Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe
Resource
win7-20240704-en
General
-
Target
39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe
-
Size
1.0MB
-
MD5
56cb4177698cacbaf3f194fbc133f3d5
-
SHA1
6b52cec6871d408f7e71584eea5ea08b103130ad
-
SHA256
39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8
-
SHA512
c47813abaa38f4fd758e6d277311a3fcdac317cacee7a852461a10b2e2f90697f9eddfa325a257acc1d086b401770794f38af93ebd7327b006d46e647a171a4a
-
SSDEEP
12288:Mmhjxw7dUlzn3DSudvsh8Awf3XFaZmBITVJPtSrE37yG2LmxL5BwcyQVaE:Lhe7alj3DSudvGM3MXTVhtSQWGtxkPQF
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 3064 onhzpfpufi.exe 2108 shzcwyrpdw.exe 2660 SearchUserHost.exe 1188 Explorer.EXE 1696 39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe 2880 bindsvc.exe -
Loads dropped DLL 13 IoCs
pid Process 1940 39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe 1940 39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe 1940 39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe 1940 39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe 2648 SearchIndexer.exe 2648 SearchIndexer.exe 2648 SearchIndexer.exe 2660 SearchUserHost.exe 1804 SearchProtocolHost.exe 3064 onhzpfpufi.exe 2108 shzcwyrpdw.exe 2108 shzcwyrpdw.exe 1236 SearchFilterHost.exe -
resource yara_rule behavioral1/files/0x000b000000018671-13.dat upx behavioral1/memory/2108-21-0x0000000001350000-0x00000000014CA000-memory.dmp upx behavioral1/memory/1940-19-0x0000000003130000-0x00000000032AA000-memory.dmp upx behavioral1/memory/2108-296-0x0000000001350000-0x00000000014CA000-memory.dmp upx -
pid Process 2416 cmd.exe 3020 ARP.EXE -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\system32\oci.dll shzcwyrpdw.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat SearchProtocolHost.exe File created C:\Windows\System32\bindsvc.exe shzcwyrpdw.exe File created C:\Windows\SysWOW64\racfg.exe shzcwyrpdw.exe File created C:\Windows\SysWOW64\bindsvc.exe shzcwyrpdw.exe File created C:\Windows\system32\msfte.dll shzcwyrpdw.exe File created C:\Windows\system32\SearchUserHost.exe SearchIndexer.exe File opened for modification C:\Windows\system32\SearchUserHost.exe SearchIndexer.exe File created C:\Windows\SysWOW64\wideshut.exe shzcwyrpdw.exe File opened for modification C:\Windows\SysWOW64\wideshut.exe shzcwyrpdw.exe File created C:\Windows\SysWOW64\wimsvc.exe shzcwyrpdw.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1920 tasklist.exe 1348 tasklist.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2284 sc.exe 2756 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shzcwyrpdw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language onhzpfpufi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2248 PING.EXE 1568 cmd.exe -
System Network Connections Discovery 1 TTPs 2 IoCs
Attempt to get a listing of network connections.
pid Process 2688 cmd.exe 3028 NETSTAT.EXE -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1976 ipconfig.exe 3028 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2272 systeminfo.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Direct3D\MostRecentApplication SearchFilterHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpRecWaitForCounts = "32" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%CommonProgramFiles%\Microsoft Shared\Ink\TipTsf.dll,-60 = "Enter text by using handwriting or a touch keyboard instead of a standard keyboard. You can use the writing pad or the character pad to convert your handwriting into typed text or the touch keyboard to enter characters." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\iscsicpl.dll,-5001 = "iSCSI Initiator" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10103 = "Internet Spades" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\setupapi.dll,-2000 = "Setup Information" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogMinJobWaitTimeMs = "3000" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CriticalLowDiskSpace = "1073741824" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\searchfolder.dll,-9023 = "Saved Search" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\OobeFldr.dll,-33056 = "Getting Started" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\wucltux.dll,-1 = "Windows Update" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\xpsrchvw.exe,-106 = "XPS Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-103 = "Hydrangeas" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E37A73F8-FB01-43DC-914E-AAEE76095AB9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000000913e3b3fcda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\sud.dll,-10 = "Choose which programs you want Windows to use for activities like web browsing, editing photos, sending e-mail, and playing music." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\NetProjW.dll,-501 = "Connect to a Network Projector" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10102 = "Internet Backgammon" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\sdcpl.dll,-101 = "Backup and Restore" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-116 = "Kalimba" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\Filemgmt.dll,-602 = "Starts, stops, and configures Windows services." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10209 = "More Games from Microsoft" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\gameux.dll,-10304 = "Move all the cards to the home cells using the free cells as placeholders. Stack the cards by suit and rank from lowest (ace) to highest (king)." SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileInlineGrowthQuantumSeconds = "30" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\filemgmt.dll,-2204 = "Services" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\wdc.dll,-10030 = "Resource Monitor" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%ProgramFiles%\Windows Journal\Journal.exe,-3075 = "Create notes in your own handwriting. You can leave your notes in ink and search your handwriting or convert your notes to typed text." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Program Files\Common Files\Microsoft Shared\Ink\ShapeCollector.exe,-298 = "Personalize Handwriting Recognition" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe,-102 = "Windows PowerShell ISE (x86)" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\displayswitch.exe,-320 = "Connect to a Projector" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\MdSched.exe,-4002 = "Check your computer for memory problems." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-5 = "Microsoft Transliteration Engine" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\miguiresource.dll,-101 = "Event Viewer" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\gameux.dll,-10300 = "Play the classic strategy game of Checkers against online opponents. Be the first to capture all your opponent’s pieces, or leave them with no more moves, to win the game." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%ProgramFiles%\Windows Sidebar\sidebar.exe,-1012 = "Add Desktop Gadgets that display personalized slideshows, news feeds, and other customized information." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Program Files\Windows Sidebar\sidebar.exe,-1005 = "Desktop Gadget Gallery" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-101 = "Chrysanthemum" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-118 = "Sleep Away" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@gameux.dll,-10057 = "Minesweeper" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\gameux.dll,-10303 = "Enjoy the classic strategy game of Chess. Play against the computer, or compete against a friend. The winner is the first to capture the opponent’s king." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\FXSRESM.dll,-114 = "Windows Fax and Scan" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-7 = "Microsoft Devanagari to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\eHome\ehepgres.dll,-312 = "Sample Media" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SNTSearch.dll,-505 = "Sticky Notes" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\msconfig.exe,-1601 = "Perform advanced troubleshooting and system configuration" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\ShadowFileMaxClients = "32" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\sdcpl.dll,-100 = "Backup and restore your files and system. Monitor latest backup status and configuration." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\SoundRecorder.exe,-32790 = "Record sound and save it on your computer." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\syswow64\unregmp2.exe,-155 = "Play digital media including music, videos, CDs, and DVDs." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-6 = "Microsoft Cyrillic to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@gameux.dll,-10060 = "Solitaire" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\unregmp2.exe,-4 = "Windows Media Player" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\migwiz\wet.dll,-590 = "Transfers files and settings from one computer to another" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\rstrui.exe,-102 = "Restore system to a chosen restore point." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10059 = "Mahjong Titans" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\mshta.exe,-6412 = "HTML Application" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CommitMaxCheckPointPageCount = "7" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Program Files\Common Files\Microsoft Shared\Ink\TipTsf.dll,-80 = "Tablet PC Input Panel" SearchProtocolHost.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2248 PING.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2648 SearchIndexer.exe 2648 SearchIndexer.exe 2660 SearchUserHost.exe 1920 tasklist.exe 1920 tasklist.exe 2108 shzcwyrpdw.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeManageVolumePrivilege 2648 SearchIndexer.exe Token: 33 2648 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 2648 SearchIndexer.exe Token: SeDebugPrivilege 1920 tasklist.exe Token: SeDebugPrivilege 3028 NETSTAT.EXE Token: SeDebugPrivilege 1348 tasklist.exe Token: SeDebugPrivilege 2660 SearchUserHost.exe Token: SeDebugPrivilege 2660 SearchUserHost.exe Token: SeDebugPrivilege 2660 SearchUserHost.exe Token: SeDebugPrivilege 2660 SearchUserHost.exe Token: SeDebugPrivilege 2660 SearchUserHost.exe Token: SeDebugPrivilege 2660 SearchUserHost.exe Token: SeDebugPrivilege 2660 SearchUserHost.exe Token: SeDebugPrivilege 2660 SearchUserHost.exe Token: SeDebugPrivilege 2660 SearchUserHost.exe Token: SeDebugPrivilege 2660 SearchUserHost.exe Token: SeDebugPrivilege 2660 SearchUserHost.exe Token: SeDebugPrivilege 2660 SearchUserHost.exe Token: SeDebugPrivilege 2660 SearchUserHost.exe Token: SeDebugPrivilege 2660 SearchUserHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 1804 SearchProtocolHost.exe 1804 SearchProtocolHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe 2660 SearchUserHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 3064 1940 39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe 30 PID 1940 wrote to memory of 3064 1940 39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe 30 PID 1940 wrote to memory of 3064 1940 39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe 30 PID 1940 wrote to memory of 3064 1940 39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe 30 PID 1940 wrote to memory of 2108 1940 39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe 31 PID 1940 wrote to memory of 2108 1940 39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe 31 PID 1940 wrote to memory of 2108 1940 39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe 31 PID 1940 wrote to memory of 2108 1940 39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe 31 PID 2648 wrote to memory of 2660 2648 SearchIndexer.exe 33 PID 2648 wrote to memory of 2660 2648 SearchIndexer.exe 33 PID 2648 wrote to memory of 2660 2648 SearchIndexer.exe 33 PID 2660 wrote to memory of 1188 2660 SearchUserHost.exe 21 PID 2648 wrote to memory of 1804 2648 SearchIndexer.exe 34 PID 2648 wrote to memory of 1804 2648 SearchIndexer.exe 34 PID 2648 wrote to memory of 1804 2648 SearchIndexer.exe 34 PID 2648 wrote to memory of 1236 2648 SearchIndexer.exe 35 PID 2648 wrote to memory of 1236 2648 SearchIndexer.exe 35 PID 2648 wrote to memory of 1236 2648 SearchIndexer.exe 35 PID 1188 wrote to memory of 1972 1188 Explorer.EXE 36 PID 1188 wrote to memory of 1972 1188 Explorer.EXE 36 PID 1188 wrote to memory of 1972 1188 Explorer.EXE 36 PID 3064 wrote to memory of 1696 3064 onhzpfpufi.exe 37 PID 3064 wrote to memory of 1696 3064 onhzpfpufi.exe 37 PID 3064 wrote to memory of 1696 3064 onhzpfpufi.exe 37 PID 3064 wrote to memory of 1696 3064 onhzpfpufi.exe 37 PID 2660 wrote to memory of 2664 2660 SearchUserHost.exe 38 PID 2660 wrote to memory of 2664 2660 SearchUserHost.exe 38 PID 2660 wrote to memory of 2664 2660 SearchUserHost.exe 38 PID 2664 wrote to memory of 2272 2664 cmd.exe 40 PID 2664 wrote to memory of 2272 2664 cmd.exe 40 PID 2664 wrote to memory of 2272 2664 cmd.exe 40 PID 1188 wrote to memory of 2212 1188 Explorer.EXE 42 PID 1188 wrote to memory of 2212 1188 Explorer.EXE 42 PID 1188 wrote to memory of 2212 1188 Explorer.EXE 42 PID 2660 wrote to memory of 2476 2660 SearchUserHost.exe 44 PID 2660 wrote to memory of 2476 2660 SearchUserHost.exe 44 PID 2660 wrote to memory of 2476 2660 SearchUserHost.exe 44 PID 2476 wrote to memory of 1920 2476 cmd.exe 46 PID 2476 wrote to memory of 1920 2476 cmd.exe 46 PID 2476 wrote to memory of 1920 2476 cmd.exe 46 PID 2108 wrote to memory of 2696 2108 shzcwyrpdw.exe 47 PID 2108 wrote to memory of 2696 2108 shzcwyrpdw.exe 47 PID 2108 wrote to memory of 2696 2108 shzcwyrpdw.exe 47 PID 2108 wrote to memory of 2696 2108 shzcwyrpdw.exe 47 PID 2696 wrote to memory of 2284 2696 cmd.exe 49 PID 2696 wrote to memory of 2284 2696 cmd.exe 49 PID 2696 wrote to memory of 2284 2696 cmd.exe 49 PID 2108 wrote to memory of 2684 2108 shzcwyrpdw.exe 50 PID 2108 wrote to memory of 2684 2108 shzcwyrpdw.exe 50 PID 2108 wrote to memory of 2684 2108 shzcwyrpdw.exe 50 PID 2108 wrote to memory of 2684 2108 shzcwyrpdw.exe 50 PID 2108 wrote to memory of 2880 2108 shzcwyrpdw.exe 51 PID 2108 wrote to memory of 2880 2108 shzcwyrpdw.exe 51 PID 2108 wrote to memory of 2880 2108 shzcwyrpdw.exe 51 PID 2108 wrote to memory of 2880 2108 shzcwyrpdw.exe 51 PID 2660 wrote to memory of 2688 2660 SearchUserHost.exe 53 PID 2660 wrote to memory of 2688 2660 SearchUserHost.exe 53 PID 2660 wrote to memory of 2688 2660 SearchUserHost.exe 53 PID 2688 wrote to memory of 3028 2688 cmd.exe 55 PID 2688 wrote to memory of 3028 2688 cmd.exe 55 PID 2688 wrote to memory of 3028 2688 cmd.exe 55 PID 2660 wrote to memory of 1992 2660 SearchUserHost.exe 56 PID 2660 wrote to memory of 1992 2660 SearchUserHost.exe 56 PID 2660 wrote to memory of 1992 2660 SearchUserHost.exe 56 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe"C:\Users\Admin\AppData\Local\Temp\39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\onhzpfpufi.exe"C:\Users\Admin\AppData\Local\Temp\onhzpfpufi.exe" "C:\Users\Admin\AppData\Local\Temp\itadrztdbr.exe" "C:\Users\Admin\AppData\Local\Temp\39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe"C:\Users\Admin\AppData\Local\Temp\39a6f19fe835ddba6e650e13d2579f102574a984796094fab0d9ab7e12f031d8.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1696
-
-
-
C:\Users\Admin\AppData\Local\Temp\shzcwyrpdw.exeC:\Users\Admin\AppData\Local\Temp\shzcwyrpdw.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\System32\cmd.exe/c sc config msdtc obj= LocalSystem4⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\sc.exesc config msdtc obj= LocalSystem5⤵
- Launches sc.exe
PID:2284
-
-
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\reKFAfqI.bat"4⤵PID:2684
-
-
C:\Windows\System32\bindsvc.exe"C:\Windows\System32\bindsvc.exe"4⤵
- Executes dropped EXE
PID:2880
-
-
-
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe C:\Users\Admin\AppData\Roaming\Microsoft\Word\winword.vbs C:\Users\Admin\AppData\Roaming\Microsoft\Word2⤵PID:1972
-
-
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe C:\Users\Admin\AppData\Roaming\Microsoft\Word\winword.vbs C:\Users\Admin\AppData\Roaming\Microsoft\Word2⤵PID:2212
-
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\SearchUserHost.exeC:\Windows\system32\SearchUserHost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\cmd.exe/c systeminfo3⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:2272
-
-
-
C:\Windows\system32\cmd.exe/c "tasklist /v"3⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\system32\tasklist.exetasklist /v4⤵
- Enumerates processes with tasklist
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
-
C:\Windows\system32\cmd.exe/c "netstat -ano"3⤵
- System Network Connections Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\NETSTAT.EXEnetstat -ano4⤵
- System Network Connections Discovery
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
-
C:\Windows\system32\cmd.exe/c "ipconfig /all"3⤵PID:1992
-
C:\Windows\system32\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:1976
-
-
-
C:\Windows\system32\cmd.exe/c "route print"3⤵PID:1952
-
C:\Windows\system32\ROUTE.EXEroute print4⤵PID:2896
-
-
-
C:\Windows\system32\cmd.exe/c "arp -a"3⤵
- Network Service Discovery
PID:2416 -
C:\Windows\system32\ARP.EXEarp -a4⤵
- Network Service Discovery
PID:3020
-
-
-
C:\Windows\system32\cmd.exe/c "tasklist /m msfte.dll"3⤵PID:1852
-
C:\Windows\system32\tasklist.exetasklist /m msfte.dll4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
-
C:\Windows\system32\cmd.exe/c "net share"3⤵PID:496
-
C:\Windows\system32\net.exenet share4⤵PID:1756
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 share5⤵PID:928
-
-
-
-
C:\Windows\system32\cmd.exe/c "ping server"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1568 -
C:\Windows\system32\PING.EXEping server4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2248
-
-
-
C:\Windows\system32\cmd.exe/c "sc query hfile.sys"3⤵PID:2040
-
C:\Windows\system32\sc.exesc query hfile.sys4⤵
- Launches sc.exe
PID:2756
-
-
-
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 540 556 564 65536 5602⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:1236
-
Network
MITRE ATT&CK Enterprise v15
Discovery
Network Service Discovery
1Network Share Discovery
1Process Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD505a5cc4f1e1e617e5b968d684a91fcc3
SHA12194d2e97be7b90764327d222abc5dbafe2a1fc4
SHA256e9fcc50ea1217cdaff7bf29ad0fcdb27f596ef5a82f2f74214e8dd41c3e8605c
SHA5121cb191b53d396880786cf7fd899859563d5769cc923764bdc60e80f93019a641206f8c0b9fb417dadfaafef02c5e2265f7c058b6154950ee7f21bd32d6d94513
-
Filesize
1024KB
MD5d2ce730d247ed8ea08a30826ec1e9a13
SHA1d05bdbaad1a91c1076297b8c4afcde35a27d2e46
SHA2568bacdbba1d884a1af85303f726a8419f7553f547ff02d950b07bdc416ebfa6b2
SHA51287a4b9bb6f1d4683e5ffcc21a4c055e0b61e4a7516e397a53529b8b716fecad7c1ab065eb11f0a4f4187a10ffabbea4b47ab1d614fd4ee1755ced2322bf2567e
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\CiAB0002.000
Filesize240B
MD57ca2da6f1e7bca562d7d9376700a912f
SHA167feaa004013eee76282e3b3fc196279f2577dcb
SHA25604fd7654331261ff9ec331c31b238ba7770f082abfb817d7881813ec02084a4e
SHA5124f2f67dee86af03dae15145649f5eb65cd158686381d26005b91aab89f017b692289050f0b1def00f8c2e724aedba4025db0baa6b55f76d402ded8006c48b38d
-
Filesize
209KB
MD58d98511924d571c2b0e11d765b857a8a
SHA1b9ce4bacd3e7e644626fae63f746d4466dba737e
SHA256666902c802f71eafbbb130664af70cea1d0cae2798b5be979b29ae9fc43feb7e
SHA512925d53bb92ae82b83456d5728e58f608576ba633ce08ef440b4bd4fb04f4db5cf6a171548ff37feca3dc3f89838b9852d4ed74e05f4e07179751f3630ca9ad04
-
Filesize
51KB
MD5e48b89715bf5e4c55eb5a1fed67865d9
SHA189a287da39e14b02cdc284eb287549462346d724
SHA256c25d90168fc2026d8ed2a69c066bd5a7e11004c3899928a7db24cb7636fc4d9e
SHA5124bd77d2fa5da646009ebeeedb5610048c58598ee7e5aeb5660b0c01042f0f34a88f89181e13e86c06cae9984155d0299128a2aee1c2c16f18e284db4745d850c
-
Filesize
196B
MD587c5f4ab7c4d71ccf39e61bded603e00
SHA1f2d713324bbe9624b6dad94b04a9590703cbe3e7
SHA256710fb596341bdcd6abe31da06fa8b522bc22deec88bc5a7eebdf294e61ce776f
SHA5123ce92c9e0763fc58e0f9ebe196552313f9005eb6e6ace6d20a3be98b6c10b794022f5c0637c57813854245e0f1eab21c4e2d57b59866a1a7703dca9af3486007
-
Filesize
898B
MD53d513dc9accb10061f522f5ca01c4ffc
SHA17cb16063b8810c537c8cb624b96e1325fd7d6fd1
SHA256f56286c7b532bb297e428f6fb14e81cc9540fb371e82ef25b5c70be1b7ab9f26
SHA51235df5156e463c581890af4684fd78b2cd797efbd8e2af419d3b09e1f57d040354cebca72906d4c04956f5d71802ddb2e0e875e66c06a98b9f599da0885a1473f
-
Filesize
2KB
MD5c8c7271491010e482c35edfe6aa51ceb
SHA119fa3de05e7a57ad2661ab08018d2b94d7f11885
SHA2566cba644575df3ae44f5faa48453a1bacbf8bcc7fe7ca7f6d3c790fa036c0c0b2
SHA512cea267dda7cba46e9e761fe0b72073192050f11e375cb49ef89a57a32f8a371803e422c19379f3820a61921067bbeb690ddc72c55b7dacd2dee7d16906384d6d
-
Filesize
3KB
MD55f27c70370d8ee1f4ad089a86937371b
SHA1983c621b847d161c78c2416cb350f88fbba39d90
SHA256342e8f412168b24ee4033b70a6e7dbff7329b702f6583383a21fec8a79470399
SHA512f57273e550c7ff942e459a9c9f1b7bf516b1e41996f6881cdc7c6b42ed0bbcbc9a082e644ee6a1b80b3f038782aec7241da8c03bd38e63fd4b2ac999dde6db04
-
Filesize
4KB
MD51a5c5b7c6a036c07ba8f356d8fbebace
SHA1c019e70e5dae698ecd7434ed54341328fb303414
SHA256d83064fc77713a36b23c85a954e994e855f5e300f1e3e4a7035fd20adf71b500
SHA512ca3c5608bf60c70959f3eaa54b9dffe2d9b810408d1dce3957878e0d5425366f6df18e3a2b08847f720f55b78ab65d18ba317be03484d7c5ad64c3e3059c5796
-
Filesize
1KB
MD55c8456ead17271e348896153e57c2e79
SHA17967e7e3516e6d7d9333c2faa611db438c958c78
SHA2563c1c635f506048f71d25058f4d32775924f50dfb603f2c1eaf73f4301d3f7d4c
SHA5124b9b47714f3a7c46c9a00263a32b4143194ba8ae96474bd55746ba1b04e9309a00757b52ace24236611967c781264a5bd8a60ce7c5e831b7361188f1c403a59e
-
Filesize
18KB
MD527b1cab38a9c9b78bf6b8341236aa746
SHA147e809ffc27b72fd875df46071a5db7c8638762b
SHA2561ca4826cada6840b01b252b7b05091b22c395cb51292fe42a5917962bfc72599
SHA5128c41a3c474d848fd0ae994b7ca391e4c4c1089811a94bc3cae183599cbe3b50865dfb5d8a373b257f2a27292f2deb99a3416879388d91fda308a395adbb2280a
-
Filesize
8KB
MD5b6312167af3972f5de465537a88c11dd
SHA1812d0503c1c752b6b095eb98a4d3750307f690f4
SHA2569268bd171dae33fece4e305990513e142114b014cab84a4a6b8e87b353627c73
SHA5127f7368652e2ca17fc25189592c0adcc154b132d404ad88036cda6d84e3d7a0a74767a7120b478449e90f3e1c0fd70bfc55702cfc16afcff681a81141af56251c
-
Filesize
15KB
MD522151aa4bd0eaf487e105fcc6a1e9088
SHA1e71bf7e588ae0f9b4848d820989b3ab87329145c
SHA2563bd61a21526c9d2bf12b50115f3901f3df7abd0bc112168a508ad730866f9154
SHA512d9d897c6ac7afefe3294375ace5c5ae5d770808095c8e5b9e84aa35f0f21eac63d3874ff883556b10d727461384e6b214dde0046358041b3d3fea93e871e8ed9
-
Filesize
4KB
MD5b3a6f92a4892e9cb930f0e89d19a92d1
SHA1336e26a7dd4141e1c729e1fc6ac2b1ce4ffbdb85
SHA256dce62aa68ba355a829b0e18396cba7e8bf728b6564eb4eef28be8dbd5121f4af
SHA51279c23fba6e72f6a5c58b193404665f0fb92eba092dfa199d3b0a7e8e13adb2b5d3a345058a62be8e2ad82632130e7cb8909b8d11478a4237645c23004678d693
-
Filesize
1KB
MD53439318cedcf37c1bf5fe6d49ddbb2cb
SHA1e075965bb3b38abdd80668fb6101a0d10b30f080
SHA2566484a02c2db6c9afb5659ede4047cad10b7102c2bbc4c94bf8482f88d8fd83a8
SHA5123dffcf24b052a7fffd50ab6c76d081b1c47ba64c20f21650e4bdcf19106518e8b342691711230ba9eea5489994b8ccec8ad11f54b1509b1cd518616254176b61
-
Filesize
217KB
MD5d7ddfd90c55ad42200b2a7e51110ad87
SHA10c9429f0b51a73423de4cb0ecf10fd3b3bacd84d
SHA2564fdc7aacb3981434e797106944f27a507201d11cdf194b3fab79747ce98f2446
SHA5128ba6cd56ce6aeae9481154e93b75d8712e854a19c60f6279abf721c2550a09d9f22cb410a5cc3062d59f17cde35e728d250129abe60f29321a16df7d2fb9c179
-
Filesize
580KB
MD52c2029588ad8b86759c17b7ae885ee03
SHA191653b5344d4c210201218e2f215dd5228d76799
SHA2563ab288c47914e33cc61985e46502158400faa9d7187b55c19039b8795504a290
SHA51288531fe6b0f2d66ada368a431f912868f74f9ed8ade9dc88887807b761490fe2cc317e1b6b40e7070411924c80971f237dca68ad2faafa7b4b1ecd2ec90c860f
-
Filesize
244KB
MD542ec9065d9bf266ade924b066c783a56
SHA1a8dcf7d63a8bb5abef8787775957a5bb6c0f3f77
SHA2564ac002e90a52cb0998da78f2995294ee77b89fb2be709b0e3c8e1627212bccdc
SHA512e49af43aef3f02397098821b81e034ee1f07f8c2f49a9a1768d1522bbc009103a2c88f436f488333f57c7d56b34acbee84588040f56382cc75eaddbb9db19980
-
Filesize
291KB
MD57c5b397fb54d5aa06bd2a6fb99c62fee
SHA1a9e0bf7bbabf6ab9e294156985537ae972ebd743
SHA256d032bdc64c9451bbb653b346c5bd6ac9f83a91edeb0155497f098c8d6182ddee
SHA512daa4702eff625b5dd1edca358c653338cff4eeca4e43d12dfd39bbc52acf8dfde3b963d190cf4426e405d9db8bcc9817cd50868055aa0d4a9efe4d1042beaf0c