Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
5f3ca048a2b085e7ab53d25f2f565682.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5f3ca048a2b085e7ab53d25f2f565682.exe
Resource
win10v2004-20231215-en
General
-
Target
5f3ca048a2b085e7ab53d25f2f565682.exe
-
Size
512KB
-
MD5
5f3ca048a2b085e7ab53d25f2f565682
-
SHA1
eaef69141dc9a347dcb9af36d8afc1e57e426c02
-
SHA256
c93dcc55a1620214857eb4862bc0467424047ff13ede76e9414e5b3d1e968845
-
SHA512
b60b936b9172ae56f610599c554961865c01baf2617fb89dcd474f14c8503a9ad0ac5aa63cb31bc410bd246909e1a4d72efd16f84e9234553cd2c6fceac233ac
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj69:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5E
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ipuydnhprl.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ipuydnhprl.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ipuydnhprl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ipuydnhprl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ipuydnhprl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ipuydnhprl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ipuydnhprl.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ipuydnhprl.exe -
Executes dropped EXE 5 IoCs
pid Process 2824 ipuydnhprl.exe 2740 njguoqzkxlkclsq.exe 1904 qwmumhxd.exe 2540 rlrlsgbcqergg.exe 2272 qwmumhxd.exe -
Loads dropped DLL 6 IoCs
pid Process 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2856 cmd.exe 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2824 ipuydnhprl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ipuydnhprl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ipuydnhprl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ipuydnhprl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ipuydnhprl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ipuydnhprl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ipuydnhprl.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\hsrcdxuk = "ipuydnhprl.exe" njguoqzkxlkclsq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zlzjfhjj = "njguoqzkxlkclsq.exe" njguoqzkxlkclsq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "rlrlsgbcqergg.exe" njguoqzkxlkclsq.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\m: qwmumhxd.exe File opened (read-only) \??\r: qwmumhxd.exe File opened (read-only) \??\s: ipuydnhprl.exe File opened (read-only) \??\g: qwmumhxd.exe File opened (read-only) \??\n: qwmumhxd.exe File opened (read-only) \??\s: qwmumhxd.exe File opened (read-only) \??\z: qwmumhxd.exe File opened (read-only) \??\g: qwmumhxd.exe File opened (read-only) \??\i: qwmumhxd.exe File opened (read-only) \??\z: ipuydnhprl.exe File opened (read-only) \??\w: qwmumhxd.exe File opened (read-only) \??\t: ipuydnhprl.exe File opened (read-only) \??\a: qwmumhxd.exe File opened (read-only) \??\h: qwmumhxd.exe File opened (read-only) \??\o: qwmumhxd.exe File opened (read-only) \??\a: ipuydnhprl.exe File opened (read-only) \??\g: ipuydnhprl.exe File opened (read-only) \??\p: ipuydnhprl.exe File opened (read-only) \??\h: ipuydnhprl.exe File opened (read-only) \??\q: ipuydnhprl.exe File opened (read-only) \??\u: ipuydnhprl.exe File opened (read-only) \??\b: qwmumhxd.exe File opened (read-only) \??\e: qwmumhxd.exe File opened (read-only) \??\u: qwmumhxd.exe File opened (read-only) \??\w: qwmumhxd.exe File opened (read-only) \??\m: ipuydnhprl.exe File opened (read-only) \??\n: ipuydnhprl.exe File opened (read-only) \??\m: qwmumhxd.exe File opened (read-only) \??\r: qwmumhxd.exe File opened (read-only) \??\n: qwmumhxd.exe File opened (read-only) \??\y: qwmumhxd.exe File opened (read-only) \??\l: ipuydnhprl.exe File opened (read-only) \??\v: ipuydnhprl.exe File opened (read-only) \??\l: qwmumhxd.exe File opened (read-only) \??\k: qwmumhxd.exe File opened (read-only) \??\s: qwmumhxd.exe File opened (read-only) \??\k: ipuydnhprl.exe File opened (read-only) \??\y: ipuydnhprl.exe File opened (read-only) \??\v: qwmumhxd.exe File opened (read-only) \??\i: qwmumhxd.exe File opened (read-only) \??\j: qwmumhxd.exe File opened (read-only) \??\b: ipuydnhprl.exe File opened (read-only) \??\o: qwmumhxd.exe File opened (read-only) \??\q: qwmumhxd.exe File opened (read-only) \??\b: qwmumhxd.exe File opened (read-only) \??\v: qwmumhxd.exe File opened (read-only) \??\i: ipuydnhprl.exe File opened (read-only) \??\k: qwmumhxd.exe File opened (read-only) \??\l: qwmumhxd.exe File opened (read-only) \??\e: ipuydnhprl.exe File opened (read-only) \??\r: ipuydnhprl.exe File opened (read-only) \??\x: ipuydnhprl.exe File opened (read-only) \??\p: qwmumhxd.exe File opened (read-only) \??\x: qwmumhxd.exe File opened (read-only) \??\j: qwmumhxd.exe File opened (read-only) \??\u: qwmumhxd.exe File opened (read-only) \??\h: qwmumhxd.exe File opened (read-only) \??\p: qwmumhxd.exe File opened (read-only) \??\q: qwmumhxd.exe File opened (read-only) \??\t: qwmumhxd.exe File opened (read-only) \??\j: ipuydnhprl.exe File opened (read-only) \??\w: ipuydnhprl.exe File opened (read-only) \??\a: qwmumhxd.exe File opened (read-only) \??\e: qwmumhxd.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ipuydnhprl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ipuydnhprl.exe -
AutoIT Executable 20 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2132-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x000a000000012266-5.dat autoit_exe behavioral1/files/0x000a000000012243-17.dat autoit_exe behavioral1/files/0x000a000000012266-25.dat autoit_exe behavioral1/files/0x002e00000001420d-34.dat autoit_exe behavioral1/files/0x0007000000014468-37.dat autoit_exe behavioral1/files/0x0007000000014468-39.dat autoit_exe behavioral1/files/0x0007000000014468-36.dat autoit_exe behavioral1/files/0x0007000000014468-35.dat autoit_exe behavioral1/files/0x002e00000001420d-42.dat autoit_exe behavioral1/files/0x002e00000001420d-41.dat autoit_exe behavioral1/files/0x002e00000001420d-32.dat autoit_exe behavioral1/files/0x002e00000001420d-29.dat autoit_exe behavioral1/files/0x000a000000012243-28.dat autoit_exe behavioral1/files/0x000a000000012266-27.dat autoit_exe behavioral1/files/0x000a000000012266-21.dat autoit_exe behavioral1/files/0x000a000000012243-20.dat autoit_exe behavioral1/files/0x0006000000016cb9-64.dat autoit_exe behavioral1/files/0x0006000000016cc5-70.dat autoit_exe behavioral1/files/0x0006000000016cb9-67.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ipuydnhprl.exe File opened for modification C:\Windows\SysWOW64\ipuydnhprl.exe 5f3ca048a2b085e7ab53d25f2f565682.exe File created C:\Windows\SysWOW64\rlrlsgbcqergg.exe 5f3ca048a2b085e7ab53d25f2f565682.exe File opened for modification C:\Windows\SysWOW64\rlrlsgbcqergg.exe 5f3ca048a2b085e7ab53d25f2f565682.exe File created C:\Windows\SysWOW64\qwmumhxd.exe 5f3ca048a2b085e7ab53d25f2f565682.exe File opened for modification C:\Windows\SysWOW64\qwmumhxd.exe 5f3ca048a2b085e7ab53d25f2f565682.exe File created C:\Windows\SysWOW64\ipuydnhprl.exe 5f3ca048a2b085e7ab53d25f2f565682.exe File created C:\Windows\SysWOW64\njguoqzkxlkclsq.exe 5f3ca048a2b085e7ab53d25f2f565682.exe File opened for modification C:\Windows\SysWOW64\njguoqzkxlkclsq.exe 5f3ca048a2b085e7ab53d25f2f565682.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qwmumhxd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qwmumhxd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal qwmumhxd.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qwmumhxd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qwmumhxd.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qwmumhxd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qwmumhxd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal qwmumhxd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal qwmumhxd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qwmumhxd.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qwmumhxd.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qwmumhxd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal qwmumhxd.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qwmumhxd.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 5f3ca048a2b085e7ab53d25f2f565682.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" ipuydnhprl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F88FF8B4F5D851D9042D7207D97BDEEE633594266456342D7EA" 5f3ca048a2b085e7ab53d25f2f565682.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf ipuydnhprl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg ipuydnhprl.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" ipuydnhprl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc ipuydnhprl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78668B6FF6621DBD20FD1A68B7C9161" 5f3ca048a2b085e7ab53d25f2f565682.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1944 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2740 njguoqzkxlkclsq.exe 2740 njguoqzkxlkclsq.exe 2740 njguoqzkxlkclsq.exe 2740 njguoqzkxlkclsq.exe 2740 njguoqzkxlkclsq.exe 2824 ipuydnhprl.exe 2824 ipuydnhprl.exe 2824 ipuydnhprl.exe 2824 ipuydnhprl.exe 2824 ipuydnhprl.exe 2740 njguoqzkxlkclsq.exe 1904 qwmumhxd.exe 1904 qwmumhxd.exe 1904 qwmumhxd.exe 1904 qwmumhxd.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2272 qwmumhxd.exe 2272 qwmumhxd.exe 2272 qwmumhxd.exe 2272 qwmumhxd.exe 2740 njguoqzkxlkclsq.exe 2740 njguoqzkxlkclsq.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2740 njguoqzkxlkclsq.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2740 njguoqzkxlkclsq.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2740 njguoqzkxlkclsq.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2740 njguoqzkxlkclsq.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2740 njguoqzkxlkclsq.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2740 njguoqzkxlkclsq.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2740 njguoqzkxlkclsq.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2740 njguoqzkxlkclsq.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2740 njguoqzkxlkclsq.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2740 njguoqzkxlkclsq.exe 2740 njguoqzkxlkclsq.exe 2740 njguoqzkxlkclsq.exe 2824 ipuydnhprl.exe 2824 ipuydnhprl.exe 2824 ipuydnhprl.exe 1904 qwmumhxd.exe 1904 qwmumhxd.exe 1904 qwmumhxd.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2272 qwmumhxd.exe 2272 qwmumhxd.exe 2272 qwmumhxd.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 2740 njguoqzkxlkclsq.exe 2740 njguoqzkxlkclsq.exe 2740 njguoqzkxlkclsq.exe 2824 ipuydnhprl.exe 2824 ipuydnhprl.exe 2824 ipuydnhprl.exe 1904 qwmumhxd.exe 1904 qwmumhxd.exe 1904 qwmumhxd.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2540 rlrlsgbcqergg.exe 2272 qwmumhxd.exe 2272 qwmumhxd.exe 2272 qwmumhxd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1944 WINWORD.EXE 1944 WINWORD.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2824 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 28 PID 2132 wrote to memory of 2824 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 28 PID 2132 wrote to memory of 2824 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 28 PID 2132 wrote to memory of 2824 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 28 PID 2132 wrote to memory of 2740 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 29 PID 2132 wrote to memory of 2740 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 29 PID 2132 wrote to memory of 2740 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 29 PID 2132 wrote to memory of 2740 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 29 PID 2132 wrote to memory of 1904 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 36 PID 2132 wrote to memory of 1904 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 36 PID 2132 wrote to memory of 1904 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 36 PID 2132 wrote to memory of 1904 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 36 PID 2740 wrote to memory of 2856 2740 njguoqzkxlkclsq.exe 34 PID 2740 wrote to memory of 2856 2740 njguoqzkxlkclsq.exe 34 PID 2740 wrote to memory of 2856 2740 njguoqzkxlkclsq.exe 34 PID 2740 wrote to memory of 2856 2740 njguoqzkxlkclsq.exe 34 PID 2132 wrote to memory of 2540 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 33 PID 2132 wrote to memory of 2540 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 33 PID 2132 wrote to memory of 2540 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 33 PID 2132 wrote to memory of 2540 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 33 PID 2824 wrote to memory of 2272 2824 ipuydnhprl.exe 31 PID 2824 wrote to memory of 2272 2824 ipuydnhprl.exe 31 PID 2824 wrote to memory of 2272 2824 ipuydnhprl.exe 31 PID 2824 wrote to memory of 2272 2824 ipuydnhprl.exe 31 PID 2132 wrote to memory of 1944 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 35 PID 2132 wrote to memory of 1944 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 35 PID 2132 wrote to memory of 1944 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 35 PID 2132 wrote to memory of 1944 2132 5f3ca048a2b085e7ab53d25f2f565682.exe 35 PID 1944 wrote to memory of 2924 1944 WINWORD.EXE 39 PID 1944 wrote to memory of 2924 1944 WINWORD.EXE 39 PID 1944 wrote to memory of 2924 1944 WINWORD.EXE 39 PID 1944 wrote to memory of 2924 1944 WINWORD.EXE 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f3ca048a2b085e7ab53d25f2f565682.exe"C:\Users\Admin\AppData\Local\Temp\5f3ca048a2b085e7ab53d25f2f565682.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\ipuydnhprl.exeipuydnhprl.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\qwmumhxd.exeC:\Windows\system32\qwmumhxd.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2272
-
-
-
C:\Windows\SysWOW64\njguoqzkxlkclsq.exenjguoqzkxlkclsq.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.execmd.exe /c rlrlsgbcqergg.exe3⤵
- Loads dropped DLL
PID:2856
-
-
-
C:\Windows\SysWOW64\rlrlsgbcqergg.exerlrlsgbcqergg.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2540
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2924
-
-
-
C:\Windows\SysWOW64\qwmumhxd.exeqwmumhxd.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1904
-
-
C:\Windows\SysWOW64\rlrlsgbcqergg.exerlrlsgbcqergg.exe1⤵PID:2752
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5009a35ba6f667971597d9e0a329b07c8
SHA185b627c968cf5cff19576f91ed03a81a5b1dcaa7
SHA25640c347abd88b9895323d240ce5899684c4fc780f460334ad51fb845cce8129a5
SHA512e38fab02b5d14dc1d62c760a8c12f545890547368fa3325ec0a5dc3e76cd865222685121fca953c54843c3e50e0e6eaaa8eb1770059d9735db04f602b2080644
-
Filesize
25KB
MD54424637682ceb966732f11183e97a207
SHA1f9d7d88dd1663cd8d712aba92437c3dc928dc6c2
SHA2560e5aabe24254910e7824404eb676e03297117f5139417ef71dac35929b1a5e3e
SHA512af29412ca0b7a87a3f64be7d5bb84fdbb390c83b3a9cac90301bc6f45d832fbb8922cf75d7806794382ac2e74592e947317fd1a29e8ed585b78a4409b4f8baf4
-
Filesize
11KB
MD5297ce1fd8478151667d1717b7e6327df
SHA1ae737f1adfe1120e7f196c0395538265971ebb85
SHA256b4dab32fa68f717b2ea035ffae7b2eb5efe3f8663261cc8b0e48b8a17a768716
SHA51214c361be352611b929e3db491c22c3eea2457303f0fb368be5cf5b40baa11a3d2cade06895a0efca4aa2cb27883b77c5307ce77b33325aec80a3eaff3a12b87e
-
Filesize
20KB
MD576f690c8cbb5d7c8c025ed23971fb407
SHA1e5e01dee0c15b1175fedcfd6d39896d6f06ec7e2
SHA25605d3bf68eb1b749fc1d8113cc31b74afbd64e181a8ed0b75aee07f64cf6858e9
SHA512edeae179eb47a9cd4050479af02abf414b7787be730309ecb805dbf0f6aa218473caa705630bca58c72ceabf9ba95ffc2fff711a3a0080e569f1f5bf3d10b485
-
Filesize
89KB
MD598307d376ea089bd2463d9729b3a715a
SHA183bf9a66e5ffae0eda7df9ef409fde57ea92e272
SHA256f92c0d866f8d72039ff5bba79aae0fb993b08dc1aa62ed71415a2259af05ba16
SHA51218b4427fbd2e472884ca520f037ef37bc1a70a9b62b237062f1420e2b9f4b7ed4edf4c40403219d7c24fd4a6bf1958c11652cab9c25de6c24f18b587d1279eaf
-
Filesize
49KB
MD5e1792e11aebc7a53f92359d5df32f3ca
SHA1a949835ba491daadcaa193868749e8057a449b69
SHA256a28d2c640d42554e743ed6d119c7fbd40410c388f2d6c423d49c8b295cb25cc7
SHA512af2cf87be1ce4e314fd3823cb8ed2d97a0e28e055b90c6971463cb07ac9584611e6e019f54158b68efa0fead0b1f622b4e5c8f8384619159e0b12b08ff5bc875
-
Filesize
71KB
MD549412c188533f92f8c7d185fd516c3c0
SHA1172e144aa86022cc981fb6e92df4a4689196c9ef
SHA256bd26e3fa562c6142d0b139a822bb39e556d36c67cecf9b3fd989228ccc6d76d2
SHA5125fe5152b8f6df1ae85d3e009f9cef69ace0003ccbef978171023a2e0dbc2a7a65cf21acd9fe33afa32a8644b5e4ac51efc854c74d91fd1daf790d1b9a675cd75
-
Filesize
63KB
MD5de0c94c13e7990ccb073b28fbdc92905
SHA12f9009d97ebbb36589bd26b74ab406ecff11918b
SHA2564918306737c96c36665a8892b74f05e644e328178e0922971bf2920623dd453f
SHA5125867155182ec71d4412f128bc05bc4465fb52017bfd7b691dc50527f036be482a7a9315e1e7eac8b15ad60f8c6fed01e5dd8e1194bad03454214b65404dcf0b4
-
Filesize
512KB
MD568c314131b375e0341de652f47b31567
SHA1d79882ca5a44e664391bd4826828dc1497ffddd2
SHA256b7eb84fec49e8dfdb58320791c01f69fe9370859e3a0b9f21e4ff4cdd60637c1
SHA512702c71e73d7c5c2b83f0f98dfb9021f9b1d2f185c18b7abd0735a123d60051eec3e0d1b2043df23ac5cc96e3ebfb20f95a852e8778d8dd85886445fbfcdb7405
-
Filesize
51KB
MD5628b9eda9b7b89ae3e60ca8066b24cbb
SHA1c523a1e5c752e898949cc7241193bdc89b2a3ec9
SHA2565f325389a2adc1328c02505a0ebc0cc255b2fb6b32199e5d30bac2501664be9e
SHA512c48132a11a536d09f22ddb856c8ff8e7a5f875f60065c64f62a39f328688f2d183f019df0a737db3fa7089c2e5ba1b75b935ca7a127947d2dfa568758b6f9438
-
Filesize
90KB
MD548870f9ac7dddada77c46642ccbe71ca
SHA1953a2c3a2e04b26a9cac5c786c73e65795c69477
SHA256d6657c261b622455d86a8ea90fb6de4fe03f801def54c4dc4115b4f7707781e0
SHA512a8366cbcaa4f2ffeecabf71a1828ff1b4f69a1aa9feacd7b3b5c7f17ccd57bfc867722910fe794542b06f383d14911e95bb3a78b5836caad38041fc4c0ec1a4f
-
Filesize
49KB
MD5d6285bde9e2ee885acefcf12ddb911fd
SHA10def7851cd346cc53bdb846b1e952d602d477235
SHA256232ff92151bc4456507bf1c3e7bbd0f04d43b7b418720bbe89481e86932aef93
SHA5121de59168d45434a18ee6715cecc81d4e08f76c17c4252dbe4c1ba88a7010c9b464ef4c2f1ce5e78fe9d43b310f121505aa161eaada3f70dd8f84c679cdc93c57
-
Filesize
74KB
MD54f8b8ad8113bcd9003b8ade90e907571
SHA1ad0ac196df29cc34fbbb8f72a0f7305c4e8dc622
SHA2560d125192ac1b19fb7e130bdb8f16f6a14df5565bd9f7193d371aaa3298aa12c9
SHA512010d7cb75a640f7e1ab980e818e8042e18889b5522e8472490791eaaa6011ff6851aad14c9da697963bf0d664ca224abd5e0ba79227da8ce2f5461fe67e173a8
-
Filesize
17KB
MD58becc7f85fd388aff4438431bf27a7ec
SHA19c78024c72058e836ca4122b507d30ca109136cf
SHA256888a2a0d5271f660439003d1d838f6ec40a6eff2daf8655c316191126936902b
SHA512935b1106c3dc09fe6672c19e0826d236cbbd03fb1375189519eaf1dc57496150fabea6722597b79b4ff9b3f0286866fbc68c5b914d46ce8f43ac4bd29aa3df3b
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
201KB
MD5a42fb808ecf4dfc50ea3b292af3291ad
SHA18018e0c2e50952edbe5e4c26eff9487b84a54e89
SHA2569b4b8ac0b8afe58831ef22c01a3ddd5fa9f85a283ca3307ebce00e5877bd8bac
SHA5122f3a4ec831d61ea59a281301664850c1e8d58f230802312667d481dc29ed0b68b1d97784a531d57f5f66b111b4100651433faaa01e99d98971ac9010bde97aaa
-
Filesize
111KB
MD5d19e7634163d56122b141918decd06fb
SHA15479c0cf53c814d564995ebfc341ce93de1dadb7
SHA2560cf01383d883475d399f8d28f8116958e925a7b371f3ca15527e0f1b1a47e624
SHA512da9ad571d7348dd6a0652ea1ca5587bd288db1ed5c85259e46a89c36d2c49e5eb708f1e8b162f05ec8d4cb62116f1775cc7a2d4746c0f53d70fe96fb998688ca
-
Filesize
71KB
MD5f44ccdc94ec1419fb4a3861481a343f4
SHA15ef47ba27b8c08f57bd4e050e0663e991d388635
SHA256a61340a9127fdd0249741be44fd8759d9b8afd7858700b7ed7b2ef154150e54f
SHA51268cdf0609333de7da638426d61c599098663e7adcef94ff79ff4db40859b88564927f30675df85398c6ec6603f96a586f7d7a04a37b2ddabf8e7cb9a4129f0c6
-
Filesize
72KB
MD5d0e291a1dababd5031bf65553d271402
SHA1f3dc91e946f6a6f04f28b18e6143baaba98af3fd
SHA25649571e7b79b1f8d792b4f773f3ffc4e1f86a068155ed6ef969b901730854ccf2
SHA51257cea93d7c421456a9e541aebc5121339aa1c162089147ea3608540cb8371c285e8d7c7993eb757baa3e6c4d327fb3244b1ece73f720cc061a49e8eaf5168e1d
-
Filesize
27KB
MD59e696f19802dd14d5d6b5bd6c93b8cd2
SHA144d1ed37eef83b84ab752f089b4fcbd00f4d225d
SHA2566da95093c1177f25a593c2cb1cee2320f571ce0d67857385a656c4bfda0edae3
SHA512d13a9797f06312caa5d0314823ae5ee806fd9ee2744e7f393a58381c5463ef215c765e24b96c3780393b14bb34346233cf8fe4f976c142efd2949d256fc95782
-
Filesize
40KB
MD5b4f79c9ec51207583609dc93e31224a8
SHA1067645c8a86172623bb2d281fdefcb8ec9599522
SHA256c8ec0bf8f9c4c4e71166d2319f815df593a221a260a263fab31905adf9686a31
SHA51261b8759b1fa9f4ca4bf45841af5b905b0c0b3c186ea27e788a9e7b64eccb4e4c8a7e4558e442b7b42020b8d3aff15dffd6c7c225de0fe6f422e463420d8b4390