Analysis
-
max time kernel
159s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:08
Static task
static1
Behavioral task
behavioral1
Sample
13031b75367b2e693536340c9991f2aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13031b75367b2e693536340c9991f2aa.exe
Resource
win10v2004-20231215-en
General
-
Target
13031b75367b2e693536340c9991f2aa.exe
-
Size
512KB
-
MD5
13031b75367b2e693536340c9991f2aa
-
SHA1
29c270b87d6370f21b1be73377a75a96b9d88c8a
-
SHA256
4ccde3991140cea6b86acb8d2fd3ec64804567cd77711d154e7668b9d0dbde95
-
SHA512
90014ebce8fc47ef8a229e8423291d9b256643d0ee0022ea8772b774519b9d06f0e5cc577318d5d74d83286b743f0e7dce6d02567612ac8d33ffaf14bbea8c63
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6a:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm53
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cpxjrnvpvx.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cpxjrnvpvx.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" cpxjrnvpvx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" cpxjrnvpvx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" cpxjrnvpvx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" cpxjrnvpvx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" cpxjrnvpvx.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cpxjrnvpvx.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 5 IoCs
pid Process 2900 cpxjrnvpvx.exe 2116 jyraycomgpjqgdx.exe 2876 tfeaypis.exe 1892 erqfturyylvyu.exe 1592 tfeaypis.exe -
Loads dropped DLL 5 IoCs
pid Process 1648 13031b75367b2e693536340c9991f2aa.exe 1648 13031b75367b2e693536340c9991f2aa.exe 1648 13031b75367b2e693536340c9991f2aa.exe 1648 13031b75367b2e693536340c9991f2aa.exe 2900 cpxjrnvpvx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" cpxjrnvpvx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" cpxjrnvpvx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" cpxjrnvpvx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" cpxjrnvpvx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" cpxjrnvpvx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" cpxjrnvpvx.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xdvodjwf = "cpxjrnvpvx.exe" jyraycomgpjqgdx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qevrbcqi = "jyraycomgpjqgdx.exe" jyraycomgpjqgdx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "erqfturyylvyu.exe" jyraycomgpjqgdx.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: tfeaypis.exe File opened (read-only) \??\n: cpxjrnvpvx.exe File opened (read-only) \??\l: tfeaypis.exe File opened (read-only) \??\g: tfeaypis.exe File opened (read-only) \??\n: tfeaypis.exe File opened (read-only) \??\q: tfeaypis.exe File opened (read-only) \??\o: tfeaypis.exe File opened (read-only) \??\s: tfeaypis.exe File opened (read-only) \??\p: cpxjrnvpvx.exe File opened (read-only) \??\a: tfeaypis.exe File opened (read-only) \??\q: tfeaypis.exe File opened (read-only) \??\e: tfeaypis.exe File opened (read-only) \??\v: tfeaypis.exe File opened (read-only) \??\k: cpxjrnvpvx.exe File opened (read-only) \??\l: cpxjrnvpvx.exe File opened (read-only) \??\o: cpxjrnvpvx.exe File opened (read-only) \??\r: tfeaypis.exe File opened (read-only) \??\h: tfeaypis.exe File opened (read-only) \??\n: tfeaypis.exe File opened (read-only) \??\j: tfeaypis.exe File opened (read-only) \??\i: cpxjrnvpvx.exe File opened (read-only) \??\v: cpxjrnvpvx.exe File opened (read-only) \??\x: cpxjrnvpvx.exe File opened (read-only) \??\k: tfeaypis.exe File opened (read-only) \??\q: cpxjrnvpvx.exe File opened (read-only) \??\u: cpxjrnvpvx.exe File opened (read-only) \??\w: cpxjrnvpvx.exe File opened (read-only) \??\t: cpxjrnvpvx.exe File opened (read-only) \??\x: tfeaypis.exe File opened (read-only) \??\y: cpxjrnvpvx.exe File opened (read-only) \??\i: tfeaypis.exe File opened (read-only) \??\y: tfeaypis.exe File opened (read-only) \??\g: cpxjrnvpvx.exe File opened (read-only) \??\h: cpxjrnvpvx.exe File opened (read-only) \??\s: cpxjrnvpvx.exe File opened (read-only) \??\p: tfeaypis.exe File opened (read-only) \??\t: tfeaypis.exe File opened (read-only) \??\x: tfeaypis.exe File opened (read-only) \??\z: tfeaypis.exe File opened (read-only) \??\a: cpxjrnvpvx.exe File opened (read-only) \??\e: tfeaypis.exe File opened (read-only) \??\j: tfeaypis.exe File opened (read-only) \??\m: tfeaypis.exe File opened (read-only) \??\y: tfeaypis.exe File opened (read-only) \??\a: tfeaypis.exe File opened (read-only) \??\l: tfeaypis.exe File opened (read-only) \??\w: tfeaypis.exe File opened (read-only) \??\m: cpxjrnvpvx.exe File opened (read-only) \??\r: cpxjrnvpvx.exe File opened (read-only) \??\o: tfeaypis.exe File opened (read-only) \??\u: tfeaypis.exe File opened (read-only) \??\w: tfeaypis.exe File opened (read-only) \??\t: tfeaypis.exe File opened (read-only) \??\v: tfeaypis.exe File opened (read-only) \??\h: tfeaypis.exe File opened (read-only) \??\m: tfeaypis.exe File opened (read-only) \??\r: tfeaypis.exe File opened (read-only) \??\b: cpxjrnvpvx.exe File opened (read-only) \??\e: cpxjrnvpvx.exe File opened (read-only) \??\b: tfeaypis.exe File opened (read-only) \??\k: tfeaypis.exe File opened (read-only) \??\p: tfeaypis.exe File opened (read-only) \??\u: tfeaypis.exe File opened (read-only) \??\z: tfeaypis.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" cpxjrnvpvx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" cpxjrnvpvx.exe -
AutoIT Executable 15 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1648-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x000d000000012337-5.dat autoit_exe behavioral1/files/0x000a000000012287-17.dat autoit_exe behavioral1/files/0x000a000000012287-20.dat autoit_exe behavioral1/files/0x000d000000012337-21.dat autoit_exe behavioral1/files/0x000d000000012337-28.dat autoit_exe behavioral1/files/0x000d000000012337-33.dat autoit_exe behavioral1/files/0x000a000000012287-32.dat autoit_exe behavioral1/files/0x002f00000001482e-30.dat autoit_exe behavioral1/files/0x002f00000001482e-25.dat autoit_exe behavioral1/files/0x0007000000014c02-39.dat autoit_exe behavioral1/files/0x002f00000001482e-36.dat autoit_exe behavioral1/files/0x0007000000014c02-34.dat autoit_exe behavioral1/files/0x0006000000016262-71.dat autoit_exe behavioral1/files/0x00060000000162db-73.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\cpxjrnvpvx.exe 13031b75367b2e693536340c9991f2aa.exe File created C:\Windows\SysWOW64\jyraycomgpjqgdx.exe 13031b75367b2e693536340c9991f2aa.exe File opened for modification C:\Windows\SysWOW64\jyraycomgpjqgdx.exe 13031b75367b2e693536340c9991f2aa.exe File created C:\Windows\SysWOW64\tfeaypis.exe 13031b75367b2e693536340c9991f2aa.exe File created C:\Windows\SysWOW64\cpxjrnvpvx.exe 13031b75367b2e693536340c9991f2aa.exe File opened for modification C:\Windows\SysWOW64\tfeaypis.exe 13031b75367b2e693536340c9991f2aa.exe File created C:\Windows\SysWOW64\erqfturyylvyu.exe 13031b75367b2e693536340c9991f2aa.exe File opened for modification C:\Windows\SysWOW64\erqfturyylvyu.exe 13031b75367b2e693536340c9991f2aa.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll cpxjrnvpvx.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe tfeaypis.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe tfeaypis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal tfeaypis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal tfeaypis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal tfeaypis.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe tfeaypis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe tfeaypis.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe tfeaypis.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe tfeaypis.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe tfeaypis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe tfeaypis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe tfeaypis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal tfeaypis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe tfeaypis.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 13031b75367b2e693536340c9991f2aa.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" cpxjrnvpvx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg cpxjrnvpvx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33402D789D2183556D3E76A577202DDE7CF165A8" 13031b75367b2e693536340c9991f2aa.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EF4FCFC4F588568903CD65B7E97BCE4E640594B66416237D691" 13031b75367b2e693536340c9991f2aa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1938C67414E4DBC0B8BD7CE7EC9F34B9" 13031b75367b2e693536340c9991f2aa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" cpxjrnvpvx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" cpxjrnvpvx.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1268 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1648 13031b75367b2e693536340c9991f2aa.exe 1648 13031b75367b2e693536340c9991f2aa.exe 1648 13031b75367b2e693536340c9991f2aa.exe 1648 13031b75367b2e693536340c9991f2aa.exe 1648 13031b75367b2e693536340c9991f2aa.exe 1648 13031b75367b2e693536340c9991f2aa.exe 1648 13031b75367b2e693536340c9991f2aa.exe 1648 13031b75367b2e693536340c9991f2aa.exe 2116 jyraycomgpjqgdx.exe 2116 jyraycomgpjqgdx.exe 2116 jyraycomgpjqgdx.exe 2116 jyraycomgpjqgdx.exe 2116 jyraycomgpjqgdx.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 2876 tfeaypis.exe 2876 tfeaypis.exe 2876 tfeaypis.exe 2876 tfeaypis.exe 2900 cpxjrnvpvx.exe 2900 cpxjrnvpvx.exe 2900 cpxjrnvpvx.exe 2900 cpxjrnvpvx.exe 2900 cpxjrnvpvx.exe 1592 tfeaypis.exe 1592 tfeaypis.exe 1592 tfeaypis.exe 1592 tfeaypis.exe 2116 jyraycomgpjqgdx.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 2116 jyraycomgpjqgdx.exe 2116 jyraycomgpjqgdx.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 2116 jyraycomgpjqgdx.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 2116 jyraycomgpjqgdx.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 2116 jyraycomgpjqgdx.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 2116 jyraycomgpjqgdx.exe 2116 jyraycomgpjqgdx.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 2116 jyraycomgpjqgdx.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 2116 jyraycomgpjqgdx.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 2116 jyraycomgpjqgdx.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 2116 jyraycomgpjqgdx.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 1648 13031b75367b2e693536340c9991f2aa.exe 1648 13031b75367b2e693536340c9991f2aa.exe 1648 13031b75367b2e693536340c9991f2aa.exe 2900 cpxjrnvpvx.exe 2900 cpxjrnvpvx.exe 2900 cpxjrnvpvx.exe 2116 jyraycomgpjqgdx.exe 2116 jyraycomgpjqgdx.exe 2116 jyraycomgpjqgdx.exe 2876 tfeaypis.exe 2876 tfeaypis.exe 2876 tfeaypis.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 1592 tfeaypis.exe 1592 tfeaypis.exe 1592 tfeaypis.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 1648 13031b75367b2e693536340c9991f2aa.exe 1648 13031b75367b2e693536340c9991f2aa.exe 1648 13031b75367b2e693536340c9991f2aa.exe 2900 cpxjrnvpvx.exe 2900 cpxjrnvpvx.exe 2900 cpxjrnvpvx.exe 2116 jyraycomgpjqgdx.exe 2116 jyraycomgpjqgdx.exe 2116 jyraycomgpjqgdx.exe 2876 tfeaypis.exe 2876 tfeaypis.exe 2876 tfeaypis.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 1892 erqfturyylvyu.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1268 WINWORD.EXE 1268 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2900 1648 13031b75367b2e693536340c9991f2aa.exe 27 PID 1648 wrote to memory of 2900 1648 13031b75367b2e693536340c9991f2aa.exe 27 PID 1648 wrote to memory of 2900 1648 13031b75367b2e693536340c9991f2aa.exe 27 PID 1648 wrote to memory of 2900 1648 13031b75367b2e693536340c9991f2aa.exe 27 PID 1648 wrote to memory of 2116 1648 13031b75367b2e693536340c9991f2aa.exe 29 PID 1648 wrote to memory of 2116 1648 13031b75367b2e693536340c9991f2aa.exe 29 PID 1648 wrote to memory of 2116 1648 13031b75367b2e693536340c9991f2aa.exe 29 PID 1648 wrote to memory of 2116 1648 13031b75367b2e693536340c9991f2aa.exe 29 PID 1648 wrote to memory of 2876 1648 13031b75367b2e693536340c9991f2aa.exe 28 PID 1648 wrote to memory of 2876 1648 13031b75367b2e693536340c9991f2aa.exe 28 PID 1648 wrote to memory of 2876 1648 13031b75367b2e693536340c9991f2aa.exe 28 PID 1648 wrote to memory of 2876 1648 13031b75367b2e693536340c9991f2aa.exe 28 PID 1648 wrote to memory of 1892 1648 13031b75367b2e693536340c9991f2aa.exe 30 PID 1648 wrote to memory of 1892 1648 13031b75367b2e693536340c9991f2aa.exe 30 PID 1648 wrote to memory of 1892 1648 13031b75367b2e693536340c9991f2aa.exe 30 PID 1648 wrote to memory of 1892 1648 13031b75367b2e693536340c9991f2aa.exe 30 PID 2900 wrote to memory of 1592 2900 cpxjrnvpvx.exe 33 PID 2900 wrote to memory of 1592 2900 cpxjrnvpvx.exe 33 PID 2900 wrote to memory of 1592 2900 cpxjrnvpvx.exe 33 PID 2900 wrote to memory of 1592 2900 cpxjrnvpvx.exe 33 PID 1648 wrote to memory of 1268 1648 13031b75367b2e693536340c9991f2aa.exe 32 PID 1648 wrote to memory of 1268 1648 13031b75367b2e693536340c9991f2aa.exe 32 PID 1648 wrote to memory of 1268 1648 13031b75367b2e693536340c9991f2aa.exe 32 PID 1648 wrote to memory of 1268 1648 13031b75367b2e693536340c9991f2aa.exe 32 PID 1268 wrote to memory of 2324 1268 WINWORD.EXE 38 PID 1268 wrote to memory of 2324 1268 WINWORD.EXE 38 PID 1268 wrote to memory of 2324 1268 WINWORD.EXE 38 PID 1268 wrote to memory of 2324 1268 WINWORD.EXE 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\13031b75367b2e693536340c9991f2aa.exe"C:\Users\Admin\AppData\Local\Temp\13031b75367b2e693536340c9991f2aa.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\cpxjrnvpvx.execpxjrnvpvx.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\tfeaypis.exeC:\Windows\system32\tfeaypis.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1592
-
-
-
C:\Windows\SysWOW64\tfeaypis.exetfeaypis.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2876
-
-
C:\Windows\SysWOW64\jyraycomgpjqgdx.exejyraycomgpjqgdx.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2116
-
-
C:\Windows\SysWOW64\erqfturyylvyu.exeerqfturyylvyu.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1892
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2324
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2624
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD546348b13ee0ece89dce4ac3c1b3c9220
SHA115758da6b28fc0cf2f015ce689a41841f03727ea
SHA256e42f733d3e304c1c209dece0dfb17a0997675a7dff7d26e235655fb7a8e9fbf8
SHA512102044663e3f4dfe02acb2564056c8230083c5e6aa6529c1f41cd2ba224f627bdaf9632279f20f7d2ab5f64f99c4b97755e3ff1758b640e615bcd98b623c2f7c
-
Filesize
512KB
MD586800bd009748e1d56faaddb6561fbc2
SHA1781f443c642854f5fe7664b95f76871f50a3a8ee
SHA2569ab8e48cfbdf0a6b1a21434f863ad833e3c4301a7bae840771124eaa40a3a00a
SHA51233da4df871a2cd726696e677dacb13f9cc8206ea3fedd8107c35b3abb5e2dd9487ff397799524631e287e66481a637e03f3c423d9fd58e2b9696aa13a3fe2e78
-
Filesize
512KB
MD5cc4dd35ce53dfba1b243ff72139ba387
SHA15146164bbbb7d4181ef379eeda774a6823c442d1
SHA2566c87a3ea218a4cb8b69ecc7e564816d4d0ee392f9039ad1ffcbb6fc0837400c8
SHA51226871b2581545ee4a5fbd7eba658dfcd12bee57466536df6bf0efb4a946d1431368dad4b87c0b4d847338ced0af2e36c472fa4d4199e75a5de390380db75df51
-
Filesize
383KB
MD5411fb548616d3e06940b7fd7b0722043
SHA1da2d1ce44bab1e534034dbb2450d09ccf764cffc
SHA256012e826a0cd849ea25446b47c250e7084318a3f2a68f744ff46e93879cd76d77
SHA51266e7b44ad72af8b804c79d2b0637cbaffe00e16b2165d18cf1eff104ee12cc18f782859c79ecd272485a52748769118450a453fa23ca489e0ced5dbdb4569d2b
-
Filesize
512KB
MD5bbdd0299784d61096b70fd425aca06c1
SHA1c9608a286b6717b8daa3854c83bb7598d74731ea
SHA2562e4a858dc433aea9f1bc72f3dab9d8c4555b7fdd00f9ca2f72045d2aa093d7cb
SHA512c2180af733f7c84c316aeed80c7a38c3a4f05cd8801ae23226a6cac337f1d1a8c28318732dd4ecd5e70498bf5c3fffe310379563c2994187074170b932faa8b2
-
Filesize
416KB
MD51f6c284b1067c0e39390b8b96c81ea89
SHA107318079d72e0edfe8b4417d3a0e415ef26ac716
SHA256c29b8e21e273d705735aba693b6718fcbccefc2ffc2ffbaf9da9e50435e2557b
SHA512888cdf6710653edba494af3d748993e40f3d45aa011c1f0a04c9dbae9fd7895446f119603ff98e027acd9e6d8409b134dda8ec4d00ede3e4904dbd0100aa4df2
-
Filesize
286KB
MD51fe4634c8524fee84fcfbff636db2c65
SHA1fd77e4be4aa9764c2a74b1d61726dc22a8cb9944
SHA256b2b6f3394e2529f0a371af0a858a602b6113832123054696fc2dfa5ccb433421
SHA512641f988fa0f83439a8f350511adce43330697672e078573af1d4b721d2d5f8bc5f3b0dcf561befead228c3530a7d4b1c4d9c855a96ad1c4cb174eb8f556d276b
-
Filesize
512KB
MD5e8ac78a7265bb7af395b10d1fba3f89e
SHA1aa7d8f24685329457d263781b3df7aa88dc8b09a
SHA256fd01814435eab1fa79e695a93d6ab758610f2d04cd72e62559366d48cd0b00b4
SHA512b5a7b7752a6870333e2f5b84b4c9087cce5f8b2672fa3c4443a2a5c78c39cb921caf1cf7fdac824507a61ef24c7d2831b61a451bcc165ddb3018aee3c9c1be60
-
Filesize
328KB
MD508cddf1c7855a1aa8431dc59a0edbe33
SHA11e3fc8233aefefd74d8abfbfb8cd6e56360859f0
SHA256a216160cfc7159d3fe28148b64a3d32d22bce8689907ed34a88efc18bb9fe0af
SHA512defa857664e61646d8d630d559b08020d81ad07afee519bb439925ed5de379011dd0b381f15ce229585677490b7715f3e06b9febfd494bb11b84fccc8dfc4191
-
Filesize
439KB
MD58dcb5dba5d4238e2c1f3f3389deb3fe8
SHA11736deac19b1f7fc82d4ab2d392f64ce1e61a77c
SHA256029c88accd903e87fdd305c7d4918014218298d83857586d3ad48fdf1d6844bc
SHA512fb45538a33e66218bf745a70ce80ca9408f9effca283b337f239b369ad5fd4c8a82d5dc96ab0ad5bf1b07421f224b72de60f549f643ced582d6d041aaaa709ef
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
152KB
MD5bac1439a35feb1f91e2e74c05c4150db
SHA1e105c50524f5acb1457c4b67a8348897f18ffcc5
SHA256028c2509d2743e26bc414331a2e6b1aed3d5f51f94a690a211d03bd563636749
SHA512e660baf725c99f4a69ea7847d6be8af0556ef054e58eed5eae984a47cdb6df299b7e2bea9c2e946fd277e0b7fdfee23d4b75eddb8ecbfc09862c8356e680f7ab
-
Filesize
433KB
MD503b8daba3994ab75e6ee84bb80313b65
SHA119bae2a99d00b0e7ed1c0e983f4fd8bf505547f5
SHA2562e0756645649a8a77c31802364e4df49b0a70d1ba43a84f0b1c455eba86c76e8
SHA512ef7b277499a0c315ea3136108ef78de0adcfbcd1104afbb7afd7877ee0f27f00813f2aafd4a0105971643e9a8fa446d731dc629664c98da2e0ca70bcf7e416dd
-
Filesize
64KB
MD5d76d22b81130bc9206c7c947d7a9ea5e
SHA15956e88a6ec7949ce5a350e21703307d855f34b1
SHA256b96acd28ea28c51de470bf63ebbc33a346440fe63e236ab9f092e0cb3035b870
SHA512112f4f23127929556f27e12a7979ebd1536af790c92f8ff7870a5b39470bd02d83fbf1697e7ab3eccebd71c44ae7bfbd1dac9c39fefa6e15a488baf840b8aaf1
-
Filesize
512KB
MD562ec2fab6cb3f60c1f9543ded0006ce0
SHA1163451f5dc9778bd023a60a104754c66d4a6a00c
SHA256d6caf27a26edf845f6e13c40d5dce78cbe70ea86e932f3e5d9f5f37dba8ab391
SHA512cbc39703ebc15d63438e191ca28e00a383109764556fb4b131e25a2fa5098535980713a95dafa3e6df95087ddcda134037281b5c717e2d9acbc9e1bb6b3c3c49