Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
45e5496394e7d6a9efe16008c380cf46.exe
Resource
win7-20231215-en
General
-
Target
45e5496394e7d6a9efe16008c380cf46.exe
-
Size
668KB
-
MD5
45e5496394e7d6a9efe16008c380cf46
-
SHA1
30272aab1924aba61676c35146bca8b7f45826a2
-
SHA256
d18db06ffb1b15c896c0a2ca373df26bf13498de75f4d55998ba7709c7ffd273
-
SHA512
fef413e3cdccc3ee829c22af1b56d665016ddadc4a66ea518f1d2b034ca13a9e92ff2f69c2cd42fc28a39448868917120b29924d798766759c799e63b309fd10
-
SSDEEP
12288:qCCGxTYAe2mjiVg69cvigDvnBvfkQQw+018pwsiX3o/PFrMOj6vve:qClxE0gKgDvtfLQwP1tsP1QE5
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 7 IoCs
pid Process 4584 alg.exe 2172 DiagnosticsHub.StandardCollector.Service.exe 1920 fxssvc.exe 900 elevation_service.exe 2516 maintenanceservice.exe 3540 msdtc.exe 1944 SearchIndexer.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3791175113-1062217823-1177695025-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3791175113-1062217823-1177695025-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\K: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\S: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\G: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\N: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\N: alg.exe File opened (read-only) \??\J: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\S: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\H: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\L: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\I: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\O: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\G: alg.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\T: alg.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\R: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\X: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\J: alg.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\K: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\U: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\M: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\T: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\W: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\Y: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\E: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\Q: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\V: 45e5496394e7d6a9efe16008c380cf46.exe File opened (read-only) \??\Z: 45e5496394e7d6a9efe16008c380cf46.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\dllhost.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\spectrum.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\vds.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\svchost.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe alg.exe File created \??\c:\windows\syswow64\jefdhdnk.tmp 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\windows\system32\kobpjhib.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\wbengine.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\lsass.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\msiexec.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File created C:\Windows\System32\WindowsPowerShell\v1.0\igdhcafd.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\locator.exe 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\windows\system32\cjcqamjc.tmp 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\windows\system32\migpfnlm.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe alg.exe File created \??\c:\windows\system32\perceptionsimulation\edflfajl.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\fxssvc.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\vssvc.exe alg.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe alg.exe File opened for modification \??\c:\windows\system32\spectrum.exe alg.exe File opened for modification \??\c:\windows\system32\Agentservice.exe alg.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\windows\system32\diagsvcs\efilbnkn.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\msdtc.exe alg.exe File opened for modification \??\c:\windows\system32\Agentservice.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\alg.exe 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\windows\system32\loaqmgjn.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File created \??\c:\windows\system32\ggaglplj.tmp 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\windows\system32\agdkbiog.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\snmptrap.exe alg.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\windows\system32\bfjlioao.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\Appvclient.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\locator.exe alg.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\windows\system32\jhqdgdmn.tmp 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\windows\system32\openssh\pnjoldgi.tmp 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\windows\system32\jfjbfalb.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\vssvc.exe 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\windows\system32\iddjfdqe.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File opened for modification \??\c:\windows\system32\msdtc.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe alg.exe File opened for modification \??\c:\windows\system32\wbengine.exe alg.exe File opened for modification \??\c:\windows\system32\snmptrap.exe 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\windows\system32\peghncgj.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\msiexec.exe alg.exe File opened for modification \??\c:\windows\system32\vds.exe alg.exe File created \??\c:\windows\system32\ccoppphb.tmp 45e5496394e7d6a9efe16008c380cf46.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\knfbgokp.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\lsass.exe alg.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe alg.exe File created \??\c:\windows\system32\hgdihecl.tmp 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\windows\system32\baodfdfc.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\searchindexer.exe 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\windows\system32\cffpieka.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\system32\Appvclient.exe alg.exe -
Drops file in Program Files directory 42 IoCs
description ioc Process File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe alg.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\7-Zip\7z.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 45e5496394e7d6a9efe16008c380cf46.exe File created C:\Program Files\7-Zip\nccafaqk.tmp alg.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\cedpmnkl.tmp 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\program files\google\chrome\Application\106.0.5249.119\hebjifem.tmp 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\program files (x86)\mozilla maintenance service\flldeahg.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File created C:\Program Files\7-Zip\jgpijieg.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 45e5496394e7d6a9efe16008c380cf46.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\nccafaqk.tmp 45e5496394e7d6a9efe16008c380cf46.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\gkooamha.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe 45e5496394e7d6a9efe16008c380cf46.exe File created C:\Program Files\7-Zip\lncjookl.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe alg.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\jajkdigj.tmp alg.exe File created \??\c:\program files\common files\microsoft shared\source engine\mkkhdlol.tmp alg.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe 45e5496394e7d6a9efe16008c380cf46.exe File created \??\c:\program files\windows media player\flcapfen.tmp 45e5496394e7d6a9efe16008c380cf46.exe File created C:\Program Files\7-Zip\jgpijieg.tmp alg.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 45e5496394e7d6a9efe16008c380cf46.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\mgecidfd.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 45e5496394e7d6a9efe16008c380cf46.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\hlepeenn.tmp 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 45e5496394e7d6a9efe16008c380cf46.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe 45e5496394e7d6a9efe16008c380cf46.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-10 = "Microsoft Hangul Decomposition Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9932 = "MP4 Video" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81B1B56-7613-4EE4-BC05-1FAB5DE5C07E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000932dee078440da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\mshta.exe,-6412 = "HTML Application" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000005160a3088440da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9907 = "MIDI Sequence" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-8 = "Microsoft Malayalam to Latin Transliteration" SearchIndexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000932dee078440da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000008b454088440da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-4 = "Microsoft Simplified Chinese to Traditional Chinese Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-175 = "Microsoft PowerPoint Slide Show" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-2 = "Microsoft Script Detection" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000004a5071088440da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-1 = "Microsoft Language Detection" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-124 = "Microsoft Word Macro-Enabled Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9905 = "Video Clip" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-24585 = "Cascading Style Sheet Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000005160a3088440da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000f78b4d088440da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000006b9d8078440da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-101 = "Microsoft Excel Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-6 = "Microsoft Cyrillic to Latin Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9934 = "AVCHD Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-170 = "Microsoft PowerPoint 97-2003 Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-184 = "Microsoft PowerPoint Macro-Enabled Design Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-121 = "Microsoft Word 97 - 2003 Template" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000019d3f6088440da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-9 = "Microsoft Bengali to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-177 = "Microsoft PowerPoint Macro-Enabled Slide Show" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-125 = "Microsoft Word Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9937 = "3GPP Audio/Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9909 = "Windows Media Audio/Video file" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe 4584 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1344 45e5496394e7d6a9efe16008c380cf46.exe Token: SeAuditPrivilege 1920 fxssvc.exe Token: SeTakeOwnershipPrivilege 4584 alg.exe Token: 33 1944 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1944 SearchIndexer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2156 1944 SearchIndexer.exe 117 PID 1944 wrote to memory of 2156 1944 SearchIndexer.exe 117 PID 1944 wrote to memory of 3980 1944 SearchIndexer.exe 116 PID 1944 wrote to memory of 3980 1944 SearchIndexer.exe 116 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\45e5496394e7d6a9efe16008c380cf46.exe"C:\Users\Admin\AppData\Local\Temp\45e5496394e7d6a9efe16008c380cf46.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4584
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:2172
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4636
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:900
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2516
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3540
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 804 808 816 8192 812 7882⤵
- Modifies data under HKEY_USERS
PID:3980
-
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
489KB
MD51b517edfe7d187a812d79434b388ae8b
SHA12d3756498c5451c061cc81c1065551d8af1f2043
SHA2562698e1eb026a7f4705317ea3fd6167b0db44497336983d2bf5b39d7f1f0d4470
SHA51295e07f7399f3bf471bb9037ef47d80087487f96fd9525e19a7a656f457dd1441967331c0a00dcd0a520a602a15b67418395913a854199bf26cc000d6c4aa5e56
-
Filesize
609KB
MD59e94b24be477ef87fe4aa2002764b8ff
SHA16b599734df3f545e5c9884de5609a28398b01111
SHA256971ec0d0e3c970eea0bcc09e37a1baae10dcfc4a698bc5004b1170d3e6489828
SHA512c461d8adacae4a26bb5aea5600ec1678d4b7595a4192e236c0d357f4febedf97a58d57ee20f6670f5b232cc7e88979845fece9e7df16f8dcf3491dd95e517965
-
Filesize
406KB
MD5ba331419318a85062043da84e8a45770
SHA120d8eb32ad5a6a755c18ce93ff13509f3f83483e
SHA2565c036045c4c7229f4feb51792175365849941c25cffb68c57f771bbb651511bf
SHA51209d7f3012ab4d19de4c42fb73a260d75e2953faf7c4a4c1f63a35ad9c66bff795147a698d1bb7f76caf526fadfb1ee36f1540736358e83f1a0d4ecec9b8b20b8
-
Filesize
256KB
MD57da0fb3bb0aa22caeb60ed8cb5790e2e
SHA1a2ac5594a871f5806345c2fb2ca6565fce529472
SHA2562bc80134d990d328f91cbb5dd858ab0a7d7490b1a90b4a822a15f062a4e067d5
SHA512588cf4348d2fcef6888b4200af277da64ca31ecc9f349883b8e244abedbe690248e1f03c2dd09acf324879182677876b8e4aa20c9b2c26e0969734a5d16321f2
-
Filesize
1.4MB
MD50e8a75e6312fd033d2f02701307694d9
SHA106f131ac0265ff8c4af853266d55033947e7f971
SHA2569a91a24eb9d51dafbeaadee99729afb58078beac871a49175e4d55c4fe16d134
SHA51243c8fc2deb9fa4df4d2b6471b378448694737a821d9149f672991ef516654936c1a0497cd86f03a7aeead41a23c21214219c21bbf06ef2f309425a7c0504be6d
-
Filesize
734KB
MD5ccfe3327d1c35b9f3858e17f37e7308a
SHA1bd6239bd374f35acaf9666953b9a5b50b8a6f8ee
SHA2567ea5796d22f791eae018f3413273a4b312b140e6e9267bf2514dae01ca55bf1d
SHA512607ecd3e342df07fa74ce88f94cfb3bbdb8f8725260dea9d250b7320f746e11fb5137540f19f57362fdc2e0c3f20f9e225e3a0b8d736c59d3740707859381333
-
Filesize
244KB
MD54220533cb4b3a05cfde127dcc94d9d1d
SHA1f041213d49d82bf2adcdf4b450db5223e446ee58
SHA25673340532952688134c07c22f17618defc3511cd5fc30152bad049c5697ca3ee7
SHA5124f80344a2cf50fd57f123531d1cc05bb9226e262612dfb54760c61f9550b26d41af775b0d113e006e0a524dde8c1a49b0dc0cab9113b71efc338c08cc15290cb
-
Filesize
1.6MB
MD54da5c63d103dfb398d3427749dac7230
SHA19c12f7456c17bca160a90270f1e42fd195a45223
SHA256edd85716eb1c1a994d6a72499c4993c4d8793517c80ef802bb99b9005b9966d0
SHA512b37a8f18f2dd764497417d7f29b1e0d02595909eefd3e587c5857469b7ff78b0a38e3d4c2d6616e4f2ccb9afac3419b4d019eddd438fcbbcb703211ca4706a06
-
Filesize
1.6MB
MD57e26750d8c7a2c123da48775211cf8d2
SHA1763d9a0e44c36812fedf38473a289cc2955d8f1e
SHA256c14d456b3b5e8204ef5831ba78c2133e129a317f2e848f1bdc403ad147d0c9c6
SHA512c58ed63242ba638afa31299fc0d63a84ad6bf978a73c06f5763b1431dd5da9ec226ea6cad5a341d3d22f475263988d38592c389350f9d6f4095366cc36a08d28
-
Filesize
678KB
MD5d464e1169924cbe0c77959d1e8254cb6
SHA13b32bf883227a6d9d26f0e3d2e17556b5fe5cdba
SHA256b7ebec7e9f9c7209c59bb8b1698b8b3e59e8ea7a511b378db03670d4c72575eb
SHA5127037cd989ce8777cdb5a32fd25038099e3e9702c3eea75a5501681e657176da20908923f0b3a514f61b3e13fba92a342217bd61edccb6a55b272cdd5f1c5f4dd
-
Filesize
483KB
MD51f660d4a3f562d35bc4f83d128b5a600
SHA1e1cfcfbae2055576d2be058e5f61ffaee33b2bd0
SHA2563295025dd63d68db15c8efd97568059fc77f2303a41751524d51360cca4a0f0b
SHA5126ef8efe7f19f1f36acfe552bd2cbd8f8c1014d9f9a8f9ffdae3df1760d4dbc9cffd14d87be8fc790aab5648f7ecbf1df9f5aa48c4da40dc49e30c8b4cc799703
-
Filesize
1.0MB
MD5b88d59c48d91cc4a491b92faed92117f
SHA138670ceecb39c56b21baba61906631970aa73d2f
SHA256ca63b398bc14cd1e8c72f032655b8b17041d14dc08be1902d7d6cde11cc1dce5
SHA512a24a0d0d3fa3259727671b05a179570eb73bfaaa87f8982dfc7ded5bbc472a5942d9ec9c7dcb757cde4e13fb1c763849c407bb1df9a182cb1b27ca1393143453
-
Filesize
1.1MB
MD5c5a96a6bf655646f191f632c14a4a86b
SHA142d297ebb85fd05d3c149b68529138fdf2cc510b
SHA25654b733cfbb4d2b9c2da1a688d894e30984973f218cd91bc1e7d5faae5aa2cd9f
SHA512809e1f837fd1a084a037aae8b5706972e6054eda60528079b63fc05302a9e6e321fc9b38f30e038f2ed88ff987acc8db16c9692de8a416028bfde59fdd7f9344
-
Filesize
86KB
MD5341adc7a9b77ef8c221127577b813ffe
SHA113a05c1073ebe7beaf4aff109c48ad5a55be7b59
SHA2560175f4aa9d6f4c898b8a1663670829593cd83c9e134e631eebd98237b05eb7f0
SHA51221c5bc9283153a59ee12482d0536d6a86516b2d2106e4c400699963acbfc1bc0ea95ac0fc6763a4e6163f859d4061970fb3f0053375b4a7155edd97fdd286d3d
-
Filesize
536KB
MD59adf2627204a1e681d8c498c1e785000
SHA187dabb8e7877bbde3e5829626b3c8e2a0ed3bb47
SHA256a553a55f142f85f9856f227825708c9728f910712a1a2b0a2e546c4b6b6b8432
SHA512a11f3dfab839392a4bbe50762d6ae084809794edf94a88ddcefc3a264aeb1e2a9c5dc69056e7b5f45c3eb02fa3b63cdbbb9386f759067122921ba19f86a3a28a
-
Filesize
4.4MB
MD59a3b5a038f48fb20486dfe423b491b2b
SHA1a823e44d42794ef529e007f3cb7db182ffdbcec7
SHA256fd98d6ebe8e6a7236961879ee9eee8c37d74a08ec4a41da320c36f15cd57b013
SHA512b41e4691925d2750a6831eaa05978e76104f24e81fa5c51f70ab9bb413433d675cc41cdd06998ad5601a72f3b2d78e2a70edaec343befad47c99eeb0471acfbc
-
Filesize
633KB
MD5de69480909c7a1078a68414efa672237
SHA1065eb9c9d81f04b5e45b369646ff7270ca0030e4
SHA256c8bf53bc0c0e6cc7033648cb907c1576f94876cbe59fe090f5b9ac17e141759a
SHA5126783d5552b291aa3119987aac91a032d4bbd1cf3600d03b5d2ab2c3d2ee9a3e730a7afb2fb13b5283cb9b225ebf242d43714312bd3cc77438e2097fb33ec496d
-
Filesize
1024KB
MD50b85d28c502ced13a045cb79248cb3ab
SHA1397459b7dfc524c802e057f3db34ccbaf7ddc1c3
SHA256ebc5ee87cd8745ebde64efbb5a3581fd5222af9c31c6b0b752eb9f6f28469779
SHA512a0149f0e70db029ce3a4209118c4cea94bad80e84d2b9aa06060158b2746633bbdcd012ca07f613493ec802e7757e2da6a7d59a86737c91c1aa42be6b24df216