SysWOW64\jquadgvsteasmbk.exe 2979fb1ea36b4828faf9b0bc325be0f5.exe File opened for modification C:\Windows\SysWOW64\jquadgvsteasmbk.exe 2979fb1ea36b4828faf9b0bc325be0f5.exe File created C:\Windows\SysWOW64\mqpelzlk.exe 2979fb1ea36b4828faf9b0bc325be0f5.exe File created C:\Windows\SysWOW64\truxyphzaodak.exe 2979fb1ea36b4828faf9b0bc325be0f5.exe File opened for modification C:\Windows\SysWOW64\truxyphzaodak.exe 2979fb1ea36b4828faf9b0bc325be0f5.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification \??\c:\Program Files\GrantFind.doc.exe mqpelzlk.exe File opened for modification C:\Program Files\GrantFind.nal mqpelzlk.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mqpelzlk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal mqpelzlk.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mqpelzlk.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe mqpelzlk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe mqpelzlk.exe File created \??\c:\Program Files\GrantFind.doc.exe mqpelzlk.exe File opened for modification C:\Program Files\GrantFind.doc.exe mqpelzlk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mqpelzlk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe mqpelzlk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mqpelzlk.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mqpelzlk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal mqpelzlk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal mqpelzlk.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe mqpelzlk.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe mqpelzlk.exe File opened for modification C:\Program Files\GrantFind.nal mqpelzlk.exe File opened for modification C:\Program Files\GrantFind.doc.exe mqpelzlk.exe File opened for modification \??\c:\Program Files\GrantFind.doc.exe mqpelzlk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal mqpelzlk.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 2979fb1ea36b4828faf9b0bc325be0f5.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32472D0D9C5782236A3476A777202CDA7D8264AA" 2979fb1ea36b4828faf9b0bc325be0f5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 2979fb1ea36b4828faf9b0bc325be0f5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" tzauhhvdlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf tzauhhvdlj.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC6B02B44EE399853B9B9A73299D7CD" 2979fb1ea36b4828faf9b0bc325be0f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF5FCFC4F5C82199031D65C7D9DBCE7E13359316743633FD79F" 2979fb1ea36b4828faf9b0bc325be0f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" tzauhhvdlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1845C60B1491DBC7B8CD7CE1EDE734B9" 2979fb1ea36b4828faf9b0bc325be0f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1736 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 3024 tzauhhvdlj.exe 3024 tzauhhvdlj.exe 3024 tzauhhvdlj.exe 3024 tzauhhvdlj.exe 3024 tzauhhvdlj.exe 2848 mqpelzlk.exe 2848 mqpelzlk.exe 2848 mqpelzlk.exe 2848 mqpelzlk.exe 1916 jquadgvsteasmbk.exe 1916 jquadgvsteasmbk.exe 1916 jquadgvsteasmbk.exe 1916 jquadgvsteasmbk.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 2732 truxyphzaodak.exe 2732 truxyphzaodak.exe 2732 truxyphzaodak.exe 2732 truxyphzaodak.exe 2732 truxyphzaodak.exe 1068 mqpelzlk.exe 1068 mqpelzlk.exe 1068 mqpelzlk.exe 1068 mqpelzlk.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 2732 truxyphzaodak.exe 1916 jquadgvsteasmbk.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 2732 truxyphzaodak.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 2732 truxyphzaodak.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 2732 truxyphzaodak.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 2732 truxyphzaodak.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 2732 truxyphzaodak.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 2732 truxyphzaodak.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 2732 truxyphzaodak.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 2732 truxyphzaodak.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 2732 truxyphzaodak.exe 1916 jquadgvsteasmbk.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 3024 tzauhhvdlj.exe 3024 tzauhhvdlj.exe 3024 tzauhhvdlj.exe 2848 mqpelzlk.exe 2848 mqpelzlk.exe 2848 mqpelzlk.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 1068 mqpelzlk.exe 1068 mqpelzlk.exe 1068 mqpelzlk.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 3024 tzauhhvdlj.exe 3024 tzauhhvdlj.exe 3024 tzauhhvdlj.exe 2848 mqpelzlk.exe 2848 mqpelzlk.exe 2848 mqpelzlk.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 1916 jquadgvsteasmbk.exe 2732 truxyphzaodak.exe 1068 mqpelzlk.exe 1068 mqpelzlk.exe 1068 mqpelzlk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1736 WINWORD.EXE 1736 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2528 wrote to memory of 3024 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 29 PID 2528 wrote to memory of 3024 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 29 PID 2528 wrote to memory of 3024 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 29 PID 2528 wrote to memory of 3024 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 29 PID 2528 wrote to memory of 1916 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 30 PID 2528 wrote to memory of 1916 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 30 PID 2528 wrote to memory of 1916 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 30 PID 2528 wrote to memory of 1916 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 30 PID 2528 wrote to memory of 2848 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 31 PID 2528 wrote to memory of 2848 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 31 PID 2528 wrote to memory of 2848 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 31 PID 2528 wrote to memory of 2848 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 31 PID 2528 wrote to memory of 2732 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 32 PID 2528 wrote to memory of 2732 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 32 PID 2528 wrote to memory of 2732 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 32 PID 2528 wrote to memory of 2732 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 32 PID 3024 wrote to memory of 1068 3024 tzauhhvdlj.exe 33 PID 3024 wrote to memory of 1068 3024 tzauhhvdlj.exe 33 PID 3024 wrote to memory of 1068 3024 tzauhhvdlj.exe 33 PID 3024 wrote to memory of 1068 3024 tzauhhvdlj.exe 33 PID 2528 wrote to memory of 1736 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 34 PID 2528 wrote to memory of 1736 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 34 PID 2528 wrote to memory of 1736 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 34 PID 2528 wrote to memory of 1736 2528 2979fb1ea36b4828faf9b0bc325be0f5.exe 34 PID 1736 wrote to memory of 1540 1736 WINWORD.EXE 38 PID 1736 wrote to memory of 1540 1736 WINWORD.EXE 38 PID 1736 wrote to memory of 1540 1736 WINWORD.EXE 38 PID 1736 wrote to memory of 1540 1736 WINWORD.EXE 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\2979fb1ea36b4828faf9b0bc325be0f5.exe"C:\Users\Admin\AppData\Local\Temp\2979fb1ea36b4828faf9b0bc325be0f5.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\tzauhhvdlj.exetzauhhvdlj.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\mqpelzlk.exeC:\Windows\system32\mqpelzlk.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1068
-
-
-
C:\Windows\SysWOW64\jquadgvsteasmbk.exejquadgvsteasmbk.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1916
-
-
C:\Windows\SysWOW64\mqpelzlk.exemqpelzlk.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2848
-
-
C:\Windows\SysWOW64\truxyphzaodak.exetruxyphzaodak.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2732
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1540
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5b7e02a81fd97f457480d6ba5da78de3d
SHA1bbca6813fece9dbc55727db92f7acb20aec409fa
SHA256cce4d36688395738072d1a9e945498cb2ccdfd92e8d2799469d4747f4ae7d059
SHA5124774ebb38723e059adfeef07d60c7121b5551fe8601adcb9f27bf8389bf24cbf0a874731d429e411f852413a5842331cae008b9e226b9e730190ba911284a5dc
-
Filesize
196KB
MD54d3fab60fd4dd7a86b30b1dd761cc4cb
SHA1b88af7e7916657d392da9d5e0aee6a0adfd78998
SHA256d072e43c8df5b0186f6c278a44a88a377270b1fd64cef40a044663771568e8db
SHA512fb602ceedb225683f45d288828c3827fe087585e51265fe3f38de4ec3345e0d5cb69b9a753a8efe43c629d944e7737e46c2285d86e164c8f62a640be3f87e732
-
Filesize
289KB
MD50adc716f647e36469341e588368bf2e3
SHA1aa43b514b1a02f8338786525e6cac9f344064be7
SHA25600db330c75824fc91de06f816ff100de3fe964ef784e7bc46ac802add877c9d9
SHA5127a70af14b2236432cf803af7a5f9862ef6fc5f45766186295b04b4fd47df0b8b4a29e3a97cb756d1c50d4190241cf52960608973cecab8443c82babc116e48cf
-
Filesize
337KB
MD5516fe575eacd8bafd8202fcb99b93264
SHA1936a88326f143851bed5a370e727d72a17a86557
SHA2561f6ae1c0040ca7f4c7b14ef6b6ba95f9adf0cf919f0a72719f8a2075210245a5
SHA512a453cc590b158c4aca0abd3ca748932356328f61cbc18127232b75374329169636e82e1d6ac835647857a06909158432202a425eaac221fdd5f8876998065492
-
Filesize
512KB
MD5115df16505bb897305fb6c4cb2980df7
SHA144769fff55d1898e25943748b65f9d717210dc23
SHA256928c973b7a3713c80429ffaa6a5639054351f17324fce0d2d5b0ac0635c9b18e
SHA51227dacaf861c2b45e32a10c73c90614d3ea055367da8211071553f5218ae4e5d9207fd7214c46eb25fd354c70ca1ace92f7888f4caa4a7a5900178965d48a0836
-
Filesize
512KB
MD598c19fe7472fba59a1e90be51dd96528
SHA11d7eb555c4a4a9e57309160d9087e410bf805a02
SHA256a79825b256111fbd3dbd765646e439f761d1d70c92b30728542475b28c3420f1
SHA51210b67a30d38a91b12ab2d111522f6565262b8edd642d59be08bcda6eb79a737aa26f5f689202b7a4a0c26a21ecf9ec99eb247007152f4511804d4471e1f66f04
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
288KB
MD5dc483f37293e58e674745508ea1f9867
SHA1601ca550eaf20f6f55575c7aa56e8ae1e670ad69
SHA256662e22283673f6737ad65c70ca0666d7abf2a4dec8f1bfbf2f09322f7a0147f0
SHA512dd573ab0da4b1bb733d6121cedfc4506526136d1bfbbf0b20679bcfa8674c18f74b03f28ede7c1fcc9e12e0e09214330576d7ad61b716c14a532bcddb0bb7e1b
-
Filesize
512KB
MD520aaea41485e98f82719084aba86b104
SHA1a4ad227540dc57305eff7b34915c191317392591
SHA25633173b1bfa8accbad204a177fe096590525860d83e445cadaf0bb0e9773fb0e1
SHA5126b87ef015097cad3238b60fe9522fb1a93b36920251f02e42c2378f88f873d419e7e9276cfda4d0c987b194ba1eef8ad9c8498dce01fc751de0207e83e4f969b
-
Filesize
512KB
MD5eb6afd9bdce353cc0183db2da1bd517d
SHA10a5c257b9ad299665f1551fe06c9802d7af53372
SHA256200d9127c1f6b47ba0b7757f35702b37eef2325324c63d11342f6b0ab3d54a36
SHA5128408eff23e0c875ce174afae93fe6e49f4b37cec6ba97b510c130178230cc73b31068d1ccf76a27e0b34761981ad729b90881ae4562b14390c8b73ba164145ee