Analysis
-
max time kernel
45s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 02:49
Static task
static1
Behavioral task
behavioral1
Sample
4a3fb4e1f4f9b3ca096d79c97a8919e1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4a3fb4e1f4f9b3ca096d79c97a8919e1.exe
Resource
win10v2004-20231222-en
General
-
Target
4a3fb4e1f4f9b3ca096d79c97a8919e1.exe
-
Size
512KB
-
MD5
4a3fb4e1f4f9b3ca096d79c97a8919e1
-
SHA1
7f44fd0c2627a885eba16025c681eb0b8dfbf38d
-
SHA256
bf8d972cd7da52d8e6ce3c79996c1f444ce57fbce63d44329abe13c2bfba31d8
-
SHA512
dfc33f856fb658106f392ca0b589b91a60d24a544ad683b5cb960db7b6e6e3348af527be372402e68f5ba5638500c0027bc9b68b99f82d907a55392fba568e84
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6u:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm55
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" rtxymzwyrt.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rtxymzwyrt.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rtxymzwyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rtxymzwyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" rtxymzwyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rtxymzwyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rtxymzwyrt.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" rtxymzwyrt.exe -
Executes dropped EXE 5 IoCs
pid Process 1176 rtxymzwyrt.exe 2260 ufkufpwgfbhipev.exe 1692 wyjxqrje.exe 2592 ujdgekxbwcqcy.exe 2828 wyjxqrje.exe -
Loads dropped DLL 5 IoCs
pid Process 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1176 rtxymzwyrt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rtxymzwyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rtxymzwyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rtxymzwyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" rtxymzwyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rtxymzwyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" rtxymzwyrt.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xlkannnl = "rtxymzwyrt.exe" ufkufpwgfbhipev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oqsezskd = "ufkufpwgfbhipev.exe" ufkufpwgfbhipev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "ujdgekxbwcqcy.exe" ufkufpwgfbhipev.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\z: wyjxqrje.exe File opened (read-only) \??\l: rtxymzwyrt.exe File opened (read-only) \??\o: rtxymzwyrt.exe File opened (read-only) \??\q: wyjxqrje.exe File opened (read-only) \??\x: wyjxqrje.exe File opened (read-only) \??\h: wyjxqrje.exe File opened (read-only) \??\z: wyjxqrje.exe File opened (read-only) \??\k: rtxymzwyrt.exe File opened (read-only) \??\s: wyjxqrje.exe File opened (read-only) \??\i: rtxymzwyrt.exe File opened (read-only) \??\g: wyjxqrje.exe File opened (read-only) \??\y: wyjxqrje.exe File opened (read-only) \??\o: wyjxqrje.exe File opened (read-only) \??\a: rtxymzwyrt.exe File opened (read-only) \??\e: rtxymzwyrt.exe File opened (read-only) \??\s: rtxymzwyrt.exe File opened (read-only) \??\t: rtxymzwyrt.exe File opened (read-only) \??\u: rtxymzwyrt.exe File opened (read-only) \??\w: rtxymzwyrt.exe File opened (read-only) \??\l: wyjxqrje.exe File opened (read-only) \??\p: wyjxqrje.exe File opened (read-only) \??\u: wyjxqrje.exe File opened (read-only) \??\h: rtxymzwyrt.exe File opened (read-only) \??\v: rtxymzwyrt.exe File opened (read-only) \??\y: rtxymzwyrt.exe File opened (read-only) \??\e: wyjxqrje.exe File opened (read-only) \??\m: wyjxqrje.exe File opened (read-only) \??\n: wyjxqrje.exe File opened (read-only) \??\x: rtxymzwyrt.exe File opened (read-only) \??\q: rtxymzwyrt.exe File opened (read-only) \??\r: wyjxqrje.exe File opened (read-only) \??\t: wyjxqrje.exe File opened (read-only) \??\m: wyjxqrje.exe File opened (read-only) \??\i: wyjxqrje.exe File opened (read-only) \??\t: wyjxqrje.exe File opened (read-only) \??\x: wyjxqrje.exe File opened (read-only) \??\g: wyjxqrje.exe File opened (read-only) \??\j: wyjxqrje.exe File opened (read-only) \??\p: wyjxqrje.exe File opened (read-only) \??\z: rtxymzwyrt.exe File opened (read-only) \??\k: wyjxqrje.exe File opened (read-only) \??\v: wyjxqrje.exe File opened (read-only) \??\w: wyjxqrje.exe File opened (read-only) \??\j: rtxymzwyrt.exe File opened (read-only) \??\r: rtxymzwyrt.exe File opened (read-only) \??\n: wyjxqrje.exe File opened (read-only) \??\w: wyjxqrje.exe File opened (read-only) \??\i: wyjxqrje.exe File opened (read-only) \??\b: wyjxqrje.exe File opened (read-only) \??\j: wyjxqrje.exe File opened (read-only) \??\q: wyjxqrje.exe File opened (read-only) \??\a: wyjxqrje.exe File opened (read-only) \??\b: wyjxqrje.exe File opened (read-only) \??\o: wyjxqrje.exe File opened (read-only) \??\a: wyjxqrje.exe File opened (read-only) \??\p: rtxymzwyrt.exe File opened (read-only) \??\r: wyjxqrje.exe File opened (read-only) \??\k: wyjxqrje.exe File opened (read-only) \??\l: wyjxqrje.exe File opened (read-only) \??\u: wyjxqrje.exe File opened (read-only) \??\b: rtxymzwyrt.exe File opened (read-only) \??\n: rtxymzwyrt.exe File opened (read-only) \??\s: wyjxqrje.exe File opened (read-only) \??\v: wyjxqrje.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" rtxymzwyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" rtxymzwyrt.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1764-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x000b000000015c3d-5.dat autoit_exe behavioral1/files/0x000a000000015626-17.dat autoit_exe behavioral1/files/0x0007000000015d1a-28.dat autoit_exe behavioral1/files/0x0009000000015cf6-25.dat autoit_exe behavioral1/files/0x0009000000015cf6-43.dat autoit_exe behavioral1/files/0x0007000000015d1a-36.dat autoit_exe behavioral1/files/0x00060000000167d5-65.dat autoit_exe behavioral1/files/0x0006000000016ca5-79.dat autoit_exe behavioral1/files/0x0006000000016cb6-84.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\wyjxqrje.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe File created C:\Windows\SysWOW64\ujdgekxbwcqcy.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll rtxymzwyrt.exe File opened for modification C:\Windows\SysWOW64\rtxymzwyrt.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe File created C:\Windows\SysWOW64\ufkufpwgfbhipev.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe File opened for modification C:\Windows\SysWOW64\ufkufpwgfbhipev.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe File opened for modification C:\Windows\SysWOW64\wyjxqrje.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe File opened for modification C:\Windows\SysWOW64\ujdgekxbwcqcy.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe File created C:\Windows\SysWOW64\rtxymzwyrt.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification C:\Program Files\OutClose.doc.exe wyjxqrje.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal wyjxqrje.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wyjxqrje.exe File created \??\c:\Program Files\OutClose.doc.exe wyjxqrje.exe File opened for modification \??\c:\Program Files\OutClose.doc.exe wyjxqrje.exe File opened for modification C:\Program Files\OutClose.nal wyjxqrje.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal wyjxqrje.exe File opened for modification \??\c:\Program Files\OutClose.doc.exe wyjxqrje.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wyjxqrje.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wyjxqrje.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal wyjxqrje.exe File opened for modification C:\Program Files\OutClose.nal wyjxqrje.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wyjxqrje.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wyjxqrje.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wyjxqrje.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wyjxqrje.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wyjxqrje.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal wyjxqrje.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wyjxqrje.exe File opened for modification C:\Program Files\OutClose.doc.exe wyjxqrje.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wyjxqrje.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs rtxymzwyrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF4FF8D485F856F913DD72C7E9DBDEFE635594466466346D69D" 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc rtxymzwyrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" rtxymzwyrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh rtxymzwyrt.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0866BB9FE6F21D9D27ED0A08A0C9166" 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" rtxymzwyrt.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" rtxymzwyrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2476 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1176 rtxymzwyrt.exe 1176 rtxymzwyrt.exe 1176 rtxymzwyrt.exe 1176 rtxymzwyrt.exe 1176 rtxymzwyrt.exe 1692 wyjxqrje.exe 1692 wyjxqrje.exe 1692 wyjxqrje.exe 1692 wyjxqrje.exe 2260 ufkufpwgfbhipev.exe 2260 ufkufpwgfbhipev.exe 2260 ufkufpwgfbhipev.exe 2260 ufkufpwgfbhipev.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2260 ufkufpwgfbhipev.exe 2828 wyjxqrje.exe 2828 wyjxqrje.exe 2828 wyjxqrje.exe 2828 wyjxqrje.exe 2260 ufkufpwgfbhipev.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2260 ufkufpwgfbhipev.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2260 ufkufpwgfbhipev.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2260 ufkufpwgfbhipev.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2260 ufkufpwgfbhipev.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2260 ufkufpwgfbhipev.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2260 ufkufpwgfbhipev.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2260 ufkufpwgfbhipev.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2260 ufkufpwgfbhipev.exe 2260 ufkufpwgfbhipev.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2260 ufkufpwgfbhipev.exe 2592 ujdgekxbwcqcy.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1176 rtxymzwyrt.exe 1176 rtxymzwyrt.exe 1176 rtxymzwyrt.exe 1692 wyjxqrje.exe 1692 wyjxqrje.exe 1692 wyjxqrje.exe 2260 ufkufpwgfbhipev.exe 2260 ufkufpwgfbhipev.exe 2592 ujdgekxbwcqcy.exe 2260 ufkufpwgfbhipev.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2828 wyjxqrje.exe 2828 wyjxqrje.exe 2828 wyjxqrje.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 1176 rtxymzwyrt.exe 1176 rtxymzwyrt.exe 1176 rtxymzwyrt.exe 1692 wyjxqrje.exe 1692 wyjxqrje.exe 1692 wyjxqrje.exe 2260 ufkufpwgfbhipev.exe 2260 ufkufpwgfbhipev.exe 2592 ujdgekxbwcqcy.exe 2260 ufkufpwgfbhipev.exe 2592 ujdgekxbwcqcy.exe 2592 ujdgekxbwcqcy.exe 2828 wyjxqrje.exe 2828 wyjxqrje.exe 2828 wyjxqrje.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2476 WINWORD.EXE 2476 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1176 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 28 PID 1764 wrote to memory of 1176 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 28 PID 1764 wrote to memory of 1176 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 28 PID 1764 wrote to memory of 1176 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 28 PID 1764 wrote to memory of 2260 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 35 PID 1764 wrote to memory of 2260 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 35 PID 1764 wrote to memory of 2260 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 35 PID 1764 wrote to memory of 2260 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 35 PID 1764 wrote to memory of 1692 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 33 PID 1764 wrote to memory of 1692 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 33 PID 1764 wrote to memory of 1692 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 33 PID 1764 wrote to memory of 1692 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 33 PID 1764 wrote to memory of 2592 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 29 PID 1764 wrote to memory of 2592 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 29 PID 1764 wrote to memory of 2592 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 29 PID 1764 wrote to memory of 2592 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 29 PID 1176 wrote to memory of 2828 1176 rtxymzwyrt.exe 30 PID 1176 wrote to memory of 2828 1176 rtxymzwyrt.exe 30 PID 1176 wrote to memory of 2828 1176 rtxymzwyrt.exe 30 PID 1176 wrote to memory of 2828 1176 rtxymzwyrt.exe 30 PID 1764 wrote to memory of 2476 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 31 PID 1764 wrote to memory of 2476 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 31 PID 1764 wrote to memory of 2476 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 31 PID 1764 wrote to memory of 2476 1764 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 31 PID 2476 wrote to memory of 1240 2476 WINWORD.EXE 36 PID 2476 wrote to memory of 1240 2476 WINWORD.EXE 36 PID 2476 wrote to memory of 1240 2476 WINWORD.EXE 36 PID 2476 wrote to memory of 1240 2476 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a3fb4e1f4f9b3ca096d79c97a8919e1.exe"C:\Users\Admin\AppData\Local\Temp\4a3fb4e1f4f9b3ca096d79c97a8919e1.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\rtxymzwyrt.exertxymzwyrt.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\wyjxqrje.exeC:\Windows\system32\wyjxqrje.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2828
-
-
-
C:\Windows\SysWOW64\ujdgekxbwcqcy.exeujdgekxbwcqcy.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2592
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1240
-
-
-
C:\Windows\SysWOW64\wyjxqrje.exewyjxqrje.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1692
-
-
C:\Windows\SysWOW64\ufkufpwgfbhipev.exeufkufpwgfbhipev.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD51b471a3426a7af9f8b25f80ce35b4c49
SHA1c5ae12ba579328b9ee3bce94be68a2d23fe636a6
SHA25661c489f47a312df7f67890f03a4a1647d791e0b8b9a9d95ecc8f03c6a7e9c3d1
SHA5129a39fdd565bb211a12d6c3a3583b83d9224e464cc65600b21bd1a48d6524ec0a45fdc3feb61385041364c80272277dbb34fbb74282278dbcafd3580c88fab848
-
Filesize
512KB
MD58810c9f8fc274002ed08ab50688b29cd
SHA15a5798b6d1f508934ca8a8ec3326725b165b591f
SHA256ec360311f90805a369b7101eb8a372a40f63baebf2d3f477a8eb636baf2c0e59
SHA512598c3891cde630d8fd6ef7ee82678095a9dc33e4a91aa164200af71d9f5c3211493504a6a1d5acb16870fab6a8b0b8794cfeec4732affb9a3416edfa986e71e8
-
Filesize
512KB
MD590421a229033d524ae78b60b8bdc625d
SHA1c8b500495d65b7aeb0f248af85d86a7cfd63b043
SHA256eceaa3f9d40b93d099e0db9ece62ee54657027a446099dc598ad98ad3628807c
SHA512bb92b1d767d1e4706cf103621a9754baccd76d0e39d9daa9b690c93bec725f5c06f86ae5310f4a33df4d05935c72de7a45b5185ac426dc01df0b005348a8ea89
-
Filesize
512KB
MD59d3ec906986b988a7bdb8b66c087526b
SHA13441deeb4040dca852b8fea2a9b01a36542b30bc
SHA25625d8874b8c4280f16e9f7ea9982d8359b32ceef0a76b0688be31a84990d4b62a
SHA51272f28b31b9ef4c3442ed1c4c24d27816047807c4c141174c9b57c612692c3be84ec3c9e032561c3d85d2ffe780d7e31d378d93eff2e7adcd4fa9cd0f6b4c170f
-
Filesize
512KB
MD5d52061dd9649a58a1e7b862241ab3d66
SHA141d4830d1e75cf8acaa4d195119a11426bda7204
SHA25650c5bdf5ceae03721a37f6d8726d01621d4d6655f47adc3e8170d1bb7683816a
SHA512ea0a9a78b948298a90b66d2c781594d0c9cc9123c311c4386b8b12c598a01491e2089a778195698a940741e1305664b5fb707662ffed784bbed3e65ef00a6083
-
Filesize
512KB
MD5dd73b65ce408e827ee576de0ba902a97
SHA195f57c19b42068678bbe8128d9a3050a678cc64d
SHA2569ecd1ccaaebee2ebdfbc22e05f3cfde460f2deadbb0299ff7327f2792c872868
SHA512db80f788edba79aa03bcff58213cb6cc7728fc17ea808c09a74b130626898a96be4a3d3cb4926c912c5a70891847d53ca08018ce3477880d0f1ff04ae07968e1
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5ffc88df7a39230958bb149161cc208e5
SHA1b369c4d45fe70e5601ad2b74c316db84297d98ce
SHA256de22947908c3b288d860abb11e64083148f1d980ec4505baade49ce4abb529f0
SHA5122ff078f5b457a690b46bd9e08b6abb96f793e3d0bb4a73e8c27c82b3aca7cef76eb5cd9d46deb1ba4197e84e6c7fb0641ea9b62c607cfaa3ab4a0c6c011ec1f7
-
Filesize
88KB
MD5fe3610a36cd9da0eac4429c71a94cc5a
SHA1d42992454b608e441faed2238ec6dcdb931c8d10
SHA256bfc9ee547eba543225181d9a4544f7eef9aeb965cd34eeabdfd8cdc591d0e46c
SHA512fafc6cb70172cb59a50d6c5c43dedc96038f63a8fdf3da609a62f22a6eb619ea008cc7d1a9b5a7001ca52f579dd977229f9307c2e6c26689d9d062c2d6fd089b
-
Filesize
361KB
MD5a4129fa7836c449d34c9207b2398ac6e
SHA1209c419ddb57cea3266409f2f9bf58bda8c887f3
SHA2568a8ddf7403d518c136b023cc8f65eb786bbf6f974146e29c6441ade2befe16ce
SHA512410848f6b6a4229d27f2fc09ba5a9642bd95da8497e2942793a24670e6355165995063e0f13bc57998e173dc33813bc3806c16155f25bd3b872235006a7649dd