Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
06/12/2022, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
decoded-1.msi
Resource
win10-20220901-en
Behavioral task
behavioral2
Sample
decoded-1.msi
Resource
win7-20221111-en
General
-
Target
decoded-1.msi
-
Size
2.5MB
-
MD5
1022b2009c747e5e8479c5e376ec86c0
-
SHA1
cab454beb6d85cf19a7b2deafbb6997058b55ff9
-
SHA256
cd713f4fed7e0a6a1f08dedfd2d58240f6af50cee65a3d47bdac5573da5d4e01
-
SHA512
5127a215750767874e0213a550c01c3d6ae6ace6168f03cad2d6a2b2b5ed61292954f9db837dd846aeebba685470fb6cc9d715ca9ce5bd0b9e3a27339b8074e8
-
SSDEEP
49152:RfZbN+wxoLCGbqtnvQEhB8ssaZw0Vbimsh9QuzybafQoP:RfZRoL9qRQEMss2rumGfQU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1700 pythonw.exe -
Loads dropped DLL 6 IoCs
pid Process 1700 pythonw.exe 1700 pythonw.exe 1700 pythonw.exe 1700 pythonw.exe 1700 pythonw.exe 1700 pythonw.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\SourceHash{93D7B7BF-E0D5-4E15-9385-169B61F064AC} msiexec.exe File opened for modification C:\Windows\Installer\MSI1373.tmp msiexec.exe File created C:\Windows\Installer\e5807ea.msi msiexec.exe File opened for modification C:\Windows\Installer\e5807ea.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\e5807ec.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI6540.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2696 msiexec.exe Token: SeIncreaseQuotaPrivilege 2696 msiexec.exe Token: SeSecurityPrivilege 4856 msiexec.exe Token: SeCreateTokenPrivilege 2696 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2696 msiexec.exe Token: SeLockMemoryPrivilege 2696 msiexec.exe Token: SeIncreaseQuotaPrivilege 2696 msiexec.exe Token: SeMachineAccountPrivilege 2696 msiexec.exe Token: SeTcbPrivilege 2696 msiexec.exe Token: SeSecurityPrivilege 2696 msiexec.exe Token: SeTakeOwnershipPrivilege 2696 msiexec.exe Token: SeLoadDriverPrivilege 2696 msiexec.exe Token: SeSystemProfilePrivilege 2696 msiexec.exe Token: SeSystemtimePrivilege 2696 msiexec.exe Token: SeProfSingleProcessPrivilege 2696 msiexec.exe Token: SeIncBasePriorityPrivilege 2696 msiexec.exe Token: SeCreatePagefilePrivilege 2696 msiexec.exe Token: SeCreatePermanentPrivilege 2696 msiexec.exe Token: SeBackupPrivilege 2696 msiexec.exe Token: SeRestorePrivilege 2696 msiexec.exe Token: SeShutdownPrivilege 2696 msiexec.exe Token: SeDebugPrivilege 2696 msiexec.exe Token: SeAuditPrivilege 2696 msiexec.exe Token: SeSystemEnvironmentPrivilege 2696 msiexec.exe Token: SeChangeNotifyPrivilege 2696 msiexec.exe Token: SeRemoteShutdownPrivilege 2696 msiexec.exe Token: SeUndockPrivilege 2696 msiexec.exe Token: SeSyncAgentPrivilege 2696 msiexec.exe Token: SeEnableDelegationPrivilege 2696 msiexec.exe Token: SeManageVolumePrivilege 2696 msiexec.exe Token: SeImpersonatePrivilege 2696 msiexec.exe Token: SeCreateGlobalPrivilege 2696 msiexec.exe Token: SeBackupPrivilege 3476 vssvc.exe Token: SeRestorePrivilege 3476 vssvc.exe Token: SeAuditPrivilege 3476 vssvc.exe Token: SeBackupPrivilege 4856 msiexec.exe Token: SeRestorePrivilege 4856 msiexec.exe Token: SeRestorePrivilege 4856 msiexec.exe Token: SeTakeOwnershipPrivilege 4856 msiexec.exe Token: SeRestorePrivilege 4856 msiexec.exe Token: SeTakeOwnershipPrivilege 4856 msiexec.exe Token: SeRestorePrivilege 4856 msiexec.exe Token: SeTakeOwnershipPrivilege 4856 msiexec.exe Token: SeRestorePrivilege 4856 msiexec.exe Token: SeTakeOwnershipPrivilege 4856 msiexec.exe Token: SeRestorePrivilege 4856 msiexec.exe Token: SeTakeOwnershipPrivilege 4856 msiexec.exe Token: SeRestorePrivilege 4856 msiexec.exe Token: SeTakeOwnershipPrivilege 4856 msiexec.exe Token: SeRestorePrivilege 4856 msiexec.exe Token: SeTakeOwnershipPrivilege 4856 msiexec.exe Token: SeRestorePrivilege 4856 msiexec.exe Token: SeTakeOwnershipPrivilege 4856 msiexec.exe Token: SeRestorePrivilege 4856 msiexec.exe Token: SeTakeOwnershipPrivilege 4856 msiexec.exe Token: SeRestorePrivilege 4856 msiexec.exe Token: SeTakeOwnershipPrivilege 4856 msiexec.exe Token: SeRestorePrivilege 4856 msiexec.exe Token: SeTakeOwnershipPrivilege 4856 msiexec.exe Token: SeRestorePrivilege 4856 msiexec.exe Token: SeTakeOwnershipPrivilege 4856 msiexec.exe Token: SeRestorePrivilege 4856 msiexec.exe Token: SeTakeOwnershipPrivilege 4856 msiexec.exe Token: SeRestorePrivilege 4856 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 msiexec.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4856 wrote to memory of 516 4856 msiexec.exe 71 PID 4856 wrote to memory of 516 4856 msiexec.exe 71 PID 4856 wrote to memory of 4556 4856 msiexec.exe 73 PID 4856 wrote to memory of 4556 4856 msiexec.exe 73 PID 4556 wrote to memory of 1700 4556 wscript.exe 74 PID 4556 wrote to memory of 1700 4556 wscript.exe 74 PID 4556 wrote to memory of 1700 4556 wscript.exe 74 PID 4556 wrote to memory of 4416 4556 wscript.exe 76 PID 4556 wrote to memory of 4416 4556 wscript.exe 76
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\decoded-1.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2696
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:516
-
-
C:\Windows\system32\wscript.exe"wscript.exe" "sdv.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\ProgramData\sdv\pythonw.exeC:\ProgramData\sdv\pythonw.exe C:\ProgramData\sdv\screen1.pyw -19255731103⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1700
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" product where name="CAF Data" call uninstall /nointeractive3⤵PID:4416
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5bd2e769663704bb169688cecca40a13e
SHA19072f1810912d741d1ad6857700335c68a1c2607
SHA256676bd4bd1f425a49b8483f87185a67c9e3093b681dc6d838e0fdd56a1813b078
SHA5128ddf5be7a643bc968e70adf3907f60ebaf4c4859a1288a0c1f1e6dd9f7a8664cdeadb153a7d2ad66b39ee7045185212a8fd47f183f595d9841a80c17b777b67c
-
Filesize
4KB
MD52ffb402200fbb9fba9dce011e2a28161
SHA1a71f1b1137353ad52ac3ee13ce8768fbd5a1b9c8
SHA256c151ac8b911f410d7406511aed6da5bc78ca05aefe7485e4e4e4204606618213
SHA5126b6c0a38d718681fd8b333a230c91ebcbf836e6c37a45956fd807c8ddcd6ea71520cc7a190cd47df12b051a7c5fa065f7c5d67788a0b02fc0554fbb5acd14c10
-
Filesize
26KB
MD5bdc8c9671fd305d9b07d73b2cfe986b3
SHA13223e825c4887a32fafb3e6cdf1ed532770503b6
SHA256cb7e4441c14ed0c85f7ee7a11325878bb66265f0747583e88371a6efcc9f39e6
SHA5124625e219df3b5da1c8d1bb8f451942474f67fa44e7ef8a7e23603563a7e8df07892229685223ba74349cc8b9a3003078f2359c138ebee3e34f922b525a05b17f
-
Filesize
9KB
MD53d40919c21c8a9fef9466f845038186c
SHA1e45b3c4dcbc2f0257ec8feb0c25d748157c61ef7
SHA2567e8b80520418624f95772f468f08e1665a20d07c1a6e585619b1382543e00d27
SHA512c9dbbe3a2503176d737e48e3b5510ba6846618f43cdd8a576024271ed45726fd97671e9f584b460cbc9863cc1e2925aba01b93ff905ddbed2d020007ea6fbaf9
-
Filesize
6KB
MD5b9dbaf99de983c6474bcf24cfbb42f5e
SHA175cd951d03460e71a67d6a9b52f07a771ef061e6
SHA256e79ad6160be09b2afa56fe75534fb648df15f4ed2c9d5bc6e6d936c8e9e705c4
SHA512374f3930991f336bfa829d143a6ae276cb5af7d51b627ded3d0d99337f304c4bf7bad059c20a092b1934035f18179838902edefcd4682086c16bae94518f6cc5
-
Filesize
13KB
MD5007fdf2348650068a0fb62674811cccd
SHA1ea47c7c57a3ea24c0b3a65c2ff6f9abd64eaf2fc
SHA256bd11d82013b0c3aa34d88eeaa3a1bd5f13ffd518ec8fa128e62928e12b496b12
SHA51269046a9e6c37003302ff5c3c0f2d2fb4bd5c7e6d0b4f6fb14af988702a15b15e2267f613361b625255773c2373f3877257dc32adc4a78e7c2b45b749d05987a8
-
Filesize
40KB
MD5c53e48ccddc9f54908f3e9e31acb19f7
SHA186cedfcb52e23bf763a27bcb52c27f512c7d3348
SHA25695469f3cbea58994af3fe681ed5f82cac8165229cec4c7cc39799adcf401230e
SHA5125f739ab10614ae2c24ab57f0ef09843e13550413db5425f98449b30cb8190c3394083d7ef009af05214a167ca08e1ff711f828699423c1a6d5544fec2ca0010c
-
Filesize
29KB
MD58e145a9b6225449ee82d447d83023cc5
SHA15ec2d12a258fbd5d138a77885b2f5a156e158a6c
SHA256404c7e468c0c12fbe214adbf6844dd7819574290070b56c87c84561ffa4636d1
SHA512b947620d44498070886a642f38e59501e8a4b5d4102854439098f42616f920e821875a1dddc336ce30e91aec1f86cb179528fe170b08c03efb60c42ba6b382e5
-
Filesize
11KB
MD53979a095d796cb6de7304afb64c1f97c
SHA1357ab03e71e4fce5d8125bc677723cdf4c2313b5
SHA25672797b98e1f05dee6708f21c0a657db500c9818896d15009ba17ee2712e14388
SHA5126b5fcde855e079cb8095296f11c4323a3e166ca77d90769855b305e012d4511f08054c270c3f4d1b5ddb7a3d36ab7907775514a9aaebac85907aa0a273492e51
-
Filesize
5KB
MD591fbce79f555108f4a2008f18d0829d2
SHA12d0f375cd14015c35ea671e8237b81f764554893
SHA25631e029e9013722d8e0b81dc0270f5665261bb6e3f492bdf6aeb287ccf1b02fe0
SHA512331ebfd3e9ce4b70580d629ff2acea628f3fc0f25357dfd3aad926a5bfe4809a9b841972d41624fa97953c1478e0d7c612fa30bd7c0db1472eb9dedac83ecaca
-
Filesize
1KB
MD5d0b4ef3b034844b5422be2598addff21
SHA1af7c962bef472d66ff1cf64e14847a6078168a54
SHA256bab4a7c19336adaac43f011016ceeb49fb06f5424770f99fa930d1fed96c9e16
SHA51263e914cf5be1f251b3004b5fda8406fb1ab8b60b1f22915e0b474f11fb83bea154228b6cdd96f8bc2c39575d7830cb4d4070ebfcbdc884804589f8bb093d3128
-
Filesize
14KB
MD598b0199d5a578099773fdbd0342992ad
SHA17c6ecc42e1dc0ca931438be18fdc37f8ee85afa5
SHA25661c8e26a02dcc942e8f62911e7c42bf2f2a382cc85706dfda8ef5d114b53001e
SHA5124809081e9af2f34f1a23b538f9c537f8abf7cde85286606c941e7f866ffb7dc0951138da699cad5a69120000d1141aa0523cb352dab1058f60f5781b0c06b548
-
Filesize
3KB
MD5d6b49ece8abc9480c9e0dde0b9024733
SHA1f1f1b882b1693ee7c20e37d6f1fa1d9f36c8fdfe
SHA256ed48169a9a2897e42d2d9c4dd9b1068715a28ea5c07c3bd4f853e9721ca1f9f0
SHA512fdfa6bd528bec24d9e9f1c4347f6cc66ca290bcb0bd6564f95ece557e5763d722072f1edeacb4587cc1ef320214e218e8e6a5a06c36eba815ceda0d4646ee1fe
-
Filesize
13KB
MD5acdc9a57d9b15dc316264b13f500617d
SHA13888ab5ebb9217621728ed86cd68743d102c1b1b
SHA2566a9b9c3a5481846d07acfb69fcb0bf5df7a9d0a6180d9af71af28ea79a507504
SHA5120f78bed591172a2912b65cdb517d7a7e9cec4e837929db6c83165858171ab42f3a960ce4a878e5948140d84e522d45ae90e159c02f123b28153423d4de25b205
-
Filesize
2KB
MD52ae906babf288127cbe267305fb76fec
SHA189d4e536f9c779a69774ffc3333d9ee952f7dfe0
SHA25647de85c9188a4331cb9297bbbc5c10e20a5477a2357b1bf73c821e6e2905242b
SHA512a3ef0052b9cbf3903a3a2b391505a111c3d3c08d02e7cf0f27c891d4f256a40734bbb1878abb7cdbc49882e2e73052cf63ffc1b93104ef75703e052904beeb11
-
Filesize
4KB
MD5a925c4935fd27307eb598a9089e7b201
SHA133cd63fa27b3cdf8dcabde2ae3cfd9bb9da20c4c
SHA25647a0b4960d689267302f292d63f19ad411de8093cab1b5a8dc135ae26df3046c
SHA5124d89a2b27784d485808a7c174f390f3ee5897fd994593591e55083b8b98c3bddd7280a2fab4650fd96480d665d179fcbe3c8b5d96ae4df27b5a294079bc8f991
-
Filesize
12KB
MD5adece402127a599b41dd840e3ab63615
SHA1ebdc6ed3dba0c2bd0a72bf15fc3adb403bed003e
SHA25624914a9c25f74973b3b1767f3db7d7b3ba406398584ac1413bdae91ba4d059cf
SHA5127102c3ad08bfc50a724ed98b7b389f78089c00e47f26032dfa2116355404b5c15bbfcc27fefc040d1474a7feb19704c8433cbff92b1dfc1f4c25e26e28835f76
-
Filesize
2KB
MD56f10c20ce1a28a24914ed585236919f5
SHA13595998476d03baa5ac720b9d43869a43cab1058
SHA2568e7c7e8754836194a8326d027ab278d5115bd9e4558f33a1f873dc3db5ba2115
SHA512c85be02ae5c24f4eec036aa433626cdd61f044dc5c013f3cf3a58301dbd19878977a1df793f4d8491fd5d85119f0b3148bc5ddc1be63c6153a67801da691f4b9
-
Filesize
31KB
MD5b8e294ff5c45da76be22438598d1349f
SHA1311b309ee1a888be191bc51f04aaae9143feb934
SHA256fb0f30c91a06d7acc149ebf2ff318431d1df5efbbd62d08cb1d2176be37f9b47
SHA512dfafbe65fa6cbb85e5667f34d238feac54a7d59da3c501689e3a2982bfa16951671b1872dfc94098aafd30759d040668eaea3bc0b9c6d20ee70cd783290585d8
-
Filesize
4KB
MD530cb918a67d1cb6428be2e4583bc212d
SHA174c608779d6e76b7992268be99c316387658ff5f
SHA2560a688bfe624389d062e7e201ef39f445c426160b031f260234d8ab2a48a74d63
SHA51290ab6abbc57e230622c132ef148fe847d00ddb6c2383736ca8e642ad6a1edf248ce152e6b15142710c62d556d039380d96c71bf37ce7d2f0f71e456d7f33d4a5
-
Filesize
9KB
MD5327078bbebd13ab4c3e1c3bd0bc07f4e
SHA1eba1d1f54e8c716f0cc9ac3740ce771958a389e0
SHA2566a29301047d4e4cf9a9c27d902190f356acc28f2607ba21c659c885a7fc7f08e
SHA5129191ad8fcb6e1c55681e4c38481eee548f73c6b55af1a677bddfd893a47a1b02a2769e793fa7e0e316d390a61fc7f24de4d8d39f43f6cad35ee4ad136493b5fe
-
Filesize
9KB
MD566bf0ff4924abb65957a05417590f347
SHA12badf1422ca9d55c63f6a0fb16605db1a1c23caf
SHA25677783024c40273febae5d71105b59630c34ff686eed7940f73b25e71ac0c0912
SHA512b5d4ed5c180301e9493e4559feca89068c7edc46ed50b84d1790ca82ed4389b29be584b7ca8a98f48322deafec5a9daed3af4335d3d3b18efa625617a9b42fb0
-
Filesize
4KB
MD59633e3cd39c84fb24a36eaab5b8a0680
SHA1119a752acc8c4d18904a250d9675669f2fd33021
SHA2569087840770adde41274027417535471ea4e38dc6439d495cefb5ee3059477fca
SHA512606d869b3a8937df45d3af08c50f2f46cc8219414eb0c4fcbbc9816da7969fb9b29f71b8bd03e9a9bbc3c0155fad8c869e2cc2451893629eaf433bcc826d1fea
-
Filesize
8KB
MD5e7fadd912311db647f8359ca080e0de7
SHA1a638ee959831ad1371a49738dc1b067d8fd585d0
SHA256e5bd25b609ccd63f582e466f68bc63033dc1ffa2970f10b1fe9acd22c026839e
SHA512bf2b564d9b81d2f7938cd1e4229baec24bf9e83138e5dce6a395c1ae25af83f0148fd89d96057c69cef311f3e2351ccce9f0f47239fc80324d96721acc46b589
-
Filesize
3KB
MD5f12e996adbba15d40afd0d7160cd3a3d
SHA1fc204f7b97a231ddda39d2dd02dea67a22e91718
SHA2562a6048ce4eb72f56d3555bd51a6451087162fdcff1f32b3cb20a03feba8eff1d
SHA51246f7dd49b4080449b9345356adb282eca7852e4b4a92b3c6df48df3eb57a174974b49e84a5e65276e9b16fe215a5048fae216921829cc735eb1bdefb6cf05f65
-
Filesize
2KB
MD5bd9c73043a8d291f744dedc6191a7db3
SHA1d00372eff542a516e119a6b9869f62542299b78c
SHA2564772c52ec490cbb2b430409326c3be3f6067e22d25f55beaf1e89a02f78dc3a3
SHA5124da525f765ac79a0cf97fea0fa34ef40c0be366f4b2ab044c77c01022cff62ffef6410dd44e9a0ab0d52b36678de4c6fa84e21fb2b824a68624cee3b4add21d4
-
Filesize
2KB
MD59f0dfeb50c8c6677128cec6486776769
SHA1b40a77c313777313f06d93ef8f6007f2c8b5d7c7
SHA256330322f25879fc022b0b911d320df61e4b45b182c06913671874af263be68671
SHA5128080006368fa405f8794312ba6f243afa2655b6ba619c4b6b9a073846e74018fd4a96d6a9e0ad6f8f25a29ded68c412b6ee4fb324139e08ddfbb18e901a56558
-
Filesize
2KB
MD57c7aa9b4db1211b96e7dad605fd3cfc4
SHA12f55d4509545295aec6f287ce6612d9182c3f10d
SHA25699282632097f5234bb6fcd9fe0b23127313b1703ad14c66c66ba2c5201b6e04b
SHA5121678c7a6344cc385a32d06f8c1377baee153e364221cdfd463718840eb13d4421903471eb1371150e37f85948fcd7378805892947c697f93ee5029b69a6658fa
-
Filesize
3KB
MD5726b762c5bdb6a52ceda429e2c1ede84
SHA1dddc0a7531adfb07085935e4ffdd9f5d74d69c7a
SHA256d6e42d7a75940e9d2587a4efda5b05f3ad1b439298344d5dd68774b4699c6e53
SHA5124dcbfe5ce3f6e41607780f63ccc603e5fd9133d97703b41c15e711aad43d5ba4d18703769911d9a1001b27e13328cafcf6d0b946604cedad3e91222630bbdecf
-
Filesize
4KB
MD5b53b351d192e1e8857b2c5ce21b7fe5a
SHA1570f971af896e62b97dd5077b47e3c896babc197
SHA2560616c7a76b7e28d9b7eab9a371c87bac2f30c34a1adf9855b934afd2726d1997
SHA512e7f3491708ff166a746c6e8a64f403074c0b65dd8fecb0bb25de3854520b76178bd5ba8fbda8530e25fc6768b3c649b315b5177696ca542dcfecf06a8275f806
-
Filesize
133B
MD5c265687716c0746817f413712c4a3941
SHA1169c49a0de6d045405c7b753a6de06927251aedc
SHA25681d8447bc32ee9607af84a76aca066a438c8a92ae8fb701d715870ecd50c6110
SHA5125a26dc7aaa1df0505db311dbadd3458c519b5d6ed15371c511edf84a30556da7863a11b2692019d0c8d04f31237c29915149c6ab6be078a3a4b0f494335feafd
-
Filesize
33KB
MD5f76d3fc9876ac89a22ad85bc35db1b1c
SHA150cf5f45c5674225ee917cee19121ee614fed36b
SHA2561f0703280e60072e07bfc4764f7ceda1736993c2c0072bc4d468a592b8d19a5e
SHA512023c2e8a2a2c452727b0664372fa6ca0441c282fba251c2e226f9cc09cf2e13653aeca29ab4102a5ba9c159b63c351252c1fd263b4da0a7530a0698d5939ab56
-
Filesize
78KB
MD5486b5c1e27e0fa18852b542d12d1139b
SHA1a26d85fb65922c890e1028ea5e647dfebcc6dd66
SHA256273f104fd75c9c0aeec20d38dcb67945dc6b9055351a9fc946e05e18856703f7
SHA51240d6c4a9581a49e6e409a5ddef6ebf0172c1b59551f43aa54dcfae312f5a59a481766721abe9ff8acbcbb1ae08f65c233d7168e675439dd486b8900219ea0c75
-
Filesize
2KB
MD5b14446f45a04edee2ead6aa30b0f7a35
SHA1a23050ec0ec924accb556c4ab99d855c49f2ad9d
SHA256dd383f484f29658d2799eb59a51cea936273f113b0612b912e3b2378900cd732
SHA512f359a588b50b028e3259bb6676e6090504cc6e3df3354b087761a7f51f45198173db3488e8b5d0b31be22a024d8d0bd9315f7b4279007ec0ca66910acf0595ba
-
Filesize
4KB
MD58bde8d3c9b4ac955f3d5e73f6fdc3803
SHA105ddc4d319672b196568c399c3d4350549f1303c
SHA256beef87faaae0f648d4117c7bf01f885a0081fa73d71687ff5b46afe204c55a0a
SHA512c7e9a1387962d7d577de89382875d550234a2abd41a592ac1f12019a41c162407c624d78a0fc88b64efb42c053d9a16e736f03f22da3a075d355f1bab36653f5
-
Filesize
47KB
MD526fba28897f03c2822bb39cc5d9069ee
SHA12bba0cf413064b2e1e9525d6c261ed694af20fa3
SHA256a875c3b04d18f4c0663045384fc012559a94d232cd35e283c1b843c5fbe47fe0
SHA512c44f1af12cc022d1933bb9f0e983658d686ceb421664b73aa5b5dbfca9612b385626fdea7e00c9e19ba844555db9376c74e5fe5147391ee33f957d47f6192e11
-
Filesize
13KB
MD51b04d4aeaeacdfa8902e1498656b4b79
SHA130fbb61208aeaad397417c8e035d7502ae36955b
SHA2561cc4a1dd233fab44459107b8dea10200d9fbd7cf1bc6b325acb92c7b48128bed
SHA5123163b124e6e66ed927838d2c10ba7e610b89f732dfc2d3bf83838a42964dd263afde348ec2dcfeec7627a5fac23ef1cc47cc173cfa0081ac7a8fec4f0dcd255b
-
Filesize
24KB
MD5e624c01c50332d35c8d2d5aa1edd15b0
SHA149dc9979d7a18b693c1dbf539a22aef2fd445f81
SHA2566f7223cd70c2124e55de3992e1e8b9505d86964601ce96363246e75cb5cf4860
SHA5122ce8b483323da788060a985ea4a6c39699b942698ec94d847bc815b6d9b546920a4b2f943172dfbc2455073d2c41a200669f76f19e1936108d0e05109e3fd03b
-
Filesize
38KB
MD5779cd5fe9ad437b6e23c4648270023d9
SHA146483d5af1e6e341f203a5f7d076a7a98cbe17ee
SHA256c44135e201cd58670f5511af271ca5f1d4bf04b1842369535236ab334534e412
SHA512ac18eb4d3d481b0dbc3aaf96cff3d87c7e7edfe04e274837fd6808635c5dede273683a1492e33c3e29e9f972c57dae97aa35a3e2dbdd4e1018f692a962053a14
-
Filesize
7KB
MD55acd3bd5fd5075ee6e197cdce400a306
SHA13327506147dc779a9bd61fc824c8fb7d498b9c1a
SHA256cce32d15f521770cbef065934a12b4e7b56e2ee3dae06daf9e5abf911eb75fbb
SHA512932addf92b4d10c8551b2aee23eba9c7385dc7941f31f464830650553c2750b030a091ed7aa03ce41d25dfb340b5ae5caf4db959a6445c034b1d1e94ef7ce0d1
-
Filesize
21KB
MD5d8897f8275975b8e81a366343707f125
SHA1c854eba57f40014361c08a3769f40ca1baa14340
SHA256ef06c502d16e642370b40d898a8fbedf717aa755eb6aa3988444396ffbc6fa1e
SHA512c6cbfb2d4e6d1b19e425281701717d160d46e2c161ade590c771ab35daa1154db886340ec65906f7a0897c64eb3de288aeda2c300095844ba97ee11889f13b53
-
Filesize
15KB
MD5eb644ad5079690aac259494c41c93252
SHA1b3cf051e1ebb4de6cebb9f8ed6da59e40d257100
SHA256d2d20223e016e1c903e2059ee379936c7a5a9ef02f7d1e610d64a81bcd8495f3
SHA512561ac733ddba13831827e7799dd494d4c7f466712826dbfe3b0e612bcaca72d2c743a9eede7aa2de2e859cfb0805fa869b5ac15973483db3f1e97f204f9b91a6
-
Filesize
20KB
MD5ab29fcefd123729949cf8f6b17a62985
SHA1c9bc2760066cc4f7aab2b24af801acc16e4c3f87
SHA25659897505b3f05843039bb88563c7f2c89412a35f7ffdba2a7459d95dfce5e779
SHA512c0e83072ac08cd497583829c777ec7e75986f76ab132ca3bc510672fbf89d6fa62c56c7f7d220e3d624cd1d693b73fa60a52070364bd18ca3543cca24ada2c2e
-
Filesize
12KB
MD5272e3870fbf62f989ca2c3de83371e10
SHA1a303780393b06dea7a527ff57368c3ca3ec370ba
SHA2560a0669aef11029a8af24276d95620b659470bc1cfd4f42bbc5df22e4e8ed4e0d
SHA512c55548741cc898667f6bd0822541b7497870bf825ae4b460bfd6bc0f4ad2a07ef7458c4040426942bcd7b35cd8b96cded1daa2107582e03600e787b8622f9178
-
Filesize
11KB
MD56709dc129bf8c07bc6147cfd6b76a3a8
SHA1308756396716f6d43566884b0c3393375b1e4e1a
SHA2568153863466fc3680505bd4d047034b794c666dd152b277d5c73bc4a21a403682
SHA512bd57da0a8b5c70a4b77651b91472a9e19ae5807585340341216246bdb5c75327415e67e3f1df2e0dc4bf2154ce7f4263b6b7781f37fbee3e6cbfcaa204c59d4b
-
Filesize
6KB
MD5a62a48c663dd040311943bfd7760abb1
SHA1c6660bc7b9da58ba522ef44d7a5a53a23309d76f
SHA256f68fdaef03d8cb8e90e9149c80d5eed4f047a446c275f835e5203f2bfdfb627a
SHA512df1b3963f4249d4f1bd3acb8178374b28c283c2c921654e15faa583e62cfce3e1a5185080d66a7208274ec539771f4c96c36c40d433002ebdac4b86f70318b23
-
Filesize
22KB
MD5936c8d555872d0be1dc649591c4282d6
SHA15179630d1455aef4e028a329332c3c7f515f3205
SHA256ffb91c4765a9087a1928f0f54ebef5bfa42b8b583fe411c20f82353b79eee2a3
SHA512362d61e1c0d486682dc38348bf8d9f45cf9127d630bccedb3bc35056e15f22e44c7d288bd0fbc1d0e0eacf4cbd8eae2f7b4ee424b8e45e0ab5b7f4b30885b48e
-
Filesize
2KB
MD5487ea25186ffe53af37fd7845092b9e0
SHA12e7584677976874556854d9f4784991d6d92f39e
SHA25684e27d6de74fe21ad4b3dc21acf7e961e14256f6f7d23a360be1d81ad1fc31c0
SHA512fb0edc3b20a82a3f3089140cab2c8dbece3b60ed5cbc13484bfd98ab7d1369099019e2607504ed07d0c4a2754be639b7a9edd35eab14821cc8c05cd3aac3cf1e
-
Filesize
10KB
MD5e1494f66d50b28e0400b55c7a513392e
SHA130fdb9a69a0ab384db24d0cc56033a3a08484483
SHA2569d2a6f2173ed6c8d9c1b0e5cdbab09e2a43323721f1ec87856d9527adaa54a34
SHA51214bb2dee3cc25d28a196f63f9c2763fef0d1553e92834456c6b4cfbb01dfa9058f56cd1428cbe48473019696626e92d7e04e66fc3d9290639a4cfa5975367c2b
-
Filesize
219B
MD5091551e297a3dbf3975caa46beff031e
SHA15612a3cce71724d13cbcc2512fa7f0f5c68fc219
SHA256bddc250c04d45781689ec18e5612f1340fdd19a2ddd0f11da2541c3a5960873e
SHA512a4511609dd35fa74a9d63c53c5765c3889b2d305ef650833c14891292b0f4fb73ace8b6ddb3867d5af839d6a58668ed009aef2254362d02ab2660fc83c9fc030
-
Filesize
1KB
MD524c3b349272d633aa061141597b54d0d
SHA1de31ddf63e9c2f362c1ba9d8514e67ba238f5ded
SHA2562a7e33ef2101d0455ce5ee00aa271451387b513a5941ef68d65cbd01f447fc22
SHA512b50114027e2487a1ae99c30c8a9a44978e6a580a61f3e1466dcc10e69ca7c4145780593d03b2c069822d73ca038aa50d5f4d10606114add23ade263c2f3bfb2e
-
Filesize
135B
MD525029d7faf2d1963ebfec8254413a894
SHA18a1958ca6d628975d24347231bcc7690161b24e9
SHA256280098db3c0a312d6a2e718d589b6eade44d5c76807cc75500faec28b270ee4d
SHA512caa6ac796ec2b4224af51798a51805916318d767fb1e30539aaa0d4e7457ede5f6f73258619cc93e3cb3e72b41c4556cd5e2853144320d0b373bb3d93f2dfbc7
-
Filesize
28KB
MD503758809708c8d56d8b4a13e6505dd19
SHA1be1812588cca7f73afce05ae941795377fca603f
SHA25634b5d0f35b0194dbf53e5faa1697f0024dcbfb249a6becee58fcfa2b758a2cbe
SHA5126d8b2b0fb246601eaac73a29039ac80c8a97effb07997087391547531b0c8095362ee8e48033a99c7ceee1e1681c0d59dab31c7fbe690aea7d58133753ab0300
-
Filesize
88KB
MD5e701f0e774d880e1ffe3a3ba564f3fe4
SHA1b04e0775aacb6ba2433188fc0fe5621b0b138488
SHA256996b2f8a13f0f6372649ad43899f655d151c8ea49b5abe87892ad9d53481da5c
SHA5126efeddde085af009ad9a7aae0ffd9f94ad8346b60ec4b0a7695aaeb77a6b8fa2cd86928756ed4d9e46118a2b1dd2dcc37f354b8aa69a086780d3f0bdec14eb0e
-
Filesize
4KB
MD51b18c8d1c0984dfc1b1f605be855c555
SHA1d4b59056b4eb7ac04b1ed1bc19c97ea850a88181
SHA25604c35a2b3f8ac770ce7d79b2194403465e15fd60dc76bab7225c326bad71b231
SHA51264acdf58a18ac26d54a9ce31db0e7d790e81cb4b15078546277dd13fa8c0a53f998b64c9670ee22ac662b86d4f81433dbed8748cfe35776324ccc0e5fe242956
-
Filesize
14KB
MD5eb824fcd3aacb6ead6cd49ce8501462f
SHA11786540e45015650a77c8fe15180ef2821d0db8f
SHA25607b7cd1eb25e540b24280df27344449f066834d5db55d5600f002fe2a5a639a6
SHA512d09aa5e879de436ca3f6f138738f49af184e4e835991a819170bb89e59ecdd7c6ef07089c7143743a4b3643f9cf3c1098ee5bb54e8f5196191377faeba6001cd
-
Filesize
1.9MB
MD5cf9d0a637dc41042810cd1af053a5ccb
SHA1ca981b2cd6f0fbc7fbb9db7d9ac0393f34123120
SHA2562d81831a38b5960c9654084d9b506ce94ea010f46c895a7950569b40cf741631
SHA512a26ebc12b96d4edf33631c404ceb93dd92bab0ccd710c31418d7cda4f873a2b44719d6047a17b6266f1e79548f8e6ebcb2ab894e1463f54455dad2d7b878908d
-
Filesize
26KB
MD5791173117312b172dad16dc2fa243af3
SHA1df806e55515ef78d85ff19e67ef8b84b04c3efbd
SHA2561726a15e2d71fc957f07b0ba1c0dad8449de3f017906f7a735ea2295bad425f9
SHA512461a8d31120500c4f81f14352164c62200a4d00ff1e51c5319676b3b798fd44f3631ddb41d21a5cbf2adb2c90e4919f18c7e80d1d06a08b156857ee82b8ed026
-
Filesize
26KB
MD5791173117312b172dad16dc2fa243af3
SHA1df806e55515ef78d85ff19e67ef8b84b04c3efbd
SHA2561726a15e2d71fc957f07b0ba1c0dad8449de3f017906f7a735ea2295bad425f9
SHA512461a8d31120500c4f81f14352164c62200a4d00ff1e51c5319676b3b798fd44f3631ddb41d21a5cbf2adb2c90e4919f18c7e80d1d06a08b156857ee82b8ed026
-
Filesize
46KB
MD52bd09d2f01e8d048465df1d6dc6310f0
SHA1975db1ef5ce954d41d79ad5a1c33253f74e49d5f
SHA25696eaffdd87581dc36b9f2f7f9ad8607a2f218c188907a419546aa423d4f9a83a
SHA5129b9ea47dd76562ce1708450aed22e37f1efb6244d96d30fe3c413670ed3ff2fcfd286f61075cd2e7a80a3ad6d0c87b8a86f39d8f9104b5d42d2d6ca04b239970
-
Filesize
406B
MD50e5598b0a72bf83378056ae52be6eda4
SHA1c27b2e60a6cd846ae87b071ac5de83534b3e3465
SHA256a5e82a65d71e6d5509edf809b310e6f0ee714dd0973c7fc625203a4689e78fbc
SHA51258a52919309bbfbcc6b0ea2d331b90c4b8fbd7b2898a6b9b68ce1f9fa486bcfe1930ade67810236459c47855236ff563a40021e1c1f364fb37ddc013fbf9391c
-
Filesize
39KB
MD5bd2e769663704bb169688cecca40a13e
SHA19072f1810912d741d1ad6857700335c68a1c2607
SHA256676bd4bd1f425a49b8483f87185a67c9e3093b681dc6d838e0fdd56a1813b078
SHA5128ddf5be7a643bc968e70adf3907f60ebaf4c4859a1288a0c1f1e6dd9f7a8664cdeadb153a7d2ad66b39ee7045185212a8fd47f183f595d9841a80c17b777b67c
-
Filesize
39KB
MD5bd2e769663704bb169688cecca40a13e
SHA19072f1810912d741d1ad6857700335c68a1c2607
SHA256676bd4bd1f425a49b8483f87185a67c9e3093b681dc6d838e0fdd56a1813b078
SHA5128ddf5be7a643bc968e70adf3907f60ebaf4c4859a1288a0c1f1e6dd9f7a8664cdeadb153a7d2ad66b39ee7045185212a8fd47f183f595d9841a80c17b777b67c
-
Filesize
1.9MB
MD5cf9d0a637dc41042810cd1af053a5ccb
SHA1ca981b2cd6f0fbc7fbb9db7d9ac0393f34123120
SHA2562d81831a38b5960c9654084d9b506ce94ea010f46c895a7950569b40cf741631
SHA512a26ebc12b96d4edf33631c404ceb93dd92bab0ccd710c31418d7cda4f873a2b44719d6047a17b6266f1e79548f8e6ebcb2ab894e1463f54455dad2d7b878908d