Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 21:12
Static task
static1
Behavioral task
behavioral1
Sample
3cefe1ab8bbea67d4aa326445931b90f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3cefe1ab8bbea67d4aa326445931b90f.exe
Resource
win10v2004-20231215-en
General
-
Target
3cefe1ab8bbea67d4aa326445931b90f.exe
-
Size
512KB
-
MD5
3cefe1ab8bbea67d4aa326445931b90f
-
SHA1
56f7a596f0dd98d48bbf9d2764bd55d420461dd2
-
SHA256
2cf5c8f3e4255e2f2cb52277fec1759f16c97811ccdcb348afec208fcc124ea9
-
SHA512
fb23ca25321a1e22d1ff9e564f28eab2d58dd66698614bac1d50da6cc690784d5f5870f14efcbcdedca890228d641ece9b5334cdfd1fe878b4f241f9932baf58
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6e:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5j
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" qipybxpmhk.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qipybxpmhk.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" qipybxpmhk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" qipybxpmhk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" qipybxpmhk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" qipybxpmhk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" qipybxpmhk.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" qipybxpmhk.exe -
Executes dropped EXE 5 IoCs
pid Process 2664 qipybxpmhk.exe 2836 zrweyeajkhbfxhq.exe 2980 fxoiafaj.exe 2720 jyfvstkjyludw.exe 2632 fxoiafaj.exe -
Loads dropped DLL 5 IoCs
pid Process 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 2664 qipybxpmhk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" qipybxpmhk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" qipybxpmhk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" qipybxpmhk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" qipybxpmhk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" qipybxpmhk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" qipybxpmhk.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "jyfvstkjyludw.exe" zrweyeajkhbfxhq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\pgyvsynk = "qipybxpmhk.exe" zrweyeajkhbfxhq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vsxnqmvz = "zrweyeajkhbfxhq.exe" zrweyeajkhbfxhq.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\z: fxoiafaj.exe File opened (read-only) \??\z: fxoiafaj.exe File opened (read-only) \??\v: fxoiafaj.exe File opened (read-only) \??\b: fxoiafaj.exe File opened (read-only) \??\p: fxoiafaj.exe File opened (read-only) \??\s: qipybxpmhk.exe File opened (read-only) \??\u: qipybxpmhk.exe File opened (read-only) \??\t: fxoiafaj.exe File opened (read-only) \??\i: fxoiafaj.exe File opened (read-only) \??\w: fxoiafaj.exe File opened (read-only) \??\e: fxoiafaj.exe File opened (read-only) \??\o: fxoiafaj.exe File opened (read-only) \??\s: fxoiafaj.exe File opened (read-only) \??\m: qipybxpmhk.exe File opened (read-only) \??\e: fxoiafaj.exe File opened (read-only) \??\a: fxoiafaj.exe File opened (read-only) \??\j: fxoiafaj.exe File opened (read-only) \??\r: qipybxpmhk.exe File opened (read-only) \??\s: fxoiafaj.exe File opened (read-only) \??\i: fxoiafaj.exe File opened (read-only) \??\q: fxoiafaj.exe File opened (read-only) \??\w: fxoiafaj.exe File opened (read-only) \??\x: qipybxpmhk.exe File opened (read-only) \??\a: fxoiafaj.exe File opened (read-only) \??\m: fxoiafaj.exe File opened (read-only) \??\p: fxoiafaj.exe File opened (read-only) \??\r: fxoiafaj.exe File opened (read-only) \??\y: fxoiafaj.exe File opened (read-only) \??\n: qipybxpmhk.exe File opened (read-only) \??\q: qipybxpmhk.exe File opened (read-only) \??\t: qipybxpmhk.exe File opened (read-only) \??\k: fxoiafaj.exe File opened (read-only) \??\l: fxoiafaj.exe File opened (read-only) \??\j: qipybxpmhk.exe File opened (read-only) \??\z: qipybxpmhk.exe File opened (read-only) \??\g: fxoiafaj.exe File opened (read-only) \??\h: fxoiafaj.exe File opened (read-only) \??\p: qipybxpmhk.exe File opened (read-only) \??\l: fxoiafaj.exe File opened (read-only) \??\n: fxoiafaj.exe File opened (read-only) \??\t: fxoiafaj.exe File opened (read-only) \??\v: fxoiafaj.exe File opened (read-only) \??\a: qipybxpmhk.exe File opened (read-only) \??\e: qipybxpmhk.exe File opened (read-only) \??\u: fxoiafaj.exe File opened (read-only) \??\b: qipybxpmhk.exe File opened (read-only) \??\o: qipybxpmhk.exe File opened (read-only) \??\b: fxoiafaj.exe File opened (read-only) \??\v: qipybxpmhk.exe File opened (read-only) \??\y: qipybxpmhk.exe File opened (read-only) \??\n: fxoiafaj.exe File opened (read-only) \??\g: fxoiafaj.exe File opened (read-only) \??\m: fxoiafaj.exe File opened (read-only) \??\x: fxoiafaj.exe File opened (read-only) \??\k: qipybxpmhk.exe File opened (read-only) \??\j: fxoiafaj.exe File opened (read-only) \??\h: fxoiafaj.exe File opened (read-only) \??\k: fxoiafaj.exe File opened (read-only) \??\x: fxoiafaj.exe File opened (read-only) \??\y: fxoiafaj.exe File opened (read-only) \??\r: fxoiafaj.exe File opened (read-only) \??\i: qipybxpmhk.exe File opened (read-only) \??\l: qipybxpmhk.exe File opened (read-only) \??\q: fxoiafaj.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" qipybxpmhk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" qipybxpmhk.exe -
AutoIT Executable 17 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/3032-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x0008000000012281-5.dat autoit_exe behavioral1/files/0x000b00000001225d-17.dat autoit_exe behavioral1/files/0x000b00000001225d-20.dat autoit_exe behavioral1/files/0x0008000000012281-22.dat autoit_exe behavioral1/files/0x00330000000146c8-28.dat autoit_exe behavioral1/files/0x0008000000012281-29.dat autoit_exe behavioral1/files/0x0008000000012281-26.dat autoit_exe behavioral1/files/0x000b00000001225d-24.dat autoit_exe behavioral1/files/0x00330000000146c8-32.dat autoit_exe behavioral1/files/0x0008000000014b46-35.dat autoit_exe behavioral1/files/0x0008000000014b46-39.dat autoit_exe behavioral1/files/0x00330000000146c8-34.dat autoit_exe behavioral1/files/0x0008000000014b46-41.dat autoit_exe behavioral1/files/0x00330000000146c8-42.dat autoit_exe behavioral1/files/0x00330000000146c8-43.dat autoit_exe behavioral1/files/0x00060000000162d1-74.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\qipybxpmhk.exe 3cefe1ab8bbea67d4aa326445931b90f.exe File opened for modification C:\Windows\SysWOW64\zrweyeajkhbfxhq.exe 3cefe1ab8bbea67d4aa326445931b90f.exe File opened for modification C:\Windows\SysWOW64\jyfvstkjyludw.exe 3cefe1ab8bbea67d4aa326445931b90f.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll qipybxpmhk.exe File created C:\Windows\SysWOW64\jyfvstkjyludw.exe 3cefe1ab8bbea67d4aa326445931b90f.exe File created C:\Windows\SysWOW64\qipybxpmhk.exe 3cefe1ab8bbea67d4aa326445931b90f.exe File created C:\Windows\SysWOW64\zrweyeajkhbfxhq.exe 3cefe1ab8bbea67d4aa326445931b90f.exe File created C:\Windows\SysWOW64\fxoiafaj.exe 3cefe1ab8bbea67d4aa326445931b90f.exe File opened for modification C:\Windows\SysWOW64\fxoiafaj.exe 3cefe1ab8bbea67d4aa326445931b90f.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal fxoiafaj.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe fxoiafaj.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal fxoiafaj.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal fxoiafaj.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe fxoiafaj.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe fxoiafaj.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe fxoiafaj.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe fxoiafaj.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe fxoiafaj.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal fxoiafaj.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe fxoiafaj.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe fxoiafaj.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe fxoiafaj.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe fxoiafaj.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 3cefe1ab8bbea67d4aa326445931b90f.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" qipybxpmhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFBFC8E482682689042D6587DE5BDE7E640594B66426343D6EA" 3cefe1ab8bbea67d4aa326445931b90f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc qipybxpmhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32422C089D5082566A3E77A777262CAC7D8664AD" 3cefe1ab8bbea67d4aa326445931b90f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat qipybxpmhk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" qipybxpmhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh qipybxpmhk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F16BB2FF6D22DED173D1A78A0C9161" 3cefe1ab8bbea67d4aa326445931b90f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BBFF9CDFE6AF1E584793B44869A39E2B0FB02FC4311033FE2BD42E809D2" 3cefe1ab8bbea67d4aa326445931b90f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "193DC70B1493DAB5B9BC7CE9ECE337BC" 3cefe1ab8bbea67d4aa326445931b90f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2420 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 2664 qipybxpmhk.exe 2664 qipybxpmhk.exe 2664 qipybxpmhk.exe 2664 qipybxpmhk.exe 2664 qipybxpmhk.exe 2836 zrweyeajkhbfxhq.exe 2836 zrweyeajkhbfxhq.exe 2836 zrweyeajkhbfxhq.exe 2836 zrweyeajkhbfxhq.exe 2836 zrweyeajkhbfxhq.exe 2980 fxoiafaj.exe 2980 fxoiafaj.exe 2980 fxoiafaj.exe 2980 fxoiafaj.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2836 zrweyeajkhbfxhq.exe 2632 fxoiafaj.exe 2632 fxoiafaj.exe 2632 fxoiafaj.exe 2632 fxoiafaj.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2836 zrweyeajkhbfxhq.exe 2836 zrweyeajkhbfxhq.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2836 zrweyeajkhbfxhq.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2836 zrweyeajkhbfxhq.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2836 zrweyeajkhbfxhq.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2836 zrweyeajkhbfxhq.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2836 zrweyeajkhbfxhq.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2836 zrweyeajkhbfxhq.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2836 zrweyeajkhbfxhq.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2836 zrweyeajkhbfxhq.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2836 zrweyeajkhbfxhq.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 2664 qipybxpmhk.exe 2664 qipybxpmhk.exe 2664 qipybxpmhk.exe 2836 zrweyeajkhbfxhq.exe 2836 zrweyeajkhbfxhq.exe 2836 zrweyeajkhbfxhq.exe 2980 fxoiafaj.exe 2980 fxoiafaj.exe 2980 fxoiafaj.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2632 fxoiafaj.exe 2632 fxoiafaj.exe 2632 fxoiafaj.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 2664 qipybxpmhk.exe 2664 qipybxpmhk.exe 2664 qipybxpmhk.exe 2836 zrweyeajkhbfxhq.exe 2836 zrweyeajkhbfxhq.exe 2836 zrweyeajkhbfxhq.exe 2980 fxoiafaj.exe 2980 fxoiafaj.exe 2980 fxoiafaj.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2720 jyfvstkjyludw.exe 2632 fxoiafaj.exe 2632 fxoiafaj.exe 2632 fxoiafaj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2420 WINWORD.EXE 2420 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2664 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 28 PID 3032 wrote to memory of 2664 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 28 PID 3032 wrote to memory of 2664 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 28 PID 3032 wrote to memory of 2664 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 28 PID 3032 wrote to memory of 2836 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 29 PID 3032 wrote to memory of 2836 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 29 PID 3032 wrote to memory of 2836 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 29 PID 3032 wrote to memory of 2836 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 29 PID 3032 wrote to memory of 2980 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 30 PID 3032 wrote to memory of 2980 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 30 PID 3032 wrote to memory of 2980 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 30 PID 3032 wrote to memory of 2980 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 30 PID 3032 wrote to memory of 2720 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 31 PID 3032 wrote to memory of 2720 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 31 PID 3032 wrote to memory of 2720 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 31 PID 3032 wrote to memory of 2720 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 31 PID 2664 wrote to memory of 2632 2664 qipybxpmhk.exe 32 PID 2664 wrote to memory of 2632 2664 qipybxpmhk.exe 32 PID 2664 wrote to memory of 2632 2664 qipybxpmhk.exe 32 PID 2664 wrote to memory of 2632 2664 qipybxpmhk.exe 32 PID 3032 wrote to memory of 2420 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 33 PID 3032 wrote to memory of 2420 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 33 PID 3032 wrote to memory of 2420 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 33 PID 3032 wrote to memory of 2420 3032 3cefe1ab8bbea67d4aa326445931b90f.exe 33 PID 2420 wrote to memory of 2628 2420 WINWORD.EXE 36 PID 2420 wrote to memory of 2628 2420 WINWORD.EXE 36 PID 2420 wrote to memory of 2628 2420 WINWORD.EXE 36 PID 2420 wrote to memory of 2628 2420 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cefe1ab8bbea67d4aa326445931b90f.exe"C:\Users\Admin\AppData\Local\Temp\3cefe1ab8bbea67d4aa326445931b90f.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\qipybxpmhk.exeqipybxpmhk.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\fxoiafaj.exeC:\Windows\system32\fxoiafaj.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2632
-
-
-
C:\Windows\SysWOW64\zrweyeajkhbfxhq.exezrweyeajkhbfxhq.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2836
-
-
C:\Windows\SysWOW64\fxoiafaj.exefxoiafaj.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2980
-
-
C:\Windows\SysWOW64\jyfvstkjyludw.exejyfvstkjyludw.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2720
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD50f893c102c111ef5c0fcec1617cba18d
SHA1ae430c6d1a3ab05874cd5b228fe82e909d42fbc0
SHA256c022be85131cdc885d0387f7dc4774e2f48a345670778d7e26601ac4b63caab6
SHA51219d125b7c6fafd1df0c1bb08728aace9f9437da164af689e913c4ac6d6f388626ba80d6ca3665842091745f959657a3839223e9befdba43c98b9e672695add6c
-
Filesize
20KB
MD5f5973b7ff47c84d99ca3174c8e82a066
SHA103e6eda43c5cac32ed3188df7382fcaebc8ad5f3
SHA2567e5c73b1b2b36dcf13262a00fc33789435ca5d98aa77667d78abe2af73dce2f5
SHA51243a4a09d126b79dc86ab30de21f00370cc54bd426b193b432dccec2be4994479edc7ee457cbadd007235182e5f4333fbdd28cae95b4a9b67f4c0785955abcc8a
-
Filesize
92KB
MD56662b185f19fbf697c56a25c92de7961
SHA10df0c0df0de3724258df2549c583e3c934aca726
SHA256c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86
SHA512c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f
-
Filesize
41KB
MD5b98657ad7f5c0f39dedc2779b2dc6096
SHA11bbe2ed69d906782f35cf5ca21a702ab30c05231
SHA256628d9b3423f667bf4138411125843ae9cf152c347b081a125109890d9957997f
SHA512b4e5d087b85ddc74ff61c5e53b92b068ea4e2114c5a4b5f600cd9bbfbacdcfb44628318f196b1e2e192ee0153007c19e1e253ebef882cfc43f8994474cb574d6
-
Filesize
53KB
MD5e254ba020a34b53624bc33bc4f530d5d
SHA138708de318ca93112ae3a3e7e7e49bb763c55e5c
SHA25614250a1662f8f3c5ce7893417841a1dacc44dd6681756f56e789d64dc48bdcf1
SHA512383ab2deef47de0fc73c74d27d121378b961473de42c6186b1717daaf1ba637cdc82f8b93e6898d2c23948b95593a706bf700ed9d9b66d871ded9101254c326e
-
Filesize
34KB
MD5718afd5fe5bc9c087d4bd0ed52d26e9f
SHA1853f83df2c4cd13615241515b62135a516dcde58
SHA2563770b9c99080067640ae0eed1f02349783e274d250f385211b2ce2a40e3bb386
SHA51297dcbad4e583deb073a0c3b57b8e8ebdc16c1b2e6314f27336bab4de9929fe2513bc51ccccea8d8d9286e5aabf3a18b371d3aa8344ac02b29b7831c12eb1480f
-
Filesize
42KB
MD50d07bbad1aa3a69602cd2f5bd29c2555
SHA1c6d8b66e4408906a640af701008b4c7a30852059
SHA2569d32b385e62d249a6a2d613a4792ba15b74cd3b970fc8d8f35c4e95911d3b8e6
SHA512df2f5bae46d04e61980506ab9d497b82af9bdbe632e10204a4b5b14b13dcd20eca211b267adce479aff028d52e82639970317bc4cde87c6d0c40775442dae2b0
-
Filesize
89KB
MD5cf95dc86824bc97671db8d10a0a54ab6
SHA1c060011fa1145fe73a6a46479cb2952403f8e213
SHA256afb523b92a870388a46baa9ffebf7b3ab18bb32c7de2683d6e734596273941f9
SHA51291647914edf65c8c0277bf466f3c60cfd38f445f148652efd51a3a2b86772f99ac577a625c8b1d01e3806db3f2ce7cb7db42e38cfb42419f2bac904b777fa271
-
Filesize
82KB
MD5dca8ea10219c247082e83ada83135863
SHA1943b5c971aafdb6298844859c841a7c4056c910c
SHA2561e0a2bc82033669b52563291d3e2a51301aeef8a8089887af47ce84516eb3c9a
SHA512e6181b261e5f09b655f5428739436918c8adbcfcbedb72d1ab70951a58212bd498d1f66670e2270ca74823a9c8dc92b5d4b776fe3f766c893ae8c3c4f9a8b436
-
Filesize
48KB
MD59d5f9f36cfc2ced7063d7153193ea8d2
SHA1922c7baca31378ab28d68fb93c4b872d9fdb05da
SHA256fafc48398f96ba60d4c32eec3442a1016173b4d4c43b525f61478b316184185a
SHA51241062efda2d80ab81e2330d15cc26ff29189a59a0027ea5a1eb53a5c2e65d8a00571b859ab120d335617fb85e7aa57ced748f207e0080563231ce7818990e020
-
Filesize
165KB
MD528fb72ef488bae739e721ec50baa697e
SHA151e43d3d7bd302f9276c37d82e7328f1eb43605a
SHA2562350f04c4a6fef80d0d7e72d8132ec1fe6b96335e81656cf14611f9319a88aeb
SHA512676d6bfc4e0e83f3fb84a57b5d5b498f482ac1e697ceb45fe22728bdf28c321ab5c4a2372a6b298ebf0e1367aacff1715f97c63c4d43689f0781a520a5bc091e
-
Filesize
54KB
MD59a2bca4f6fec45ca376d5e5d0a9a245a
SHA19f09247bbb7f7fedcc88e8ba308022010b4ad5e8
SHA256d9542b795559bf77fbec23ffd3fa438493cf4f7886a5fb984f48d0953ca869e0
SHA512bdeb74db20436ffe7be2a5dd61db98e0310bc3e15fda584eb5e5f34381fc4e8bc22396684637778d4648a07f150164761fe6a5954974084b2743a3f4de60a8db
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
53KB
MD5e1a709af1b747eb628999dd2a392684d
SHA123961cbb8ddc03364eae754a3bd32e8a58a51bcf
SHA2565a3b262a6c0fc1fc0ab702884016820b4db1ed87f2197c569cf2db14729746ea
SHA5129048e22766c7185b9fe29004aa97036a42693105b08780e2bd68a7424d57de43552af01aed42bde3050149505039b88daea5565032e6248ee5bcb48e9b501ce6
-
Filesize
51KB
MD5c6d0268bb9efc49737e63f24991dc602
SHA172ce8f4a2b15b04b808ec20f1f889fec95ea4e65
SHA25636904b2b53d66bf1dadd48cb86fcc03c0d283a3395d658a5621633f6a9fc502c
SHA512e89b8a8ca74da99fb4ccc811a6a0935382414a268eff7782db5c5b31ad3544fa791543578c514092b5668517d6a194d3e46cfd6e7ab93c214262f9b3468b3252
-
Filesize
41KB
MD5b37e7b9645f81ccd360eaaacd4da40d2
SHA1ad7ae7f86f4147ae1a69574e7fa12e800208d3d5
SHA25644d7368957c97c3cb82c80e7c7ff382bb3313cd600a298ce2fa546d45ff6eac7
SHA5120abbcc10c329722f7632d864bfdac593e2889ff7c71f05e951194d6a3c90c1d1761930b2a9330fd3e7bf8837af409827f46c8451314f1a2480cc192fd4abb5ea
-
Filesize
50KB
MD53b09c9c487e753a152409d0760fef99f
SHA192bd1208d10a4293267c342b78a3e5e57585ed6a
SHA2566712431906d4597b67dd5bf47dd60e8cf443425c3cf581f22228cc5eaeee07e6
SHA512fabc13fd3e1e7464874599f7ef2d14b6feaf50ac55844b4ff3df5ca77f3b550e9f6668ced2941086d0d4c22d5d48895f7511f05d1ea882474403fdbe27e65445
-
Filesize
147KB
MD5e5d9780b7e31ea34e444b65189c0e752
SHA13b73718c87d3719c5c749fce8eeac88b76667182
SHA2561188ddd657be803c062911b500e1267cbde9b1659eebd2e8913e888a21f192bd
SHA512deee9faca5341fbef60f7f69620b664cf5dd3668de09b0b97bf4354d8eac0b6c2f7ae45ca9aee389b68fe20266af5f2ccd9ac9878755e5b6d80db7bd4f8cceb3