Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
3d1b9631c5905683931200fd58d783dd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d1b9631c5905683931200fd58d783dd.exe
Resource
win10v2004-20231222-en
General
-
Target
3d1b9631c5905683931200fd58d783dd.exe
-
Size
512KB
-
MD5
3d1b9631c5905683931200fd58d783dd
-
SHA1
2e95612519872978c8675b7e8bf452f99c89b91d
-
SHA256
7cec07093cce87a490295124a8bf53a101d6d4452ec5c4c82b273cff23db0518
-
SHA512
f3123bc89ad9bd7d4329b954abacc8b357ececc1941cb821abef6515bd655aa84dd77e475f7e3bd46338798cac17292b9f8dab8e97bfc7b48562b1607e8cb1a8
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6T:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm56
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" wmfazrgbug.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wmfazrgbug.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wmfazrgbug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" wmfazrgbug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wmfazrgbug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" wmfazrgbug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wmfazrgbug.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wmfazrgbug.exe -
Executes dropped EXE 5 IoCs
pid Process 2788 wmfazrgbug.exe 2836 tyknustmxhmwqvo.exe 2832 xsygsvyy.exe 2848 yrkzoewlarslv.exe 2588 xsygsvyy.exe -
Loads dropped DLL 5 IoCs
pid Process 2224 3d1b9631c5905683931200fd58d783dd.exe 2224 3d1b9631c5905683931200fd58d783dd.exe 2224 3d1b9631c5905683931200fd58d783dd.exe 2224 3d1b9631c5905683931200fd58d783dd.exe 2788 wmfazrgbug.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" wmfazrgbug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" wmfazrgbug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wmfazrgbug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" wmfazrgbug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wmfazrgbug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wmfazrgbug.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "yrkzoewlarslv.exe" tyknustmxhmwqvo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lnuzyueh = "wmfazrgbug.exe" tyknustmxhmwqvo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zpedtjyx = "tyknustmxhmwqvo.exe" tyknustmxhmwqvo.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\x: wmfazrgbug.exe File opened (read-only) \??\m: xsygsvyy.exe File opened (read-only) \??\k: xsygsvyy.exe File opened (read-only) \??\r: xsygsvyy.exe File opened (read-only) \??\h: wmfazrgbug.exe File opened (read-only) \??\j: xsygsvyy.exe File opened (read-only) \??\s: xsygsvyy.exe File opened (read-only) \??\b: wmfazrgbug.exe File opened (read-only) \??\l: wmfazrgbug.exe File opened (read-only) \??\y: wmfazrgbug.exe File opened (read-only) \??\y: xsygsvyy.exe File opened (read-only) \??\r: wmfazrgbug.exe File opened (read-only) \??\n: xsygsvyy.exe File opened (read-only) \??\m: wmfazrgbug.exe File opened (read-only) \??\p: xsygsvyy.exe File opened (read-only) \??\w: xsygsvyy.exe File opened (read-only) \??\n: xsygsvyy.exe File opened (read-only) \??\s: xsygsvyy.exe File opened (read-only) \??\z: xsygsvyy.exe File opened (read-only) \??\t: xsygsvyy.exe File opened (read-only) \??\p: wmfazrgbug.exe File opened (read-only) \??\s: wmfazrgbug.exe File opened (read-only) \??\b: xsygsvyy.exe File opened (read-only) \??\i: xsygsvyy.exe File opened (read-only) \??\e: xsygsvyy.exe File opened (read-only) \??\h: xsygsvyy.exe File opened (read-only) \??\o: xsygsvyy.exe File opened (read-only) \??\r: xsygsvyy.exe File opened (read-only) \??\t: xsygsvyy.exe File opened (read-only) \??\y: xsygsvyy.exe File opened (read-only) \??\h: xsygsvyy.exe File opened (read-only) \??\w: xsygsvyy.exe File opened (read-only) \??\a: xsygsvyy.exe File opened (read-only) \??\e: xsygsvyy.exe File opened (read-only) \??\b: xsygsvyy.exe File opened (read-only) \??\k: wmfazrgbug.exe File opened (read-only) \??\w: wmfazrgbug.exe File opened (read-only) \??\v: wmfazrgbug.exe File opened (read-only) \??\q: xsygsvyy.exe File opened (read-only) \??\g: xsygsvyy.exe File opened (read-only) \??\o: wmfazrgbug.exe File opened (read-only) \??\u: wmfazrgbug.exe File opened (read-only) \??\i: xsygsvyy.exe File opened (read-only) \??\i: wmfazrgbug.exe File opened (read-only) \??\k: xsygsvyy.exe File opened (read-only) \??\x: xsygsvyy.exe File opened (read-only) \??\l: xsygsvyy.exe File opened (read-only) \??\l: xsygsvyy.exe File opened (read-only) \??\p: xsygsvyy.exe File opened (read-only) \??\q: xsygsvyy.exe File opened (read-only) \??\v: xsygsvyy.exe File opened (read-only) \??\a: xsygsvyy.exe File opened (read-only) \??\j: xsygsvyy.exe File opened (read-only) \??\v: xsygsvyy.exe File opened (read-only) \??\n: wmfazrgbug.exe File opened (read-only) \??\g: wmfazrgbug.exe File opened (read-only) \??\q: wmfazrgbug.exe File opened (read-only) \??\m: xsygsvyy.exe File opened (read-only) \??\a: wmfazrgbug.exe File opened (read-only) \??\e: wmfazrgbug.exe File opened (read-only) \??\o: xsygsvyy.exe File opened (read-only) \??\u: xsygsvyy.exe File opened (read-only) \??\u: xsygsvyy.exe File opened (read-only) \??\t: wmfazrgbug.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" wmfazrgbug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" wmfazrgbug.exe -
AutoIT Executable 17 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2224-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x000c000000016c1a-5.dat autoit_exe behavioral1/files/0x0009000000012262-17.dat autoit_exe behavioral1/files/0x000c000000016c1a-25.dat autoit_exe behavioral1/files/0x0033000000016cfa-29.dat autoit_exe behavioral1/files/0x0007000000016d5c-35.dat autoit_exe behavioral1/files/0x0007000000016d5c-39.dat autoit_exe behavioral1/files/0x0007000000016d5c-41.dat autoit_exe behavioral1/files/0x0033000000016cfa-34.dat autoit_exe behavioral1/files/0x0033000000016cfa-43.dat autoit_exe behavioral1/files/0x0033000000016cfa-42.dat autoit_exe behavioral1/files/0x0033000000016cfa-32.dat autoit_exe behavioral1/files/0x000c000000016c1a-28.dat autoit_exe behavioral1/files/0x0009000000012262-27.dat autoit_exe behavioral1/files/0x000c000000016c1a-22.dat autoit_exe behavioral1/files/0x0009000000012262-20.dat autoit_exe behavioral1/files/0x0005000000019488-79.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmfazrgbug.exe 3d1b9631c5905683931200fd58d783dd.exe File created C:\Windows\SysWOW64\tyknustmxhmwqvo.exe 3d1b9631c5905683931200fd58d783dd.exe File opened for modification C:\Windows\SysWOW64\tyknustmxhmwqvo.exe 3d1b9631c5905683931200fd58d783dd.exe File created C:\Windows\SysWOW64\xsygsvyy.exe 3d1b9631c5905683931200fd58d783dd.exe File opened for modification C:\Windows\SysWOW64\xsygsvyy.exe 3d1b9631c5905683931200fd58d783dd.exe File opened for modification C:\Windows\SysWOW64\wmfazrgbug.exe 3d1b9631c5905683931200fd58d783dd.exe File created C:\Windows\SysWOW64\yrkzoewlarslv.exe 3d1b9631c5905683931200fd58d783dd.exe File opened for modification C:\Windows\SysWOW64\yrkzoewlarslv.exe 3d1b9631c5905683931200fd58d783dd.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll wmfazrgbug.exe -
Drops file in Program Files directory 22 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xsygsvyy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal xsygsvyy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xsygsvyy.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xsygsvyy.exe File opened for modification C:\Program Files\OutImport.nal xsygsvyy.exe File opened for modification C:\Program Files\OutImport.nal xsygsvyy.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xsygsvyy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal xsygsvyy.exe File created \??\c:\Program Files\OutImport.doc.exe xsygsvyy.exe File opened for modification \??\c:\Program Files\OutImport.doc.exe xsygsvyy.exe File opened for modification C:\Program Files\OutImport.doc.exe xsygsvyy.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xsygsvyy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal xsygsvyy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xsygsvyy.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xsygsvyy.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xsygsvyy.exe File opened for modification C:\Program Files\OutImport.doc.exe xsygsvyy.exe File opened for modification \??\c:\Program Files\OutImport.doc.exe xsygsvyy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xsygsvyy.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xsygsvyy.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal xsygsvyy.exe File created \??\c:\Program Files\OutImport.doc.exe xsygsvyy.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 3d1b9631c5905683931200fd58d783dd.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" wmfazrgbug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf wmfazrgbug.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" wmfazrgbug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" wmfazrgbug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" wmfazrgbug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" wmfazrgbug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 3d1b9631c5905683931200fd58d783dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BC8F9BDF966F19784753A42819F39E3B3FE02FC4365023EE2CF45E608A5" 3d1b9631c5905683931200fd58d783dd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2704 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2224 3d1b9631c5905683931200fd58d783dd.exe 2224 3d1b9631c5905683931200fd58d783dd.exe 2224 3d1b9631c5905683931200fd58d783dd.exe 2224 3d1b9631c5905683931200fd58d783dd.exe 2224 3d1b9631c5905683931200fd58d783dd.exe 2224 3d1b9631c5905683931200fd58d783dd.exe 2224 3d1b9631c5905683931200fd58d783dd.exe 2224 3d1b9631c5905683931200fd58d783dd.exe 2836 tyknustmxhmwqvo.exe 2836 tyknustmxhmwqvo.exe 2836 tyknustmxhmwqvo.exe 2836 tyknustmxhmwqvo.exe 2836 tyknustmxhmwqvo.exe 2788 wmfazrgbug.exe 2788 wmfazrgbug.exe 2788 wmfazrgbug.exe 2788 wmfazrgbug.exe 2788 wmfazrgbug.exe 2832 xsygsvyy.exe 2832 xsygsvyy.exe 2832 xsygsvyy.exe 2832 xsygsvyy.exe 2836 tyknustmxhmwqvo.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2588 xsygsvyy.exe 2588 xsygsvyy.exe 2588 xsygsvyy.exe 2588 xsygsvyy.exe 2836 tyknustmxhmwqvo.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2836 tyknustmxhmwqvo.exe 2836 tyknustmxhmwqvo.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2836 tyknustmxhmwqvo.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2836 tyknustmxhmwqvo.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2836 tyknustmxhmwqvo.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2836 tyknustmxhmwqvo.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2836 tyknustmxhmwqvo.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2836 tyknustmxhmwqvo.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2836 tyknustmxhmwqvo.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2836 tyknustmxhmwqvo.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2224 3d1b9631c5905683931200fd58d783dd.exe 2224 3d1b9631c5905683931200fd58d783dd.exe 2224 3d1b9631c5905683931200fd58d783dd.exe 2788 wmfazrgbug.exe 2788 wmfazrgbug.exe 2788 wmfazrgbug.exe 2836 tyknustmxhmwqvo.exe 2836 tyknustmxhmwqvo.exe 2836 tyknustmxhmwqvo.exe 2832 xsygsvyy.exe 2832 xsygsvyy.exe 2832 xsygsvyy.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2588 xsygsvyy.exe 2588 xsygsvyy.exe 2588 xsygsvyy.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2224 3d1b9631c5905683931200fd58d783dd.exe 2224 3d1b9631c5905683931200fd58d783dd.exe 2224 3d1b9631c5905683931200fd58d783dd.exe 2788 wmfazrgbug.exe 2788 wmfazrgbug.exe 2788 wmfazrgbug.exe 2836 tyknustmxhmwqvo.exe 2836 tyknustmxhmwqvo.exe 2836 tyknustmxhmwqvo.exe 2832 xsygsvyy.exe 2832 xsygsvyy.exe 2832 xsygsvyy.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2848 yrkzoewlarslv.exe 2588 xsygsvyy.exe 2588 xsygsvyy.exe 2588 xsygsvyy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2704 WINWORD.EXE 2704 WINWORD.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2788 2224 3d1b9631c5905683931200fd58d783dd.exe 28 PID 2224 wrote to memory of 2788 2224 3d1b9631c5905683931200fd58d783dd.exe 28 PID 2224 wrote to memory of 2788 2224 3d1b9631c5905683931200fd58d783dd.exe 28 PID 2224 wrote to memory of 2788 2224 3d1b9631c5905683931200fd58d783dd.exe 28 PID 2224 wrote to memory of 2836 2224 3d1b9631c5905683931200fd58d783dd.exe 35 PID 2224 wrote to memory of 2836 2224 3d1b9631c5905683931200fd58d783dd.exe 35 PID 2224 wrote to memory of 2836 2224 3d1b9631c5905683931200fd58d783dd.exe 35 PID 2224 wrote to memory of 2836 2224 3d1b9631c5905683931200fd58d783dd.exe 35 PID 2224 wrote to memory of 2832 2224 3d1b9631c5905683931200fd58d783dd.exe 34 PID 2224 wrote to memory of 2832 2224 3d1b9631c5905683931200fd58d783dd.exe 34 PID 2224 wrote to memory of 2832 2224 3d1b9631c5905683931200fd58d783dd.exe 34 PID 2224 wrote to memory of 2832 2224 3d1b9631c5905683931200fd58d783dd.exe 34 PID 2836 wrote to memory of 2700 2836 tyknustmxhmwqvo.exe 33 PID 2836 wrote to memory of 2700 2836 tyknustmxhmwqvo.exe 33 PID 2836 wrote to memory of 2700 2836 tyknustmxhmwqvo.exe 33 PID 2836 wrote to memory of 2700 2836 tyknustmxhmwqvo.exe 33 PID 2224 wrote to memory of 2848 2224 3d1b9631c5905683931200fd58d783dd.exe 30 PID 2224 wrote to memory of 2848 2224 3d1b9631c5905683931200fd58d783dd.exe 30 PID 2224 wrote to memory of 2848 2224 3d1b9631c5905683931200fd58d783dd.exe 30 PID 2224 wrote to memory of 2848 2224 3d1b9631c5905683931200fd58d783dd.exe 30 PID 2788 wrote to memory of 2588 2788 wmfazrgbug.exe 32 PID 2788 wrote to memory of 2588 2788 wmfazrgbug.exe 32 PID 2788 wrote to memory of 2588 2788 wmfazrgbug.exe 32 PID 2788 wrote to memory of 2588 2788 wmfazrgbug.exe 32 PID 2224 wrote to memory of 2704 2224 3d1b9631c5905683931200fd58d783dd.exe 31 PID 2224 wrote to memory of 2704 2224 3d1b9631c5905683931200fd58d783dd.exe 31 PID 2224 wrote to memory of 2704 2224 3d1b9631c5905683931200fd58d783dd.exe 31 PID 2224 wrote to memory of 2704 2224 3d1b9631c5905683931200fd58d783dd.exe 31 PID 2704 wrote to memory of 2340 2704 WINWORD.EXE 41 PID 2704 wrote to memory of 2340 2704 WINWORD.EXE 41 PID 2704 wrote to memory of 2340 2704 WINWORD.EXE 41 PID 2704 wrote to memory of 2340 2704 WINWORD.EXE 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d1b9631c5905683931200fd58d783dd.exe"C:\Users\Admin\AppData\Local\Temp\3d1b9631c5905683931200fd58d783dd.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\wmfazrgbug.exewmfazrgbug.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\xsygsvyy.exeC:\Windows\system32\xsygsvyy.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2588
-
-
-
C:\Windows\SysWOW64\yrkzoewlarslv.exeyrkzoewlarslv.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2848
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2340
-
-
-
C:\Windows\SysWOW64\xsygsvyy.exexsygsvyy.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2832
-
-
C:\Windows\SysWOW64\tyknustmxhmwqvo.exetyknustmxhmwqvo.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2836
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c yrkzoewlarslv.exe1⤵PID:2700
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
924B
MD58a20e6938e09bb9d8a62e981b756e848
SHA1911e5af322278feec49a5a27fa76414f1ae41162
SHA256db4c81c378dbe17c9d002c5c9ed49faa1711f2fc924edbaccaa7e4caffc3a641
SHA512d22f7a5b8db856d9be0eb2b20534d5912c5c4b0b08220ac6b39849afae724a051240bc6ed871059f8eb0cfc5ab94be2cd1d88b304084594952e146347f037d25
-
Filesize
20KB
MD5031fc17919629f0a8e7496de9aaef160
SHA1c735c3fe3204aaa1cb51c80c3731baf7c789241c
SHA2563e30a4d16f894d14cc09eadb95acfe0f70a2c4262f6a943d6959a553e728ed02
SHA512dd4e960a2c3fd655da90deba64839f9e066009361e58b6c298a5a480866c4ac709831b9447fe93fd323664ef49a4a9bf66ce9456f5dbad1c58ebd9873c46c9bc
-
Filesize
92KB
MD56c71714668e41927f306d0cebf36ce4f
SHA1985d9063192bae2797de69aba91748a3b3b2513a
SHA2560b10c39c81d092c73145c18df615a74100fba98a44caa79eb9adc994d1018358
SHA512736a56f3b0d1e2b25aa79af8e23fa6797b05e8ed13fafabb35f62149b1c238b25cd51f09ad13720fc3d8db91828b38b390f5a39f0cf1dcb259c11280c74a6727
-
Filesize
159KB
MD5b54d438321342ff206752549562d97b8
SHA1615131a3d37c2028c768ea4f2eae15a877084b24
SHA2567e028dd6259af9edbc3394fe00c031f3755eb77a9597a2017e182d8582b0537b
SHA5128d19498c1a6fec2471abd75400fa00dfdde4c8a411dc39f3c3bb8a76d06562844f5b713295c0fdb13622e0e1f61649c36d1f96d61d8b8f74bc506e6410f91c19
-
Filesize
74KB
MD50ae1aff2dcef61ba5026a54945f66d9e
SHA18524dd70bc04d050dbfa34c40c39ede5bc4e4375
SHA256b7969e46116a974978b92fc21d0e911f25f7a7ff163ff9803cd8336720fbb75c
SHA512063c940159278ca0715f6783c0c157f3d8a748ce9ca4138c3ea271ab0f4389d0cab861f3184759dce28369b94d847215a6ff25d1518cabb9fe4bbe11bf577878
-
Filesize
298KB
MD520f8663b9b4667749fb8added949cfef
SHA1eb1f8f4c67dbf4f00422b42f0deaf3fe7dd2c0ce
SHA25634e0f7df8f76cc68659aff55c65b15c0476d6d08484c8169d9b0aa51b6a4e3a3
SHA512ff0a17a9e3d232b0e9aac077b02cb4810a885cb95205b36163e6f3179621f247033d5d998493628ba75f8e407d0d4fa1948db06b491a51c21073a403d8dd3519
-
Filesize
205KB
MD555481cdba879a7aef38a3326b3440f54
SHA19ef6703755a511d691444f4fc9ef611e13f08657
SHA2563001173b125e49949585c58316cf4917e2969e0ab5ae94ff005cb44c2c95f30c
SHA5125defa99cb48635179ffb568773790fcea7182919fbad37df72ce212f6ea67f51ac03c6de7f784010ff1432aa5405c22653e674b47ebd00b69860e808777785b0
-
Filesize
256KB
MD537da9fc3ad51b33082ca3aa0b4393289
SHA1ae24ce1cfd05ae7dea192a34a172a607f2ce5ace
SHA256783d6ffa260952437e58d889febe32c2f679d78a8d0a16f4f48dedef85b38793
SHA512233b0313cc74986c9ca02b587b2a821315e6916b815f619a3b0c831fdd6711ccd0c1ffe1f7b78161d7f30fbe13568f7f5a22daf1a9b02cab5eee5255e55e5ea3
-
Filesize
40KB
MD54214cd407201f93d3baf8f75c6f8167d
SHA1e6b33523d560c93f39f6586acd1475165d1f67ca
SHA25619e823f9f58e9e6199d1d635987818e96ced46ab6552df416ad473efee4a77fe
SHA512863dd788bcdf6d947ad5ee2f9bb25006ae372f93bdc0e54bc758abac5a649234540239a129f6a5651b86a1e626e5c023691d5fe394e748f4c46be742d382a9b4
-
Filesize
33KB
MD5b6be05f0dd50842b75e4587e5f851f58
SHA107d8e91a90d7f900c1faf9b3bfb1a5c6a79d7972
SHA256ed55ff9b20056f71a9f23532d12ecf895875cdf84a17a970ffc202c51abb174c
SHA51208e0397c8a505d2fba625604c82c2306574e7ae7ab2944603b8714cab28406c60f3fa8607496bd072964364a74e791656d3a293b9ea2af4362d8878681b9c26a
-
Filesize
3KB
MD56a8c4b146ecf4cdeb261984ff257a701
SHA10bf68d438aa1143541ce5e776c8baff369c5452f
SHA2568ae4fd77d89cae193fc05431cefa0fdc10e513753b258f608beb9598cd302240
SHA512077eea4f0dddd6d441a0b2169756ca6c6798d2acf856e4f56655cccdc39ebdabccf7d84f8fce4860c68d4c62859991f5ba570ac81ae4c47efa084c5f65c62682
-
Filesize
45KB
MD5e8d0a210a7de9cb675e1378280b0b6de
SHA1c2ab939a2766a03bf6c24459cd935c2d580f220d
SHA256c7c4be5ef5432feb35d5b82dadc75a8e6292be3f6630a23c22c1b66957344d0b
SHA512e3aed655216ba65313dfc649215cb55b215aa5a3bccb14598d335ada70f6b0d02cc0133b02e755ae53f6e3983c19366dda6364ca91976fb07def3f5eaeb54fb5
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
292KB
MD54fdcbd400b20969c0baf04276dfdc361
SHA1011a76bd66f447b5a1f6c357ed63a03f5ad742c1
SHA256f86c4d3a156df826e3b5bcb7793692220df1efa8c6067ffdc9378727bfa2839e
SHA5121ae94105602d7a2d14b09c74e5b28cca948381dc57abc1448b5017825f98ddf910e8fa7bce115f8c281bf596939a27c1c7ec24d788217da03afad9f6351766ac
-
Filesize
70KB
MD5fe0a8be82bd5c0951846e26e43803ee3
SHA1116b8443771a42c8944ecba2eebefcbfa0aa4068
SHA2562581b75f93e4256f8bad1ac902ad1a0701258577a499c5c7284c0a77b91b0408
SHA5129e6870017213b39ca9f38191b9a9c4b019f32fe1c7b75789a71fef7e723174b03d468fdf750e2b5f1d478aba7ebb5ca11ca0be0b496e206d5a4168a0fcea14c8
-
Filesize
30KB
MD5c421cd256a9e458e533d76fe317aa6fd
SHA15daa9ab36747fedd2d44eca29b846a771d7f0494
SHA256221c96a46db253b7d5974b6b6a3a562e772a0c64a892985be6b4bdd25e8a05d8
SHA5125ba8af55627f3e16df084f3da3ebf0b419d67bb35c2a5bf73fa5325935be576d4b862e2358651f5bbe78cb954f01bccb65186f6cfd48fbe8a22a3adaa8d1442a
-
Filesize
42KB
MD557baca6cb360cc9df0065c3a6803fc01
SHA1f029f091ed00eb52b692ac292b0e70b1bc18f945
SHA2565a0cd94cffafeabb2a56d5c3db008141b6cf944ceaaa445be80d6d2ff42104c6
SHA512df36aba110c8f06675c3f8bb789dd86783c76a1c772649bf18abb6fda83554b7954369ec070c7a519b162ea0f58e488f0db7251c9306d32e545c181777ddf0c6
-
Filesize
31KB
MD579f9230792c209d7ada5fe9bc4bfb07e
SHA1a6162120d5823435bd2f5cb76a2c9e04ea79f33b
SHA2561b502fdf46cf423173cfdc3e0560e6dbdfa7771de29899e14533819c400fa6af
SHA5127ed421ca0e753b33e9cd0220375b8f5a7bd3fe4a1990bcb4c88340eac9c7b5fbdc4a15a3ca9086015a4b893ecdfb0d89daf470022ba9c5764b9223fe7eb4c2ea