Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
b983f867985ffbc2773e766c2f464bae.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b983f867985ffbc2773e766c2f464bae.exe
Resource
win10v2004-20240226-en
General
-
Target
b983f867985ffbc2773e766c2f464bae.exe
-
Size
512KB
-
MD5
b983f867985ffbc2773e766c2f464bae
-
SHA1
b70dab35eef86089c56d7800c3770a2894580c58
-
SHA256
3bfc2ec771eeb7a2485768a5057093cddfd58e200381bbd5688bb84b3ed7a251
-
SHA512
2956a409d98905f22020708b5d83256226dc7d6198e03d9a873fd00172a8ce1997b30a0f41c4e97551215bb9fc8988f734258d7ce83094aeefcb0c79e333e0c6
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj62:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5h
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" arpfeasnzd.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" arpfeasnzd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" arpfeasnzd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" arpfeasnzd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" arpfeasnzd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" arpfeasnzd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" arpfeasnzd.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" arpfeasnzd.exe -
Executes dropped EXE 5 IoCs
pid Process 2272 arpfeasnzd.exe 2640 qwkacsagmsgxekd.exe 2572 wqeuijsg.exe 2788 yijfbtllbrujf.exe 2412 wqeuijsg.exe -
Loads dropped DLL 5 IoCs
pid Process 1960 b983f867985ffbc2773e766c2f464bae.exe 1960 b983f867985ffbc2773e766c2f464bae.exe 1960 b983f867985ffbc2773e766c2f464bae.exe 1960 b983f867985ffbc2773e766c2f464bae.exe 2272 arpfeasnzd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" arpfeasnzd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" arpfeasnzd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" arpfeasnzd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" arpfeasnzd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" arpfeasnzd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" arpfeasnzd.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\bknmmtcq = "arpfeasnzd.exe" qwkacsagmsgxekd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qxnulqyk = "qwkacsagmsgxekd.exe" qwkacsagmsgxekd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "yijfbtllbrujf.exe" qwkacsagmsgxekd.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\i: wqeuijsg.exe File opened (read-only) \??\m: arpfeasnzd.exe File opened (read-only) \??\q: arpfeasnzd.exe File opened (read-only) \??\y: arpfeasnzd.exe File opened (read-only) \??\a: wqeuijsg.exe File opened (read-only) \??\a: wqeuijsg.exe File opened (read-only) \??\g: wqeuijsg.exe File opened (read-only) \??\t: wqeuijsg.exe File opened (read-only) \??\v: wqeuijsg.exe File opened (read-only) \??\x: arpfeasnzd.exe File opened (read-only) \??\s: wqeuijsg.exe File opened (read-only) \??\o: wqeuijsg.exe File opened (read-only) \??\u: wqeuijsg.exe File opened (read-only) \??\b: wqeuijsg.exe File opened (read-only) \??\o: wqeuijsg.exe File opened (read-only) \??\j: arpfeasnzd.exe File opened (read-only) \??\l: wqeuijsg.exe File opened (read-only) \??\z: wqeuijsg.exe File opened (read-only) \??\i: arpfeasnzd.exe File opened (read-only) \??\o: arpfeasnzd.exe File opened (read-only) \??\r: arpfeasnzd.exe File opened (read-only) \??\b: wqeuijsg.exe File opened (read-only) \??\j: wqeuijsg.exe File opened (read-only) \??\p: wqeuijsg.exe File opened (read-only) \??\w: arpfeasnzd.exe File opened (read-only) \??\q: wqeuijsg.exe File opened (read-only) \??\n: wqeuijsg.exe File opened (read-only) \??\p: wqeuijsg.exe File opened (read-only) \??\r: wqeuijsg.exe File opened (read-only) \??\u: wqeuijsg.exe File opened (read-only) \??\s: arpfeasnzd.exe File opened (read-only) \??\t: arpfeasnzd.exe File opened (read-only) \??\e: wqeuijsg.exe File opened (read-only) \??\h: wqeuijsg.exe File opened (read-only) \??\m: wqeuijsg.exe File opened (read-only) \??\z: arpfeasnzd.exe File opened (read-only) \??\i: wqeuijsg.exe File opened (read-only) \??\n: wqeuijsg.exe File opened (read-only) \??\r: wqeuijsg.exe File opened (read-only) \??\e: arpfeasnzd.exe File opened (read-only) \??\k: wqeuijsg.exe File opened (read-only) \??\j: wqeuijsg.exe File opened (read-only) \??\k: wqeuijsg.exe File opened (read-only) \??\m: wqeuijsg.exe File opened (read-only) \??\q: wqeuijsg.exe File opened (read-only) \??\y: wqeuijsg.exe File opened (read-only) \??\l: arpfeasnzd.exe File opened (read-only) \??\v: arpfeasnzd.exe File opened (read-only) \??\w: wqeuijsg.exe File opened (read-only) \??\b: arpfeasnzd.exe File opened (read-only) \??\h: arpfeasnzd.exe File opened (read-only) \??\n: arpfeasnzd.exe File opened (read-only) \??\s: wqeuijsg.exe File opened (read-only) \??\x: wqeuijsg.exe File opened (read-only) \??\y: wqeuijsg.exe File opened (read-only) \??\a: arpfeasnzd.exe File opened (read-only) \??\h: wqeuijsg.exe File opened (read-only) \??\l: wqeuijsg.exe File opened (read-only) \??\p: arpfeasnzd.exe File opened (read-only) \??\u: arpfeasnzd.exe File opened (read-only) \??\g: wqeuijsg.exe File opened (read-only) \??\t: wqeuijsg.exe File opened (read-only) \??\v: wqeuijsg.exe File opened (read-only) \??\w: wqeuijsg.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" arpfeasnzd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" arpfeasnzd.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1960-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x000900000001225e-5.dat autoit_exe behavioral1/files/0x000a000000012243-17.dat autoit_exe behavioral1/files/0x000a000000012243-27.dat autoit_exe behavioral1/files/0x000900000001225e-25.dat autoit_exe behavioral1/files/0x0027000000015c13-31.dat autoit_exe behavioral1/files/0x0008000000015c5b-37.dat autoit_exe behavioral1/files/0x0027000000015c13-41.dat autoit_exe behavioral1/files/0x0006000000018d07-78.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll arpfeasnzd.exe File created C:\Windows\SysWOW64\arpfeasnzd.exe b983f867985ffbc2773e766c2f464bae.exe File opened for modification C:\Windows\SysWOW64\arpfeasnzd.exe b983f867985ffbc2773e766c2f464bae.exe File opened for modification C:\Windows\SysWOW64\qwkacsagmsgxekd.exe b983f867985ffbc2773e766c2f464bae.exe File created C:\Windows\SysWOW64\wqeuijsg.exe b983f867985ffbc2773e766c2f464bae.exe File opened for modification C:\Windows\SysWOW64\wqeuijsg.exe b983f867985ffbc2773e766c2f464bae.exe File created C:\Windows\SysWOW64\yijfbtllbrujf.exe b983f867985ffbc2773e766c2f464bae.exe File created C:\Windows\SysWOW64\qwkacsagmsgxekd.exe b983f867985ffbc2773e766c2f464bae.exe File opened for modification C:\Windows\SysWOW64\yijfbtllbrujf.exe b983f867985ffbc2773e766c2f464bae.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal wqeuijsg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wqeuijsg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wqeuijsg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal wqeuijsg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wqeuijsg.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wqeuijsg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal wqeuijsg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wqeuijsg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wqeuijsg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal wqeuijsg.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wqeuijsg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wqeuijsg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wqeuijsg.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wqeuijsg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wqeuijsg.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf b983f867985ffbc2773e766c2f464bae.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" arpfeasnzd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" arpfeasnzd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33422D7A9D5083596A4276D177252CA97C8464DD" b983f867985ffbc2773e766c2f464bae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BB4F9CAF966F19883083A42869A3996B0F9038C43160248E1CB42EB08D5" b983f867985ffbc2773e766c2f464bae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" arpfeasnzd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1938C77915ECDBBEB8C87FE5EC9734BB" b983f867985ffbc2773e766c2f464bae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F36BC5FE6A21ACD27DD1D18A7A906B" b983f867985ffbc2773e766c2f464bae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2492 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1960 b983f867985ffbc2773e766c2f464bae.exe 1960 b983f867985ffbc2773e766c2f464bae.exe 1960 b983f867985ffbc2773e766c2f464bae.exe 1960 b983f867985ffbc2773e766c2f464bae.exe 1960 b983f867985ffbc2773e766c2f464bae.exe 1960 b983f867985ffbc2773e766c2f464bae.exe 1960 b983f867985ffbc2773e766c2f464bae.exe 2272 arpfeasnzd.exe 2272 arpfeasnzd.exe 2272 arpfeasnzd.exe 2272 arpfeasnzd.exe 2272 arpfeasnzd.exe 1960 b983f867985ffbc2773e766c2f464bae.exe 2788 yijfbtllbrujf.exe 2788 yijfbtllbrujf.exe 2788 yijfbtllbrujf.exe 2788 yijfbtllbrujf.exe 2788 yijfbtllbrujf.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2640 qwkacsagmsgxekd.exe 2640 qwkacsagmsgxekd.exe 2640 qwkacsagmsgxekd.exe 2640 qwkacsagmsgxekd.exe 2572 wqeuijsg.exe 2572 wqeuijsg.exe 2572 wqeuijsg.exe 2572 wqeuijsg.exe 2640 qwkacsagmsgxekd.exe 2412 wqeuijsg.exe 2412 wqeuijsg.exe 2412 wqeuijsg.exe 2412 wqeuijsg.exe 2788 yijfbtllbrujf.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2640 qwkacsagmsgxekd.exe 2788 yijfbtllbrujf.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2788 yijfbtllbrujf.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2788 yijfbtllbrujf.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2788 yijfbtllbrujf.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2788 yijfbtllbrujf.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2788 yijfbtllbrujf.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2788 yijfbtllbrujf.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2788 yijfbtllbrujf.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2788 yijfbtllbrujf.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1960 b983f867985ffbc2773e766c2f464bae.exe 1960 b983f867985ffbc2773e766c2f464bae.exe 1960 b983f867985ffbc2773e766c2f464bae.exe 2272 arpfeasnzd.exe 2272 arpfeasnzd.exe 2272 arpfeasnzd.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2572 wqeuijsg.exe 2572 wqeuijsg.exe 2572 wqeuijsg.exe 2412 wqeuijsg.exe 2412 wqeuijsg.exe 2412 wqeuijsg.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1960 b983f867985ffbc2773e766c2f464bae.exe 1960 b983f867985ffbc2773e766c2f464bae.exe 1960 b983f867985ffbc2773e766c2f464bae.exe 2272 arpfeasnzd.exe 2272 arpfeasnzd.exe 2272 arpfeasnzd.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2788 yijfbtllbrujf.exe 2640 qwkacsagmsgxekd.exe 2572 wqeuijsg.exe 2572 wqeuijsg.exe 2572 wqeuijsg.exe 2412 wqeuijsg.exe 2412 wqeuijsg.exe 2412 wqeuijsg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2492 WINWORD.EXE 2492 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2272 1960 b983f867985ffbc2773e766c2f464bae.exe 28 PID 1960 wrote to memory of 2272 1960 b983f867985ffbc2773e766c2f464bae.exe 28 PID 1960 wrote to memory of 2272 1960 b983f867985ffbc2773e766c2f464bae.exe 28 PID 1960 wrote to memory of 2272 1960 b983f867985ffbc2773e766c2f464bae.exe 28 PID 1960 wrote to memory of 2640 1960 b983f867985ffbc2773e766c2f464bae.exe 29 PID 1960 wrote to memory of 2640 1960 b983f867985ffbc2773e766c2f464bae.exe 29 PID 1960 wrote to memory of 2640 1960 b983f867985ffbc2773e766c2f464bae.exe 29 PID 1960 wrote to memory of 2640 1960 b983f867985ffbc2773e766c2f464bae.exe 29 PID 1960 wrote to memory of 2572 1960 b983f867985ffbc2773e766c2f464bae.exe 30 PID 1960 wrote to memory of 2572 1960 b983f867985ffbc2773e766c2f464bae.exe 30 PID 1960 wrote to memory of 2572 1960 b983f867985ffbc2773e766c2f464bae.exe 30 PID 1960 wrote to memory of 2572 1960 b983f867985ffbc2773e766c2f464bae.exe 30 PID 1960 wrote to memory of 2788 1960 b983f867985ffbc2773e766c2f464bae.exe 31 PID 1960 wrote to memory of 2788 1960 b983f867985ffbc2773e766c2f464bae.exe 31 PID 1960 wrote to memory of 2788 1960 b983f867985ffbc2773e766c2f464bae.exe 31 PID 1960 wrote to memory of 2788 1960 b983f867985ffbc2773e766c2f464bae.exe 31 PID 2272 wrote to memory of 2412 2272 arpfeasnzd.exe 32 PID 2272 wrote to memory of 2412 2272 arpfeasnzd.exe 32 PID 2272 wrote to memory of 2412 2272 arpfeasnzd.exe 32 PID 2272 wrote to memory of 2412 2272 arpfeasnzd.exe 32 PID 1960 wrote to memory of 2492 1960 b983f867985ffbc2773e766c2f464bae.exe 33 PID 1960 wrote to memory of 2492 1960 b983f867985ffbc2773e766c2f464bae.exe 33 PID 1960 wrote to memory of 2492 1960 b983f867985ffbc2773e766c2f464bae.exe 33 PID 1960 wrote to memory of 2492 1960 b983f867985ffbc2773e766c2f464bae.exe 33 PID 2492 wrote to memory of 656 2492 WINWORD.EXE 36 PID 2492 wrote to memory of 656 2492 WINWORD.EXE 36 PID 2492 wrote to memory of 656 2492 WINWORD.EXE 36 PID 2492 wrote to memory of 656 2492 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\b983f867985ffbc2773e766c2f464bae.exe"C:\Users\Admin\AppData\Local\Temp\b983f867985ffbc2773e766c2f464bae.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\arpfeasnzd.exearpfeasnzd.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\wqeuijsg.exeC:\Windows\system32\wqeuijsg.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2412
-
-
-
C:\Windows\SysWOW64\qwkacsagmsgxekd.exeqwkacsagmsgxekd.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2640
-
-
C:\Windows\SysWOW64\wqeuijsg.exewqeuijsg.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2572
-
-
C:\Windows\SysWOW64\yijfbtllbrujf.exeyijfbtllbrujf.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2788
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:656
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD51768d8eb7e2376b1943b98dadb717747
SHA1db02c626c16e0e8f10e93517786c35aac6cc2e08
SHA2568c2d8fd6c5aab80127c9f2e5396c3e382834b81cef7145cd9f1400319287fa37
SHA512ee9577ca7874759d9c1f4f9a15f71c70a02a632c317fc5ba338bd01e55f182105dd886e2c30300cfc5d295454a071079b373a3cae00248babf955ec595e1eda9
-
Filesize
20KB
MD59b26ecdf9ed872a954d28f83bd435733
SHA19f016bb4c35d1449a6c2f047ca7f88364a2373a9
SHA256c0fe2e7172708969a58d7ba8221b83b21cc2c348460e3bb9117e65ab290f1d2e
SHA512f65bfcc07153af47f105800e6a46b5d2d2e839b5643e6803475e9ef4a6c488e03af64be7d7c55f25d0974c4a70a25f3cdf452cec31d3837290147f34390dc08c
-
Filesize
320KB
MD540eccbf82b7b8fc916befc4f91646a41
SHA19b26728b4c732bfeb504f70ab523d90def972d37
SHA2561dc118e41bf637830be03d9bfe6d57960cf8dc9dbe9c8302a78e3406285bbaaa
SHA5124714d4a188098bfac7feb042ef4c6f0236e826c335c740df7f47d60f0e70d50c5eeaf73e1b94afb0408bd8c6b5ef6fa9d49577a6ac214ce115f4b6db0b341cdf
-
Filesize
448KB
MD59728739f509ce0f3b3b073c945c208bf
SHA131bf207a650a7f1bbb8e90552891f1a6f4e4783b
SHA256f252517c755af447fe73347dd23cd133e28c7a203d01382306a195c8ddda3dba
SHA51276e963f4d1b88528ebbdbc375372889efffba4768f6a99bccce4c1faa730e9515f93fa74bd10bb61c0034f2ceb9ef85ee8234f9d13df183ffc7e163ae3dd38e7
-
Filesize
512KB
MD50508206bd6fe21eb63c539e9c71f2bdc
SHA1a5c10e3ba1013da0dc1008a8ee84b62fd2ece21d
SHA25637f5a9c2fe6c1d014dd45b6764514c1ea85e6784c3e08360624c38def4e04406
SHA512979fde14b0119388efded6aaa3b0174fa3743e652d8aa111cd80ee1adaeca16f8865910b3721caf82580ef29832bae227306c591e030fefde237ad913919ffe9
-
Filesize
64KB
MD5d76d22b81130bc9206c7c947d7a9ea5e
SHA15956e88a6ec7949ce5a350e21703307d855f34b1
SHA256b96acd28ea28c51de470bf63ebbc33a346440fe63e236ab9f092e0cb3035b870
SHA512112f4f23127929556f27e12a7979ebd1536af790c92f8ff7870a5b39470bd02d83fbf1697e7ab3eccebd71c44ae7bfbd1dac9c39fefa6e15a488baf840b8aaf1
-
Filesize
512KB
MD5f9fe13592fe16ed8c8facf41992167c4
SHA1a08483c69d4610ef9b1235557f49d43cd68f91e3
SHA256280de9587855bed378be1f29ccdb83a8187ed3df55c62199bec0c7933df26b68
SHA5129cc2ad528a1ba72fa52c10349b9b064088bc71fcb2b9b9da759ba20b9997b3512a1f74e5bd789d52dc906bdb5b81811fd4e18dcb0b9ae64a03972d89e9d9fa71
-
Filesize
512KB
MD5d8f9a5cf130e41cd3df360715ce149bd
SHA1e024df1344e08f91838526ab441f633d4da5a7ac
SHA25669547e9cc64f63643db5e20c6f03397aa66f86b2bd52a964a25ab12cb8026c94
SHA51228ce6aeeb80386e1fa312d30c93ae75b9c6b9421e5bc84c3bb87330578ff9b57d54658ec93136a7d068e5bb1c105604d3f83634908990590f9b8a70739371249
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5b7f688c1d78acff46ed3e5f609662ca0
SHA1edd123f2a170ecdb07b7f4eb7b84745272720804
SHA25651d0cb490e7164e4619ed23a0d20bbf317c089ae844eed58800440a150649ffd
SHA512b2c029bf3e912c28fb426bee1851e164e9c6ba40dd453c9816ace876fe3177c62452549a2b6bad939c170cf133712d1c16527f26b11cf152674a5a9294fd340c