Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
3046f693f07ef5720f685bf2b586fcb2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3046f693f07ef5720f685bf2b586fcb2.exe
Resource
win10v2004-20231215-en
General
-
Target
3046f693f07ef5720f685bf2b586fcb2.exe
-
Size
512KB
-
MD5
3046f693f07ef5720f685bf2b586fcb2
-
SHA1
dc28149b45cbdc89ecc8daa2af16668a3bf037a1
-
SHA256
77ff0c8a05d5ceab36fd6e15403c82b5749f67cee085fa99a41d10e6886e770f
-
SHA512
a8ebf07b59cb28277b4eeb14102b7289128fb3fa3849698c6fb65c9a9fa110770376248d96ba3f524b039cdf406429ea3ecbe0c66c334ab6c74d806e87241440
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6W:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5d
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" zrivutddov.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zrivutddov.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" zrivutddov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" zrivutddov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" zrivutddov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" zrivutddov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" zrivutddov.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" zrivutddov.exe -
Executes dropped EXE 5 IoCs
pid Process 2800 zrivutddov.exe 2736 vhoslazrxwybckj.exe 2348 oysrrpki.exe 1920 crvvpqutdfvvr.exe 2584 oysrrpki.exe -
Loads dropped DLL 5 IoCs
pid Process 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2800 zrivutddov.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" zrivutddov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" zrivutddov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" zrivutddov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" zrivutddov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" zrivutddov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" zrivutddov.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\tzdcmwps = "zrivutddov.exe" vhoslazrxwybckj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\gxylxrrv = "vhoslazrxwybckj.exe" vhoslazrxwybckj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "crvvpqutdfvvr.exe" vhoslazrxwybckj.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\w: oysrrpki.exe File opened (read-only) \??\e: zrivutddov.exe File opened (read-only) \??\o: zrivutddov.exe File opened (read-only) \??\z: oysrrpki.exe File opened (read-only) \??\h: zrivutddov.exe File opened (read-only) \??\y: zrivutddov.exe File opened (read-only) \??\j: oysrrpki.exe File opened (read-only) \??\r: oysrrpki.exe File opened (read-only) \??\t: oysrrpki.exe File opened (read-only) \??\a: zrivutddov.exe File opened (read-only) \??\s: zrivutddov.exe File opened (read-only) \??\g: oysrrpki.exe File opened (read-only) \??\u: oysrrpki.exe File opened (read-only) \??\m: zrivutddov.exe File opened (read-only) \??\x: zrivutddov.exe File opened (read-only) \??\l: oysrrpki.exe File opened (read-only) \??\j: oysrrpki.exe File opened (read-only) \??\u: zrivutddov.exe File opened (read-only) \??\e: oysrrpki.exe File opened (read-only) \??\o: oysrrpki.exe File opened (read-only) \??\v: oysrrpki.exe File opened (read-only) \??\i: oysrrpki.exe File opened (read-only) \??\t: zrivutddov.exe File opened (read-only) \??\z: zrivutddov.exe File opened (read-only) \??\h: oysrrpki.exe File opened (read-only) \??\p: oysrrpki.exe File opened (read-only) \??\r: oysrrpki.exe File opened (read-only) \??\i: zrivutddov.exe File opened (read-only) \??\q: oysrrpki.exe File opened (read-only) \??\s: oysrrpki.exe File opened (read-only) \??\o: oysrrpki.exe File opened (read-only) \??\t: oysrrpki.exe File opened (read-only) \??\b: zrivutddov.exe File opened (read-only) \??\g: zrivutddov.exe File opened (read-only) \??\n: oysrrpki.exe File opened (read-only) \??\s: oysrrpki.exe File opened (read-only) \??\p: zrivutddov.exe File opened (read-only) \??\n: oysrrpki.exe File opened (read-only) \??\g: oysrrpki.exe File opened (read-only) \??\x: oysrrpki.exe File opened (read-only) \??\i: oysrrpki.exe File opened (read-only) \??\q: oysrrpki.exe File opened (read-only) \??\x: oysrrpki.exe File opened (read-only) \??\j: zrivutddov.exe File opened (read-only) \??\q: zrivutddov.exe File opened (read-only) \??\l: oysrrpki.exe File opened (read-only) \??\m: oysrrpki.exe File opened (read-only) \??\u: oysrrpki.exe File opened (read-only) \??\h: oysrrpki.exe File opened (read-only) \??\y: oysrrpki.exe File opened (read-only) \??\r: zrivutddov.exe File opened (read-only) \??\b: oysrrpki.exe File opened (read-only) \??\k: oysrrpki.exe File opened (read-only) \??\y: oysrrpki.exe File opened (read-only) \??\b: oysrrpki.exe File opened (read-only) \??\m: oysrrpki.exe File opened (read-only) \??\v: oysrrpki.exe File opened (read-only) \??\v: zrivutddov.exe File opened (read-only) \??\w: zrivutddov.exe File opened (read-only) \??\w: oysrrpki.exe File opened (read-only) \??\z: oysrrpki.exe File opened (read-only) \??\e: oysrrpki.exe File opened (read-only) \??\k: oysrrpki.exe File opened (read-only) \??\k: zrivutddov.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" zrivutddov.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" zrivutddov.exe -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2908-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x000d0000000122cb-5.dat autoit_exe behavioral1/files/0x000b000000012252-17.dat autoit_exe behavioral1/files/0x000d0000000122cb-28.dat autoit_exe behavioral1/files/0x00070000000146c1-34.dat autoit_exe behavioral1/files/0x00070000000146c1-41.dat autoit_exe behavioral1/files/0x000d0000000122cb-38.dat autoit_exe behavioral1/files/0x0035000000014475-33.dat autoit_exe behavioral1/files/0x0035000000014475-30.dat autoit_exe behavioral1/files/0x0035000000014475-43.dat autoit_exe behavioral1/files/0x0035000000014475-42.dat autoit_exe behavioral1/files/0x0035000000014475-26.dat autoit_exe behavioral1/files/0x0006000000015e86-78.dat autoit_exe behavioral1/files/0x0006000000015df4-72.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll zrivutddov.exe File created C:\Windows\SysWOW64\vhoslazrxwybckj.exe 3046f693f07ef5720f685bf2b586fcb2.exe File opened for modification C:\Windows\SysWOW64\vhoslazrxwybckj.exe 3046f693f07ef5720f685bf2b586fcb2.exe File opened for modification C:\Windows\SysWOW64\oysrrpki.exe 3046f693f07ef5720f685bf2b586fcb2.exe File created C:\Windows\SysWOW64\crvvpqutdfvvr.exe 3046f693f07ef5720f685bf2b586fcb2.exe File opened for modification C:\Windows\SysWOW64\crvvpqutdfvvr.exe 3046f693f07ef5720f685bf2b586fcb2.exe File created C:\Windows\SysWOW64\zrivutddov.exe 3046f693f07ef5720f685bf2b586fcb2.exe File opened for modification C:\Windows\SysWOW64\zrivutddov.exe 3046f693f07ef5720f685bf2b586fcb2.exe File created C:\Windows\SysWOW64\oysrrpki.exe 3046f693f07ef5720f685bf2b586fcb2.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe oysrrpki.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal oysrrpki.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe oysrrpki.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe oysrrpki.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal oysrrpki.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe oysrrpki.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal oysrrpki.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe oysrrpki.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe oysrrpki.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe oysrrpki.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe oysrrpki.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal oysrrpki.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe oysrrpki.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe oysrrpki.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 3046f693f07ef5720f685bf2b586fcb2.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" zrivutddov.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" zrivutddov.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs zrivutddov.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc zrivutddov.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg zrivutddov.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 3046f693f07ef5720f685bf2b586fcb2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "183EC7791490DAB7B9CC7FE6ECE737CF" 3046f693f07ef5720f685bf2b586fcb2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCAFABCF962F2E3837C3B4081EA3E93B3FE03884261033BE1CD42EB08A0" 3046f693f07ef5720f685bf2b586fcb2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8BFCFC4F2682689047D65F7E90BC90E136594166416241D6ED" 3046f693f07ef5720f685bf2b586fcb2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" zrivutddov.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC4B0584494389952CCB9D2329ED7CF" 3046f693f07ef5720f685bf2b586fcb2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat zrivutddov.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1364 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2800 zrivutddov.exe 2800 zrivutddov.exe 2800 zrivutddov.exe 2800 zrivutddov.exe 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2800 zrivutddov.exe 2348 oysrrpki.exe 2348 oysrrpki.exe 2348 oysrrpki.exe 2348 oysrrpki.exe 2736 vhoslazrxwybckj.exe 2736 vhoslazrxwybckj.exe 2736 vhoslazrxwybckj.exe 2736 vhoslazrxwybckj.exe 2736 vhoslazrxwybckj.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 2584 oysrrpki.exe 2584 oysrrpki.exe 2584 oysrrpki.exe 2584 oysrrpki.exe 2736 vhoslazrxwybckj.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 2736 vhoslazrxwybckj.exe 2736 vhoslazrxwybckj.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 2736 vhoslazrxwybckj.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 2736 vhoslazrxwybckj.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 2736 vhoslazrxwybckj.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 2736 vhoslazrxwybckj.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 2736 vhoslazrxwybckj.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 2736 vhoslazrxwybckj.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 2736 vhoslazrxwybckj.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 2736 vhoslazrxwybckj.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2800 zrivutddov.exe 2800 zrivutddov.exe 2800 zrivutddov.exe 2348 oysrrpki.exe 2348 oysrrpki.exe 2348 oysrrpki.exe 2736 vhoslazrxwybckj.exe 2736 vhoslazrxwybckj.exe 2736 vhoslazrxwybckj.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 2584 oysrrpki.exe 2584 oysrrpki.exe 2584 oysrrpki.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2908 3046f693f07ef5720f685bf2b586fcb2.exe 2800 zrivutddov.exe 2800 zrivutddov.exe 2800 zrivutddov.exe 2348 oysrrpki.exe 2348 oysrrpki.exe 2348 oysrrpki.exe 2736 vhoslazrxwybckj.exe 2736 vhoslazrxwybckj.exe 2736 vhoslazrxwybckj.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 1920 crvvpqutdfvvr.exe 2584 oysrrpki.exe 2584 oysrrpki.exe 2584 oysrrpki.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1364 WINWORD.EXE 1364 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2800 2908 3046f693f07ef5720f685bf2b586fcb2.exe 28 PID 2908 wrote to memory of 2800 2908 3046f693f07ef5720f685bf2b586fcb2.exe 28 PID 2908 wrote to memory of 2800 2908 3046f693f07ef5720f685bf2b586fcb2.exe 28 PID 2908 wrote to memory of 2800 2908 3046f693f07ef5720f685bf2b586fcb2.exe 28 PID 2908 wrote to memory of 2736 2908 3046f693f07ef5720f685bf2b586fcb2.exe 29 PID 2908 wrote to memory of 2736 2908 3046f693f07ef5720f685bf2b586fcb2.exe 29 PID 2908 wrote to memory of 2736 2908 3046f693f07ef5720f685bf2b586fcb2.exe 29 PID 2908 wrote to memory of 2736 2908 3046f693f07ef5720f685bf2b586fcb2.exe 29 PID 2908 wrote to memory of 2348 2908 3046f693f07ef5720f685bf2b586fcb2.exe 32 PID 2908 wrote to memory of 2348 2908 3046f693f07ef5720f685bf2b586fcb2.exe 32 PID 2908 wrote to memory of 2348 2908 3046f693f07ef5720f685bf2b586fcb2.exe 32 PID 2908 wrote to memory of 2348 2908 3046f693f07ef5720f685bf2b586fcb2.exe 32 PID 2908 wrote to memory of 1920 2908 3046f693f07ef5720f685bf2b586fcb2.exe 30 PID 2908 wrote to memory of 1920 2908 3046f693f07ef5720f685bf2b586fcb2.exe 30 PID 2908 wrote to memory of 1920 2908 3046f693f07ef5720f685bf2b586fcb2.exe 30 PID 2908 wrote to memory of 1920 2908 3046f693f07ef5720f685bf2b586fcb2.exe 30 PID 2800 wrote to memory of 2584 2800 zrivutddov.exe 31 PID 2800 wrote to memory of 2584 2800 zrivutddov.exe 31 PID 2800 wrote to memory of 2584 2800 zrivutddov.exe 31 PID 2800 wrote to memory of 2584 2800 zrivutddov.exe 31 PID 2908 wrote to memory of 1364 2908 3046f693f07ef5720f685bf2b586fcb2.exe 33 PID 2908 wrote to memory of 1364 2908 3046f693f07ef5720f685bf2b586fcb2.exe 33 PID 2908 wrote to memory of 1364 2908 3046f693f07ef5720f685bf2b586fcb2.exe 33 PID 2908 wrote to memory of 1364 2908 3046f693f07ef5720f685bf2b586fcb2.exe 33 PID 1364 wrote to memory of 1616 1364 WINWORD.EXE 38 PID 1364 wrote to memory of 1616 1364 WINWORD.EXE 38 PID 1364 wrote to memory of 1616 1364 WINWORD.EXE 38 PID 1364 wrote to memory of 1616 1364 WINWORD.EXE 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\3046f693f07ef5720f685bf2b586fcb2.exe"C:\Users\Admin\AppData\Local\Temp\3046f693f07ef5720f685bf2b586fcb2.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\zrivutddov.exezrivutddov.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\oysrrpki.exeC:\Windows\system32\oysrrpki.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2584
-
-
-
C:\Windows\SysWOW64\vhoslazrxwybckj.exevhoslazrxwybckj.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2736
-
-
C:\Windows\SysWOW64\crvvpqutdfvvr.execrvvpqutdfvvr.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1920
-
-
C:\Windows\SysWOW64\oysrrpki.exeoysrrpki.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2348
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1616
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD50feed29195d959e353de1e9910679f58
SHA1850c242672dfeec2a0cfd67ac871c136785565b2
SHA2565923204b5ca7bbea64fac7756435e448a267134aacfec9b18269794b8ee21e5a
SHA512562404484b1a22849e7dbd65827f2a02b13d197639622b8219362cf2d0e6b1f5faf54d8f97595dd2e3ef8e26ad1c9b19405c4df76e0d1dccb9baa814264b3867
-
Filesize
512KB
MD5ddb5cd19014d1889557da16d4393984c
SHA19954d2370a7158c80500b628a571d19bab99b709
SHA2561974368d07bc5df05ad864c3244bf40c0106653abd49b9c5229e9634021b65a2
SHA51282be354f7726f48dca3cd31cc424425ec6b36940539a5cdf64f16a06eb32df29c0d2e63c9f9a58aab5c8207fe4cf3ce0e0f2ef49b9c1f6866059c77e92996a9a
-
Filesize
20KB
MD559907a0fc8e98ff31667f793ba3e1ecc
SHA1f27ec55327e956565524667c8d7faebb8851301a
SHA25608489d30a8d184059af8a9d637b1d2f56075c42ae499607f1a5fc82fdd6ca11b
SHA5129e5fa6c03c0fb7539e7449f9345c90da4a158b8e253e4101248cef095539de95d0c22636c13f0f1d6c41e4f3094e120ee732ca5b19496240dfee8c5170a1c35c
-
Filesize
182KB
MD59026a9bf38a94e21c64aa313cf21e39e
SHA11bb2b9bb522227c8f5fb202d92ccfd7ecd3a6a9a
SHA2562e83010b1c58aea9c340d79532db45adaeb2240b86cacee4246451f81c8a2092
SHA512b09634da3cacde9437547980a298151aa2d7761c651fdd05d148ac5d5dc11761f146c9f880ca04f531912bc7596ef2be67c1f03427bc2d8288b1eca636853248
-
Filesize
512KB
MD5e7d9dc96af00efe0454050d202d31c4c
SHA15cf9fdab02068402d4f3faf0a8219d6fa7cde3c9
SHA256b5fbc29bd64b86caff8af917d1ff6742b7e65aa40f025784d54bdffa7745297e
SHA51212e1ed42c0c9dcf78c319054eb612a2cdaf7354c97c3157338ed279891472a711750773ed1dd1466154d8dd353be4b045dae364f3147ce557a3022733146b9fd
-
Filesize
467KB
MD589868ae7a735bf60c60bda204b29acfe
SHA14d7a2a0a936885e1f8913a09db79372091c88f63
SHA2569cf38c79bdbc703551860b03ee33674abe14ba01b95d719084faf8944ca2e3b0
SHA512adc2c8ceed1f588d3a306b4ea6dee90fff26bcca8d9668ce33ba073a891e92abbf3eb910a2df1693d42a563e93d332979fcb18ad0f06a1a9d6649598d1538e87
-
Filesize
413KB
MD53c732c82d843bbfc9e6cda2b8460991a
SHA114a8632748f9d7b64627f15f9d9a5220653b8331
SHA256869ffc1a9d336c878abdbf4bdffdad0f32b38ff881456117c9f0493fb1008087
SHA512849814ae4bec21c2ba5460226adbd7d2cfce2648ed5dad6d969de9b984c36b999ade88dbe0fea45fab6b9fac7a3a65988099e41f5361bd999bebed387417c925
-
Filesize
434KB
MD58bfea752eed03082538e86d06917b5a2
SHA1f14d3c310b7f46e7dc88ee03cbc2a5e82ecfcdbd
SHA25644ef964ed0ba4fb8cb1a947355fcea85308c0c0cdc12f42e25afd147adc8745d
SHA5124c71c455aaa8bcf23382c2d3d564e2ac67f3b06577e5611c2d7713f6bf7abdaaa0cff40b561e479f791a94041e71f77133dd220461723f77f370ea66b0b9cfbe
-
Filesize
320KB
MD5583b05aaabd49291e331fdb77618322f
SHA1d2826f4567e4417b1350f6b502621efc97bbd24b
SHA25654aac0f617a649f4ade86e7271149d67ffc92438189e0fc0d9d280899ad45ac1
SHA51261a325904a0d766365a9fec4889699b1783d6890c74ceefa54a803298a434c5583b90bb03eed8e73a6e8b8e811ff70024c3e893fa6bad5f4e3b7d2202b1a490d
-
Filesize
512KB
MD56bf356c24afd66120493e8063f07dd22
SHA19b7fd7c1df9fc151f00025146bf379a5672e3d47
SHA256bf07cf8aca64495723ab04aecaf227f02c722683e58126774e10373490bcb1d3
SHA512893040842d5048fbe6e780df09507ec14749a61729c7dd3b97e99535e3e0c1fd36c446758073a6d15f3badc73f98143358d7c73e074b639dc0267b5f504efc9b
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD56d7fa705ba5eb5fb8386802875c3cd98
SHA1ad028b4335e8404f4eebbc4102fab1c68fc18f3a
SHA256cb61c46d35e17b4c96b84e69b0b1ece1a55dc706997a2efb526401275b3812e1
SHA512b7a8e172e86f63008566fa90867030dd8d32e450e290c91aef606c2f46b7743122896db281a3faf771d69749289a962371b9960e9c8fa6618329e0a34faff0d9
-
Filesize
506KB
MD536aea56d170f7dcb608ec46c0f226bc8
SHA131d75e827a732403fc398387e04d6940231e39e0
SHA256350636734a31704b5f2fc8875a9ddda22895dbdb75a15a088427e6b3683af1d6
SHA512d5af34e03191307ad38b2ddc3fd6e4c99527c90b0c42fc425c9aba0d1890df05b64b2764282d8eb7d6cccdc939ffb635c5d6a8e4bae218f8770598d543832c1b
-
Filesize
361KB
MD55a6a1f280ce04ed7f6f7b6eeb9c768f5
SHA1bf33d06422bb5cf25df871c3ebd8f9047a67a236
SHA2568c4eb2ec5a9264f2a037a6f738bd7886452a8173bb7ac8aa6f1071f87ca5eef1
SHA51213618ef5360acc423006d352097b870409724f44953ed3574946072dd176db87281d9100b29fb78d4905cc3de61ad4a7daf288c23f2ae918fc57d3f0f0fd59d8
-
Filesize
512KB
MD5fef2feeac60198b9396287da0e62e79b
SHA19a42dee00a2420e68700f48a1ebf25d1d3fefacf
SHA256184d45500ebbb91bd475bde87d86b9531b330398af0e43f23ac091dc97ec48c0
SHA51285c7d71d809f488359c62a1a8a88d0d42e689e7388f0962291e2e4c2953fe692b95cfa9802be3bb2ba229175c2fe1cc634c337949f1be8bfa31b0fb36e4ced61