Analysis
-
max time kernel
151s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 19:19
Static task
static1
Behavioral task
behavioral1
Sample
376040e32502b8cde9c9efca7ad92005.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
376040e32502b8cde9c9efca7ad92005.exe
Resource
win10v2004-20231215-en
General
-
Target
376040e32502b8cde9c9efca7ad92005.exe
-
Size
512KB
-
MD5
376040e32502b8cde9c9efca7ad92005
-
SHA1
89659087bf3821fa9acc1c4975a952e09246ff56
-
SHA256
def465ab9cfba97805c83c0d9c9050bcde4e659c1c6919910701bf55f2b06002
-
SHA512
e1698f051feb2e612c4c0c352ca1f976b941ca648550ce084c0d93bb1fdade43db423c7fd8c2173510e00c66266c120488522552905983a6bdc3f72ffe4dd260
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6G:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm51
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" glzwvvgqap.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" glzwvvgqap.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" glzwvvgqap.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" glzwvvgqap.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" glzwvvgqap.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" glzwvvgqap.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" glzwvvgqap.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" glzwvvgqap.exe -
Executes dropped EXE 5 IoCs
pid Process 2788 glzwvvgqap.exe 2736 lhxifmhiazwkivf.exe 2600 wrhnnzua.exe 904 sybbrkwlqjnzj.exe 2612 wrhnnzua.exe -
Loads dropped DLL 5 IoCs
pid Process 2512 376040e32502b8cde9c9efca7ad92005.exe 2512 376040e32502b8cde9c9efca7ad92005.exe 2512 376040e32502b8cde9c9efca7ad92005.exe 2512 376040e32502b8cde9c9efca7ad92005.exe 2788 glzwvvgqap.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" glzwvvgqap.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" glzwvvgqap.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" glzwvvgqap.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" glzwvvgqap.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" glzwvvgqap.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" glzwvvgqap.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yzgajbmm = "glzwvvgqap.exe" lhxifmhiazwkivf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\rkseorld = "lhxifmhiazwkivf.exe" lhxifmhiazwkivf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "sybbrkwlqjnzj.exe" lhxifmhiazwkivf.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\m: wrhnnzua.exe File opened (read-only) \??\b: glzwvvgqap.exe File opened (read-only) \??\o: glzwvvgqap.exe File opened (read-only) \??\t: glzwvvgqap.exe File opened (read-only) \??\y: glzwvvgqap.exe File opened (read-only) \??\m: glzwvvgqap.exe File opened (read-only) \??\s: glzwvvgqap.exe File opened (read-only) \??\g: wrhnnzua.exe File opened (read-only) \??\i: wrhnnzua.exe File opened (read-only) \??\o: wrhnnzua.exe File opened (read-only) \??\t: wrhnnzua.exe File opened (read-only) \??\o: wrhnnzua.exe File opened (read-only) \??\s: wrhnnzua.exe File opened (read-only) \??\k: glzwvvgqap.exe File opened (read-only) \??\x: glzwvvgqap.exe File opened (read-only) \??\w: wrhnnzua.exe File opened (read-only) \??\g: glzwvvgqap.exe File opened (read-only) \??\m: wrhnnzua.exe File opened (read-only) \??\p: wrhnnzua.exe File opened (read-only) \??\z: wrhnnzua.exe File opened (read-only) \??\q: wrhnnzua.exe File opened (read-only) \??\u: wrhnnzua.exe File opened (read-only) \??\y: wrhnnzua.exe File opened (read-only) \??\p: glzwvvgqap.exe File opened (read-only) \??\z: glzwvvgqap.exe File opened (read-only) \??\e: wrhnnzua.exe File opened (read-only) \??\n: wrhnnzua.exe File opened (read-only) \??\g: wrhnnzua.exe File opened (read-only) \??\j: glzwvvgqap.exe File opened (read-only) \??\l: wrhnnzua.exe File opened (read-only) \??\s: wrhnnzua.exe File opened (read-only) \??\w: wrhnnzua.exe File opened (read-only) \??\b: wrhnnzua.exe File opened (read-only) \??\e: wrhnnzua.exe File opened (read-only) \??\x: wrhnnzua.exe File opened (read-only) \??\y: wrhnnzua.exe File opened (read-only) \??\j: wrhnnzua.exe File opened (read-only) \??\x: wrhnnzua.exe File opened (read-only) \??\j: wrhnnzua.exe File opened (read-only) \??\k: wrhnnzua.exe File opened (read-only) \??\q: wrhnnzua.exe File opened (read-only) \??\z: wrhnnzua.exe File opened (read-only) \??\a: glzwvvgqap.exe File opened (read-only) \??\h: wrhnnzua.exe File opened (read-only) \??\i: wrhnnzua.exe File opened (read-only) \??\p: wrhnnzua.exe File opened (read-only) \??\i: glzwvvgqap.exe File opened (read-only) \??\n: glzwvvgqap.exe File opened (read-only) \??\q: glzwvvgqap.exe File opened (read-only) \??\n: wrhnnzua.exe File opened (read-only) \??\t: wrhnnzua.exe File opened (read-only) \??\e: glzwvvgqap.exe File opened (read-only) \??\l: glzwvvgqap.exe File opened (read-only) \??\b: wrhnnzua.exe File opened (read-only) \??\h: wrhnnzua.exe File opened (read-only) \??\r: wrhnnzua.exe File opened (read-only) \??\k: wrhnnzua.exe File opened (read-only) \??\v: wrhnnzua.exe File opened (read-only) \??\l: wrhnnzua.exe File opened (read-only) \??\u: glzwvvgqap.exe File opened (read-only) \??\w: glzwvvgqap.exe File opened (read-only) \??\a: wrhnnzua.exe File opened (read-only) \??\r: glzwvvgqap.exe File opened (read-only) \??\v: glzwvvgqap.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" glzwvvgqap.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" glzwvvgqap.exe -
AutoIT Executable 17 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2512-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x000e0000000122ec-5.dat autoit_exe behavioral1/files/0x0007000000012284-17.dat autoit_exe behavioral1/files/0x0007000000012284-20.dat autoit_exe behavioral1/files/0x0007000000012284-22.dat autoit_exe behavioral1/files/0x000e0000000122ec-23.dat autoit_exe behavioral1/files/0x000e0000000122ec-26.dat autoit_exe behavioral1/files/0x000e0000000122ec-28.dat autoit_exe behavioral1/files/0x0035000000014957-29.dat autoit_exe behavioral1/files/0x0035000000014957-32.dat autoit_exe behavioral1/files/0x0007000000014d2e-34.dat autoit_exe behavioral1/files/0x0035000000014957-36.dat autoit_exe behavioral1/files/0x0007000000014d2e-39.dat autoit_exe behavioral1/files/0x0007000000014d2e-41.dat autoit_exe behavioral1/files/0x0035000000014957-43.dat autoit_exe behavioral1/files/0x0035000000014957-42.dat autoit_exe behavioral1/files/0x0006000000016432-76.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\lhxifmhiazwkivf.exe 376040e32502b8cde9c9efca7ad92005.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll glzwvvgqap.exe File opened for modification C:\Windows\SysWOW64\wrhnnzua.exe 376040e32502b8cde9c9efca7ad92005.exe File created C:\Windows\SysWOW64\sybbrkwlqjnzj.exe 376040e32502b8cde9c9efca7ad92005.exe File opened for modification C:\Windows\SysWOW64\sybbrkwlqjnzj.exe 376040e32502b8cde9c9efca7ad92005.exe File created C:\Windows\SysWOW64\glzwvvgqap.exe 376040e32502b8cde9c9efca7ad92005.exe File opened for modification C:\Windows\SysWOW64\glzwvvgqap.exe 376040e32502b8cde9c9efca7ad92005.exe File created C:\Windows\SysWOW64\lhxifmhiazwkivf.exe 376040e32502b8cde9c9efca7ad92005.exe File created C:\Windows\SysWOW64\wrhnnzua.exe 376040e32502b8cde9c9efca7ad92005.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal wrhnnzua.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal wrhnnzua.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wrhnnzua.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal wrhnnzua.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wrhnnzua.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wrhnnzua.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wrhnnzua.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wrhnnzua.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wrhnnzua.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal wrhnnzua.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wrhnnzua.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wrhnnzua.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wrhnnzua.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wrhnnzua.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 376040e32502b8cde9c9efca7ad92005.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat glzwvvgqap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" glzwvvgqap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc glzwvvgqap.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1939C67A14E1DABEB8CB7FE6ED9234CD" 376040e32502b8cde9c9efca7ad92005.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" glzwvvgqap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" glzwvvgqap.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB5B02847E639EC53BFB9A733E9D7BC" 376040e32502b8cde9c9efca7ad92005.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" glzwvvgqap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2044 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 376040e32502b8cde9c9efca7ad92005.exe 2512 376040e32502b8cde9c9efca7ad92005.exe 2512 376040e32502b8cde9c9efca7ad92005.exe 2512 376040e32502b8cde9c9efca7ad92005.exe 2512 376040e32502b8cde9c9efca7ad92005.exe 2512 376040e32502b8cde9c9efca7ad92005.exe 2512 376040e32502b8cde9c9efca7ad92005.exe 2788 glzwvvgqap.exe 2788 glzwvvgqap.exe 2788 glzwvvgqap.exe 2788 glzwvvgqap.exe 2788 glzwvvgqap.exe 2512 376040e32502b8cde9c9efca7ad92005.exe 2736 lhxifmhiazwkivf.exe 2736 lhxifmhiazwkivf.exe 2736 lhxifmhiazwkivf.exe 2736 lhxifmhiazwkivf.exe 2736 lhxifmhiazwkivf.exe 2600 wrhnnzua.exe 2600 wrhnnzua.exe 2600 wrhnnzua.exe 2600 wrhnnzua.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 2736 lhxifmhiazwkivf.exe 2612 wrhnnzua.exe 2612 wrhnnzua.exe 2612 wrhnnzua.exe 2612 wrhnnzua.exe 2736 lhxifmhiazwkivf.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 2736 lhxifmhiazwkivf.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 2736 lhxifmhiazwkivf.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 2736 lhxifmhiazwkivf.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 2736 lhxifmhiazwkivf.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 2736 lhxifmhiazwkivf.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 2736 lhxifmhiazwkivf.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 2736 lhxifmhiazwkivf.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 2736 lhxifmhiazwkivf.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 2736 lhxifmhiazwkivf.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 2736 lhxifmhiazwkivf.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2512 376040e32502b8cde9c9efca7ad92005.exe 2512 376040e32502b8cde9c9efca7ad92005.exe 2512 376040e32502b8cde9c9efca7ad92005.exe 2788 glzwvvgqap.exe 2788 glzwvvgqap.exe 2788 glzwvvgqap.exe 2736 lhxifmhiazwkivf.exe 2736 lhxifmhiazwkivf.exe 2736 lhxifmhiazwkivf.exe 2600 wrhnnzua.exe 2600 wrhnnzua.exe 2600 wrhnnzua.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 2612 wrhnnzua.exe 2612 wrhnnzua.exe 2612 wrhnnzua.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2512 376040e32502b8cde9c9efca7ad92005.exe 2512 376040e32502b8cde9c9efca7ad92005.exe 2512 376040e32502b8cde9c9efca7ad92005.exe 2788 glzwvvgqap.exe 2788 glzwvvgqap.exe 2788 glzwvvgqap.exe 2736 lhxifmhiazwkivf.exe 2736 lhxifmhiazwkivf.exe 2736 lhxifmhiazwkivf.exe 2600 wrhnnzua.exe 2600 wrhnnzua.exe 2600 wrhnnzua.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 904 sybbrkwlqjnzj.exe 2612 wrhnnzua.exe 2612 wrhnnzua.exe 2612 wrhnnzua.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2044 WINWORD.EXE 2044 WINWORD.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2788 2512 376040e32502b8cde9c9efca7ad92005.exe 28 PID 2512 wrote to memory of 2788 2512 376040e32502b8cde9c9efca7ad92005.exe 28 PID 2512 wrote to memory of 2788 2512 376040e32502b8cde9c9efca7ad92005.exe 28 PID 2512 wrote to memory of 2788 2512 376040e32502b8cde9c9efca7ad92005.exe 28 PID 2512 wrote to memory of 2736 2512 376040e32502b8cde9c9efca7ad92005.exe 29 PID 2512 wrote to memory of 2736 2512 376040e32502b8cde9c9efca7ad92005.exe 29 PID 2512 wrote to memory of 2736 2512 376040e32502b8cde9c9efca7ad92005.exe 29 PID 2512 wrote to memory of 2736 2512 376040e32502b8cde9c9efca7ad92005.exe 29 PID 2512 wrote to memory of 2600 2512 376040e32502b8cde9c9efca7ad92005.exe 30 PID 2512 wrote to memory of 2600 2512 376040e32502b8cde9c9efca7ad92005.exe 30 PID 2512 wrote to memory of 2600 2512 376040e32502b8cde9c9efca7ad92005.exe 30 PID 2512 wrote to memory of 2600 2512 376040e32502b8cde9c9efca7ad92005.exe 30 PID 2512 wrote to memory of 904 2512 376040e32502b8cde9c9efca7ad92005.exe 31 PID 2512 wrote to memory of 904 2512 376040e32502b8cde9c9efca7ad92005.exe 31 PID 2512 wrote to memory of 904 2512 376040e32502b8cde9c9efca7ad92005.exe 31 PID 2512 wrote to memory of 904 2512 376040e32502b8cde9c9efca7ad92005.exe 31 PID 2736 wrote to memory of 2764 2736 lhxifmhiazwkivf.exe 32 PID 2736 wrote to memory of 2764 2736 lhxifmhiazwkivf.exe 32 PID 2736 wrote to memory of 2764 2736 lhxifmhiazwkivf.exe 32 PID 2736 wrote to memory of 2764 2736 lhxifmhiazwkivf.exe 32 PID 2788 wrote to memory of 2612 2788 glzwvvgqap.exe 34 PID 2788 wrote to memory of 2612 2788 glzwvvgqap.exe 34 PID 2788 wrote to memory of 2612 2788 glzwvvgqap.exe 34 PID 2788 wrote to memory of 2612 2788 glzwvvgqap.exe 34 PID 2512 wrote to memory of 2044 2512 376040e32502b8cde9c9efca7ad92005.exe 35 PID 2512 wrote to memory of 2044 2512 376040e32502b8cde9c9efca7ad92005.exe 35 PID 2512 wrote to memory of 2044 2512 376040e32502b8cde9c9efca7ad92005.exe 35 PID 2512 wrote to memory of 2044 2512 376040e32502b8cde9c9efca7ad92005.exe 35 PID 2044 wrote to memory of 1944 2044 WINWORD.EXE 39 PID 2044 wrote to memory of 1944 2044 WINWORD.EXE 39 PID 2044 wrote to memory of 1944 2044 WINWORD.EXE 39 PID 2044 wrote to memory of 1944 2044 WINWORD.EXE 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\376040e32502b8cde9c9efca7ad92005.exe"C:\Users\Admin\AppData\Local\Temp\376040e32502b8cde9c9efca7ad92005.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\glzwvvgqap.exeglzwvvgqap.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\wrhnnzua.exeC:\Windows\system32\wrhnnzua.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2612
-
-
-
C:\Windows\SysWOW64\lhxifmhiazwkivf.exelhxifmhiazwkivf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.execmd.exe /c sybbrkwlqjnzj.exe3⤵PID:2764
-
-
-
C:\Windows\SysWOW64\wrhnnzua.exewrhnnzua.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2600
-
-
C:\Windows\SysWOW64\sybbrkwlqjnzj.exesybbrkwlqjnzj.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:904
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1944
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5553573fe595bee4d07c5f41240a2eaef
SHA10a093cdaf09dc97a64b43afe2717416ff22bbf61
SHA256cd9c9890661c4644d70714697e4e274e5a5a3d1eea53b2acd6eb55b7369090e7
SHA5129d1ce291f542018f10385ea5929926c8553bed9c74d1513bddc5bdc2f481ac7d29aca69fe1ce0dfbf3aec1c03d35bb3f305c86f10970d5ab56f82fd10c13b945
-
Filesize
20KB
MD568fc66422f907eb0ade3c63ffc61b722
SHA1893d9d1ebeb69dcba99c670ac292c18e8b5bba3c
SHA256967f2d41b457dd5aee71939a97891fe9701803852c0148534e4664a08797fe15
SHA5126c720b4bd9c568fae962282707b10856ca90e049dea6c02da121ebaa541fe275ce9145fecd5da7be01e727d986537a2a9213702ab881fc3def201905bac2eb75
-
Filesize
348KB
MD55c62887b401908b257080e3b20393044
SHA10b4025f1cbedb56eb7301f06c5772cde2d3a3208
SHA25617e7b77b9ab17e745d7267535a441d924a1561258b7e9bc9e01f2ce64ee722cb
SHA512505242afbb32feb05ee5ef8150d0abed80322dbc3b6a30ff2a5aa2478dc9acf69384e988d59887b4d85a1780adec5fc34ed73ebb5b7a1586491f7205908ab48f
-
Filesize
192KB
MD5142de3b77d0d50247bf418a222540a73
SHA1b6a291a807a3d8621e2c2261a5f17c35aea9dee7
SHA25699e93680359b6e1fd0ebefdcda12a6824393cb6484ffbcf18200dda99326e572
SHA512f0ef9b62895a3d665da4ab7d74194dd5cab7bfe12dd2fe4309494cdf9afbd26a2267839f48a317ab64eefe7e751b5e5ff79fdb82db481361ea9a4360a3fc6ab5
-
Filesize
221KB
MD5077f322068f67fcd77989c215a91fa22
SHA1445040d08403cce57defce2c8a18055628cfb6a2
SHA256e64514ecd954b8ed3bc5f26abc7a594b454093917262de76c3d9b75f69511309
SHA51266fbce5308f53dc18ea3dce103c05c5f1a0bb7011b97df3a35d5a96527715b3f218d8506088e4caeda46b497862fb72120b5f6f2047f28f89bba069c6eb35557
-
Filesize
164KB
MD547c29cc7c22f3a92669620a684de3e7c
SHA1fb946cfa394ca50c98447b0169bc800a8de66cbb
SHA2564729979e0c17ff9b1a4b013e61ca087dccf07a0d93c386b7877fe6affe9469db
SHA5120f60d2d30778cf56fdaff459f09e40e4e3bc474ac90d1490a09472f1162694c0ef44659d3b843c87e2c48b2e9fa8115660c94a8cb11229943baa0cb1da828711
-
Filesize
512KB
MD5a160ce2ad5d7c21686088d0be8bdc79f
SHA117e3c2388c1f6e9592fe7f33015c5031061c9d76
SHA25660ed7ba24e57d77461517dab346c21356f0af44b2d22dd57fe5833fb612a6043
SHA5125bb32700bd8538af1a4b302ebef4f1b73d45ceae4b70c466d96977e1be86446e9eb0f2122dd169fc8ddf5741fdbd6ed38e7e82352970b3974e29e67101ca52c7
-
Filesize
115KB
MD567450669d39d1f53a06349c3f20c8057
SHA1b17a8b32506afc2e499718da2608c5f84514551f
SHA25674789a7083330e683a05a678358a64b2076a3982d4c11d1cbbd21abee0dc2ba8
SHA512fac6ff0d70fdcfc3c63336fe6f52bab6e8eafc0c098604916a042d1139f59545a2354d9c4331889646fdf9842cfd39b68d10c376795592153c58e04df6477bc2
-
Filesize
166KB
MD57e0075aa6322afe28cca6ad899a0704c
SHA17a82d92237cd614f134b96da954112ac47b2493d
SHA2560c7ea9b35bfc3fef71720ad9815c79e7bc54865a6c6c7bd938e32e5c2d7f5521
SHA512c6449146b4680a15e799932bff2d2925fea77cdf5e913fcc606624b54ff3f3c8418a5d244218c42dc090454af2ebd105baf7efa7fe39087fa650f36104ca45ae
-
Filesize
202KB
MD5ae4cd0c1a6771c56d209bb182e546c25
SHA1464be34165cc7be61538ee1b254fc363afb6a050
SHA256f1307f2a7c2586213ea357617a98ccce8172c3bb0ef8b9977437bc8224c240dc
SHA512095fdd4bf1e486388f05c1016659ff91bea9cc6ae3142fc505a5ebe2566e84a60e2df552798cef4f516a111c31da43c4d4cac04ad1161f557edd0687e034269b
-
Filesize
125KB
MD5f52f4ea3c138fa4faa04dbb6a9aec0c4
SHA1d443c388a6374b1ffcdd130ae1f4aaeef2dc367e
SHA256e2e86c2c36634dcb3843ff21b33fad4a38b0a9f93a6c1f7f65c850c1a5dc8580
SHA512617d9af9fdf29dae259318e5689f846cbb398a36281a667e21fc5911792eb4204a0cc44fd326a99e3dd27603b3313dc2c205e0d0a5f48d55b6ca2a063d46a91a
-
Filesize
74KB
MD5020eb0fb92d750cdb1af0c5f642e73b0
SHA10456f0cbbfed7c9d03a697ec764cf64e304aa5c7
SHA256386fb957b2e908702f855240d8ffb2382565c5ecac91815c65b5bd24afbe99ec
SHA512b2099cb93f74ca3e9545b2f11cf379caa3d95e0b4748eb41a1d47e28737718ff91fa1c4e9b12c450dac4bccc3ae3ad8520b8a55b3e4ae7e7ef4fc63cd67e4068
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
49KB
MD54416f86b0dcace328554f96468d8ac38
SHA17826f9f41f463009ca2c29d45d7671627cf9f8ea
SHA2567b96b0dfce5ccd165126a5bcd9de124f9392272d7ab412aad26442ee79be0025
SHA51274b6d84c7784be5ddc6f4cc76578d732e9b01c10ef90e87328d136fed351c3e9c298e15b943a67d98424544807ada2156b65cb66ef0d7b5d88e94da4b27f5a13
-
Filesize
170KB
MD5dc8fb3979de516466953e7c8ecfcb7d0
SHA1b222cb1ddf856b9f19eef947925b1ae3952bdfd4
SHA25639704ed4c0f8ce1066ff4550a53fca40a8e145e250a5ca57bd67c5eec7c25052
SHA5122dce43de9b9f8af273836e39535c9a689c42323592abc0c237483866888050018bf443661acd5ab2937d94690eed8331643e1909ac13d92ab269850332a86873
-
Filesize
209KB
MD5827339cdeb3ee5e0fb027468f4466490
SHA155b7a24c76a6c1e2621a6fab8ea942d99e649275
SHA2563b1694c1ba4824fae6129c3bc9048bee00b7a89c380558cf65b3a013814251b1
SHA512f4bc4f50d22a00597256641de1192da2d6abf75b9711128d80789c7e058c30f37a7a8dbd0406b86fcc83a9aed125c7fa5da5efea2a1ee156c012f12162de6ed6
-
Filesize
187KB
MD52a89e194e851731a0b989a1b8348c4cb
SHA12eb29938b63b4ce21a242ff3110754f43c90f56c
SHA256256eea8ac999e23460eea6d80af6be8f4e56c0ab6a2a5ee1ee1240e7a3ce3f29
SHA5120eae32ef710df500113e141f8e472ec798ed2c8cedc265942e167ab53fa6aebd6fd16b85c73ce600e633977ab33e86928615a899175b44afe5005d5a22ee8de0
-
Filesize
108KB
MD5678c470cc8c2e02c89e0bfb04612ac6c
SHA130b3412137d5e942c001419878d5953a77270133
SHA256827a4cee13927df31b8976f119f2a3b355f0250d369fe7eba3856d333e56b96e
SHA512dd6f158e4a0faaff7d4e0b6b6d10066bf4e0c75407857ae18c155102040c8a4505c3cddd4422c9b70d11d96feb415d1fe43cd35e6f20bd67c60f5aed9acccc94