Analysis
-
max time kernel
146s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
PurchaseOrder202319876.exe
Resource
win7-20230220-en
General
-
Target
PurchaseOrder202319876.exe
-
Size
1.5MB
-
MD5
9b2f59561115406e4be61403a0add295
-
SHA1
3068c0d984638b73a75f568cb49557543c344b59
-
SHA256
9644c370f8d029005b9ab653ab47487d24fcd626abb3f34157e2fe31e617edc4
-
SHA512
47f9b8352c0f75decbdd3734ae1916cdcd1720406b442f5210166e703585b12edafad569a7f687c8c66741aa786a6319e382aa95c83580ced345768dbd3ab939
-
SSDEEP
24576:jQ3UElRshsEyPyG7cYYKLTl8+oyVryispex6Cn1rwUMpuPpowgbeazV32JNBJOmB:s3UElq6EyPF6KLJlBxscfrwVuPpyzmh/
Malware Config
Extracted
darkcloud
https://api.telegram.org/bot5955632087:AAGbHX-YygFpBeOiEaTfH9CY-2MMNrZcY48/sendMessage?chat_id=865011046
Signatures
-
Executes dropped EXE 45 IoCs
pid Process 460 Process not Found 1108 alg.exe 292 aspnet_state.exe 1372 mscorsvw.exe 1992 mscorsvw.exe 676 mscorsvw.exe 1588 mscorsvw.exe 1060 dllhost.exe 1752 ehRecvr.exe 1812 ehsched.exe 868 elevation_service.exe 2000 IEEtwCollector.exe 1876 GROOVE.EXE 1044 maintenanceservice.exe 2100 mscorsvw.exe 2228 msdtc.exe 2340 msiexec.exe 2488 mscorsvw.exe 2648 OSE.EXE 2660 mscorsvw.exe 2820 OSPPSVC.EXE 2976 perfhost.exe 3004 locator.exe 1484 snmptrap.exe 2096 mscorsvw.exe 2256 mscorsvw.exe 2388 mscorsvw.exe 2572 mscorsvw.exe 2544 vds.exe 2600 mscorsvw.exe 940 mscorsvw.exe 2892 vssvc.exe 2984 mscorsvw.exe 2204 wbengine.exe 2144 mscorsvw.exe 2352 mscorsvw.exe 2256 WmiApSrv.exe 2756 wmpnetwk.exe 2596 mscorsvw.exe 2864 mscorsvw.exe 2032 mscorsvw.exe 1404 SearchIndexer.exe 2216 mscorsvw.exe 1196 mscorsvw.exe 2956 mscorsvw.exe -
Loads dropped DLL 16 IoCs
pid Process 460 Process not Found 460 Process not Found 460 Process not Found 460 Process not Found 460 Process not Found 460 Process not Found 460 Process not Found 460 Process not Found 2340 msiexec.exe 460 Process not Found 460 Process not Found 460 Process not Found 460 Process not Found 460 Process not Found 460 Process not Found 752 Process not Found -
Drops file in System32 directory 17 IoCs
description ioc Process File opened for modification C:\Windows\system32\fxssvc.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\system32\msiexec.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\System32\snmptrap.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\System32\alg.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\system32\dllhost.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE File opened for modification C:\Windows\SysWow64\perfhost.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\62c612237693df14.bin alg.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\System32\msdtc.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\System32\vds.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\system32\locator.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\system32\vssvc.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\system32\wbengine.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\system32\SearchIndexer.exe PurchaseOrder202319876.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1692 set thread context of 1480 1692 PurchaseOrder202319876.exe 28 -
Drops file in Program Files directory 27 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\iexplore.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe PurchaseOrder202319876.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE PurchaseOrder202319876.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE PurchaseOrder202319876.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\7-Zip\7z.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE PurchaseOrder202319876.exe File opened for modification C:\Program Files\7-Zip\7zG.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe PurchaseOrder202319876.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe PurchaseOrder202319876.exe -
Drops file in Windows directory 28 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe PurchaseOrder202319876.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\ehome\ehsched.exe PurchaseOrder202319876.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe PurchaseOrder202319876.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe PurchaseOrder202319876.exe File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{2672BBF0-393E-4523-A499-E1A842FD1961}.crmlog dllhost.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{2672BBF0-393E-4523-A499-E1A842FD1961}.crmlog dllhost.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe PurchaseOrder202319876.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Modifies data under HKEY_USERS 30 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings GROOVE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogInitialPageCount = "16" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CommitMaxCheckPointPageCount = "7" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CriticalLowDiskSpace = "1073741824" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthQuantumSeconds = "180" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheWaitForSize = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpClientsCount = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogMinJobWaitTimeMs = "3000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\ShadowFileMaxClients = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileDiscontinuitiesPerSecond = "20" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileInlineGrowthQuantumSeconds = "30" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheLongPageCount = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheHashTableSize = "67" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogMaxJobDemoteTimeMs = "5000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpRecWaitForCounts = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CommitMaxCheckPoitnRateMs = "10000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheShortPageCount = "64" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\SwagBitsPerSecond = "19922944" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthBudgetMs = "45000" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform OSPPSVC.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform\VLRenewalSchedule = 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 OSPPSVC.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpRecCount = "32" ehRec.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1480 PurchaseOrder202319876.exe Token: SeShutdownPrivilege 676 mscorsvw.exe Token: SeShutdownPrivilege 1588 mscorsvw.exe Token: 33 1804 EhTray.exe Token: SeIncBasePriorityPrivilege 1804 EhTray.exe Token: SeShutdownPrivilege 676 mscorsvw.exe Token: SeShutdownPrivilege 1588 mscorsvw.exe Token: SeShutdownPrivilege 676 mscorsvw.exe Token: SeShutdownPrivilege 676 mscorsvw.exe Token: SeShutdownPrivilege 1588 mscorsvw.exe Token: SeShutdownPrivilege 1588 mscorsvw.exe Token: 33 1804 EhTray.exe Token: SeIncBasePriorityPrivilege 1804 EhTray.exe Token: SeRestorePrivilege 2340 msiexec.exe Token: SeTakeOwnershipPrivilege 2340 msiexec.exe Token: SeSecurityPrivilege 2340 msiexec.exe Token: SeBackupPrivilege 2892 vssvc.exe Token: SeRestorePrivilege 2892 vssvc.exe Token: SeAuditPrivilege 2892 vssvc.exe Token: SeBackupPrivilege 2204 wbengine.exe Token: SeRestorePrivilege 2204 wbengine.exe Token: SeSecurityPrivilege 2204 wbengine.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1804 EhTray.exe 1804 EhTray.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1804 EhTray.exe 1804 EhTray.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1480 PurchaseOrder202319876.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1480 1692 PurchaseOrder202319876.exe 28 PID 1692 wrote to memory of 1480 1692 PurchaseOrder202319876.exe 28 PID 1692 wrote to memory of 1480 1692 PurchaseOrder202319876.exe 28 PID 1692 wrote to memory of 1480 1692 PurchaseOrder202319876.exe 28 PID 1692 wrote to memory of 1480 1692 PurchaseOrder202319876.exe 28 PID 1692 wrote to memory of 1480 1692 PurchaseOrder202319876.exe 28 PID 1692 wrote to memory of 1480 1692 PurchaseOrder202319876.exe 28 PID 1692 wrote to memory of 1480 1692 PurchaseOrder202319876.exe 28 PID 1692 wrote to memory of 1480 1692 PurchaseOrder202319876.exe 28 PID 676 wrote to memory of 2100 676 mscorsvw.exe 44 PID 676 wrote to memory of 2100 676 mscorsvw.exe 44 PID 676 wrote to memory of 2100 676 mscorsvw.exe 44 PID 676 wrote to memory of 2100 676 mscorsvw.exe 44 PID 676 wrote to memory of 2488 676 mscorsvw.exe 47 PID 676 wrote to memory of 2488 676 mscorsvw.exe 47 PID 676 wrote to memory of 2488 676 mscorsvw.exe 47 PID 676 wrote to memory of 2488 676 mscorsvw.exe 47 PID 676 wrote to memory of 2660 676 mscorsvw.exe 49 PID 676 wrote to memory of 2660 676 mscorsvw.exe 49 PID 676 wrote to memory of 2660 676 mscorsvw.exe 49 PID 676 wrote to memory of 2660 676 mscorsvw.exe 49 PID 676 wrote to memory of 2096 676 mscorsvw.exe 54 PID 676 wrote to memory of 2096 676 mscorsvw.exe 54 PID 676 wrote to memory of 2096 676 mscorsvw.exe 54 PID 676 wrote to memory of 2096 676 mscorsvw.exe 54 PID 676 wrote to memory of 2256 676 mscorsvw.exe 55 PID 676 wrote to memory of 2256 676 mscorsvw.exe 55 PID 676 wrote to memory of 2256 676 mscorsvw.exe 55 PID 676 wrote to memory of 2256 676 mscorsvw.exe 55 PID 676 wrote to memory of 2388 676 mscorsvw.exe 56 PID 676 wrote to memory of 2388 676 mscorsvw.exe 56 PID 676 wrote to memory of 2388 676 mscorsvw.exe 56 PID 676 wrote to memory of 2388 676 mscorsvw.exe 56 PID 676 wrote to memory of 2572 676 mscorsvw.exe 57 PID 676 wrote to memory of 2572 676 mscorsvw.exe 57 PID 676 wrote to memory of 2572 676 mscorsvw.exe 57 PID 676 wrote to memory of 2572 676 mscorsvw.exe 57 PID 676 wrote to memory of 2600 676 mscorsvw.exe 59 PID 676 wrote to memory of 2600 676 mscorsvw.exe 59 PID 676 wrote to memory of 2600 676 mscorsvw.exe 59 PID 676 wrote to memory of 2600 676 mscorsvw.exe 59 PID 676 wrote to memory of 940 676 mscorsvw.exe 60 PID 676 wrote to memory of 940 676 mscorsvw.exe 60 PID 676 wrote to memory of 940 676 mscorsvw.exe 60 PID 676 wrote to memory of 940 676 mscorsvw.exe 60 PID 676 wrote to memory of 2984 676 mscorsvw.exe 62 PID 676 wrote to memory of 2984 676 mscorsvw.exe 62 PID 676 wrote to memory of 2984 676 mscorsvw.exe 62 PID 676 wrote to memory of 2984 676 mscorsvw.exe 62 PID 676 wrote to memory of 2144 676 mscorsvw.exe 64 PID 676 wrote to memory of 2144 676 mscorsvw.exe 64 PID 676 wrote to memory of 2144 676 mscorsvw.exe 64 PID 676 wrote to memory of 2144 676 mscorsvw.exe 64 PID 676 wrote to memory of 2352 676 mscorsvw.exe 65 PID 676 wrote to memory of 2352 676 mscorsvw.exe 65 PID 676 wrote to memory of 2352 676 mscorsvw.exe 65 PID 676 wrote to memory of 2352 676 mscorsvw.exe 65 PID 676 wrote to memory of 2596 676 mscorsvw.exe 68 PID 676 wrote to memory of 2596 676 mscorsvw.exe 68 PID 676 wrote to memory of 2596 676 mscorsvw.exe 68 PID 676 wrote to memory of 2596 676 mscorsvw.exe 68 PID 676 wrote to memory of 2864 676 mscorsvw.exe 69 PID 676 wrote to memory of 2864 676 mscorsvw.exe 69 PID 676 wrote to memory of 2864 676 mscorsvw.exe 69 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\PurchaseOrder202319876.exe"C:\Users\Admin\AppData\Local\Temp\PurchaseOrder202319876.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\PurchaseOrder202319876.exe"C:\Users\Admin\AppData\Local\Temp\PurchaseOrder202319876.exe"2⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1480
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1108
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:292
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1372
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1992
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2100
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2488
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 254 -NGENProcess 25c -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 254 -NGENProcess 248 -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2096
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 264 -NGENProcess 25c -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2256
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 250 -NGENProcess 1d4 -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2388
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 254 -NGENProcess 26c -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2572
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 26c -NGENProcess 244 -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2600
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 244 -NGENProcess 1d4 -Pipe 274 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:940
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 278 -NGENProcess 248 -Pipe 260 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2984
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1f0 -NGENProcess 26c -Pipe 24c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2144
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 25c -NGENProcess 278 -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2352
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 244 -NGENProcess 284 -Pipe 1f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 250 -NGENProcess 290 -Pipe 1d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2864
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 288 -NGENProcess 284 -Pipe 23c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2032
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 294 -NGENProcess 244 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2216
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 298 -NGENProcess 250 -Pipe 294 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1196
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 290 -NGENProcess 2a0 -Pipe 28c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2956
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1060
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1752
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:1812
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1804
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:868
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵
- Modifies data under HKEY_USERS
PID:300
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:2000
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1876
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1044
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2228
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2648
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2820
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:2976
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:3004
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:1484
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:2544
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:2256
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵
- Executes dropped EXE
PID:2756
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3499517378-2376672570-1134980332-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3499517378-2376672570-1134980332-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"2⤵PID:1472
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD53ae61280b56a3328ec4c00ab4d1bfe81
SHA1172c5927a9dbfbd499f646282ae5a6670c3fa274
SHA256b8d8c6bab3e23ea0372f1fab257ed728d5e3d56240a1ddf80d745baa79dddfac
SHA512439bc99d48408715ddf35b277c19dcbf8a70309cad1414ddcc25af90fa0fc445f96f16f4055f98120557105d03df3509e7b4c93dfeedca407a97bd96ad5737f2
-
Filesize
30.1MB
MD58771aec70c52c7d9d418153aa003a9d6
SHA1cc3cb51ac73544006f246a4705d8287b35d8576f
SHA256371af9448e5ae90b594ee1631aff1fb276898f05fa544cca87dd022f84414302
SHA5128def9ed2773d726f1a180331f6d293f345703097bd007413dfca38a1eac7467963688caaa04e14421264d8fd57af73858a4467c26a7559d9081f2a9433e2bed5
-
Filesize
1.4MB
MD56b795a30ea9bc0d0d7b653f162185f53
SHA12ad9e7ab859f837609d9ff38dfd91d766463b20e
SHA256e2134538f7972e4cceb0cdf9dfbf9ce18ce609839954dd9afd710610fba913d0
SHA5123ec0260fa65b94f3222afb514c8172c8b3826019f2c503c3c2d746ec7d80f8a7d7e598acf50a77b15355396fdd9afa13c795a2f13d3d84b45cca0acaad4ff4ee
-
Filesize
5.2MB
MD506d60dd3099e3c0c4b20b1465078239b
SHA18f5a275447250db3a8a80a7f27eb057dda068182
SHA25648150aba9660509d39773783c87bdcfde1e8fd7c005633bf381d5432d5d6577d
SHA512de06930560f92f243b9648ed01d92543fd50bb8e3e005b5ae7a2a6a6ece067c470c462cc11efde91ddc384b364d83b8b4559e698fd546c0decb239b6679545b6
-
Filesize
2.1MB
MD5ea279ae8801daa7279c909094c4c8a24
SHA12b1441272627e0f5e536e8c4aae333cc24908649
SHA2560996903550a167e89ba49811d1d885c77a7bb354d858cf5c3e31b6797dfd106d
SHA51223e42cac940619d645bb09769993b9e5b317df047fe34409ab15fcfdf6f0eabfae1209800ba143ab0f4cc88eb17a58daf95215fb8d7fe7cb0476364307e3bca5
-
Filesize
2.0MB
MD521dca6522200ba77afdf6baaf22e0970
SHA1a9b750b76835f38329646aed491f90826d6150b6
SHA25653ec4eb28287cc8300ca037d203514fc7e176756c4933b897c10852bcc135fab
SHA5122e7faac56540fb7dc49eea6aa310d001ab22daabf86010f26df6e8f21834b0cf0c005957257768b19b049ffeae40f8d10d072ed30f357c59f3cd3d9a6d393d4c
-
Filesize
1024KB
MD5d29973db8cc9986b245bce0a21d3fa5b
SHA1591fb6a0f026503992e830a354f44b4a9692a401
SHA256cd6ea3a57abbed894ce5e6ce51f0132238e09fb13a624d17898a9e92323fdf6c
SHA5129e7a605768eefaf8e254c2b26bc985becec0888d5403203bc8ae39220ac684e22d2b217eea0e5ab7a2588b7bf0ec73e4381239cbec50522f0ae3cbcea97194d0
-
Filesize
1.3MB
MD53ab7d9bdb5d44457a91b9625ab3af79d
SHA1ad65c8ce408cb1cb071f016ce89f38440ec11036
SHA25658e8ab2641a31bad15f0e6a8a3b1cb231bff96296727bbee7d1253cbc678a255
SHA51224ed8ddad24f85f25c0ea28ea1bd80051c100f6d0903c261fcfe8c438a5d2494a2960c0590a4cdb85d1fd6a1c192ee2b1f7556680d1efed93a0ebd57a428b73c
-
Filesize
1.3MB
MD53ab7d9bdb5d44457a91b9625ab3af79d
SHA1ad65c8ce408cb1cb071f016ce89f38440ec11036
SHA25658e8ab2641a31bad15f0e6a8a3b1cb231bff96296727bbee7d1253cbc678a255
SHA51224ed8ddad24f85f25c0ea28ea1bd80051c100f6d0903c261fcfe8c438a5d2494a2960c0590a4cdb85d1fd6a1c192ee2b1f7556680d1efed93a0ebd57a428b73c
-
Filesize
872KB
MD545ef03c0bcb998089ed623c100345a3f
SHA1e23cd6dd0bf54e48325e89c9bc17a82d72d51cda
SHA256900ce66186bd5a8956f0ff66495b47cefbad32ba1d50de406baf2b91440e0232
SHA51269462a7c76f3fc56b530c764f86636c84bab88a1f36f032605c1fe29bf8be41aff0ed7838660ae11bfa99f76dafd8794541b4b59d4cad55b6f6ed64c9f54cdd1
-
Filesize
1.3MB
MD50abe4aeece2bcda397cfcc6358d3f8a9
SHA1069770cef7eafe9a7eb880d1c53b9998f7524542
SHA256a675b6f2eac92fec155bff43a8f0fa8bd20e37ecfb2921935e57158cf4cf2535
SHA512ce0a19e905ec0634a0f56f64fafdc441219f868f3d04a144ac61d6943cb0b82bef1c8dbe636c36d29b9da708fdbbdc523aa2109463a176b948f9eac2902305ee
-
Filesize
1.3MB
MD51062aaf2b0abcc82c9b58abfee03d634
SHA15f7dd8cb33b184b227d459f363778696a83575e3
SHA2569632b64da9605969de739272de1eec06c2f46d3d37cf6ae7007074337b7f2b68
SHA512ca52a401304889aae7b0750ccd827d0370d0f8cc1f12a0916b98f45f34b7384c02a62297ff6c8b91b2f6d35e6ef808e979e761cedeff79944864784cfe35a388
-
Filesize
1.3MB
MD51062aaf2b0abcc82c9b58abfee03d634
SHA15f7dd8cb33b184b227d459f363778696a83575e3
SHA2569632b64da9605969de739272de1eec06c2f46d3d37cf6ae7007074337b7f2b68
SHA512ca52a401304889aae7b0750ccd827d0370d0f8cc1f12a0916b98f45f34b7384c02a62297ff6c8b91b2f6d35e6ef808e979e761cedeff79944864784cfe35a388
-
Filesize
1.3MB
MD5fe258552771a94911953693311c83197
SHA15ac08cc8d41513e7eea1422a64a4e3868613e3cd
SHA25644de01b9afbb866e6b74869e05b78582bf019da985d259426fe1008215bdb361
SHA512ab2b8231f0371e4ccab877d8f89c90ee9923763982f07d9a3626529559eac7ab95af533be7020bd6e7be9e0c841bcaa728e463770b218c287dfb8133feb3b52e
-
Filesize
1.3MB
MD5fe258552771a94911953693311c83197
SHA15ac08cc8d41513e7eea1422a64a4e3868613e3cd
SHA25644de01b9afbb866e6b74869e05b78582bf019da985d259426fe1008215bdb361
SHA512ab2b8231f0371e4ccab877d8f89c90ee9923763982f07d9a3626529559eac7ab95af533be7020bd6e7be9e0c841bcaa728e463770b218c287dfb8133feb3b52e
-
Filesize
1003KB
MD505a3932aeb6b02c98e3c3b2a0f3603bf
SHA1ea3d0731eb555f432fbfe5bb532ad8f2c683b683
SHA256f042e44f5c950d78cf2912fcfdd9c8356d97042847cb8a6b16725cda1a597fde
SHA512782421f339e89a09c06895fd2084ef58f0ede90cdda636739b91a47df0760a39f4efff0417f331969e9e72143ffa93cf0a7aa9c050446e9ce31cc19772b885f6
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.3MB
MD5f83e6b76c20fb75d27082af715159359
SHA14e3b6da35ac1e63ef05632fed961ba0d21555404
SHA25651848cd13f77ddfab1b75f93fc921df2ac7e71d08dd72895dc974f56359459fe
SHA512764b28991dd6b1125574286c11efb8c8b7ae1596219e59dad90b90540b3ded845dc45b7532ea91da39032b1b1e752b006d67849600a856a872ad8fd990977ab7
-
Filesize
1.2MB
MD5e6ae6c672c25e217549380f5c5e2b3c4
SHA10cb25f57fc977e1e2e5d55262799df593398a3a3
SHA256c3679b355a12c0194dcbb2e0ff2f8cfe0576d8549307ffccd5706331a59b03ab
SHA512bd85584243a57fa3a52fa80b54149c8f06907400a3ea064cf79d1dc9d909b394c96a8bc7fe2ac3f11ea2748f66864b2abeae4f33292fcea274404e442f4c3eb4
-
Filesize
1.2MB
MD5744d70d2fe94933a36a92a84750c675d
SHA1812602a60f4e9a6362ecb8a533579c518b4e930c
SHA256dbf5f197b49adb496b65804ae5893d325e666d7658c13d3f7c2c6a4299055605
SHA512ec4b5f76d2cf9415a00723968ec803d9312526ab46427f01557b7c5c6d81e2be11f1182030c47f48731ea00357bbc9b48bb6c3e6458e193c97a3a19e1914387c
-
Filesize
1.1MB
MD50c96b4dbecf4bea1875f7655be46fde7
SHA1837f060204c4f5fea5c0f0989fa95ed5483f70ef
SHA2567c31b8f48eb918f2a2c2d1888499126230a4ee6a0fe2c4f10dc132a0d2a8dfb3
SHA5127a959bb13f1b832448c7006cd02d1a6ecff46d5de7ad13d021b637f5d548682faeca33f0a20f980d854dd37c699f27c96baeaafc527553870ef7057500c8bdf5
-
Filesize
2.1MB
MD536bdafaaaf3c3e76addc97eea58875de
SHA17e945f2b225fb2fa43e08bd70bad3f6444d1727e
SHA2567789fe98a7a636388b259773ab2ad10b606de19d7cb3825b9d39e6383869faef
SHA51280f4c3ee1335343d76b6fc7c450eea5952b66b9428f319fcef3055bfcde2e7e52145b3f51d1563bbbceb989acb879a0b7a1c346700996a8b04b6e55d65c7970a
-
Filesize
1.3MB
MD5cce90c9e6a9cf5bdd49a9332d036501a
SHA170ab5d8fb3951d7219d4b92a8db657e25dce3866
SHA256c4d9a73315ce742ff3eabcf02635fa47d222949b003cea201b248429a8a89742
SHA512743fff3cc5353306e8957ee82d93dc5f4a228df303203dbe059fea80a9a9aa41e2c5e510c79ef2dcd75aeec99fb43d93b81dff13ad2122912144195fddc714c7
-
Filesize
1.2MB
MD5cae9ff749bf3be7ac6152d94d3bf0085
SHA1fc2c6dfb1ed3a8413504da2ae655bce7ec20dc96
SHA256be81d58b1a8a7e002ecff9d335fd79a9d0767f2b2072f99cdadf6ce4ccda7e00
SHA5123067b5ee3966b6a6a05aedada93946419b26fb3acd12ef4d4b50142c194a4dcc67a96847aed27cc6c4aec4269ed8c60a044e315fbf129134e91aa875f6f97cdf
-
Filesize
1.3MB
MD518b8a18f1e505da21f38e7b8832e595a
SHA11172f896f1c607584acb811019f87654905e5cc8
SHA256c02b16e080573b18626f7e8fbdc44ec96528eb08151493b514534a55b204f316
SHA5128410d4106233d0df9d261702c44865c209cdcb4f2c59396b43e8927ef82168e0d3aeedc427191e588da9683947530c4ba7761991359ba6403fc589e82544434d
-
Filesize
1.4MB
MD59853800b56b72761888dd39513f65a80
SHA1fdaaadf9f7d7ba5edcf2b2542b5072adf66e1e22
SHA256bbc768a5c672a15db722d29ed263ab56d66fdc20021d2a78a664ec9b989c419b
SHA512a8f62ef8efd4ec6f5457b674c11ed6576af1b505970e6255570aa7f6017b0c3deacb45dad030d280684b347e827c1a02b2d3724c2dcc4a0b00b244eb71b71854
-
Filesize
1.3MB
MD5c98a6d8284136d30aacbc97961fd78da
SHA1ab65b0a47340bd1c4cbc193b07e1a8443e84474a
SHA2560fa380905a70bd0d852b115837fd0a191c5bd721f5da0d36ce38a5882606a537
SHA512b51763d0b7377fb5ba750f42056eb906805f8b350a9247c4fd3a79ffcdec039473612fca8fb7af0c868efb7b5c8872455c456d8b5d85d0b27aa3fb7738e0319b
-
Filesize
1.2MB
MD5c4842f3f6c84892d322e5fe95ac9ced9
SHA1a0591bb57c85997e4dc970282caa9ce890ffa01a
SHA25677fc681d00b3fa8311d53516fb8ad982c15adbba4cda2aa484c4624b269224c5
SHA512d2d02aa431b7429167d544a19ed5a2a90de6ab6d8986f20092d3abefb66fea3d1ea25d59a659781d24317d75164b68b6cb621f9ef7fa216ea63be3d30f3f7a98
-
Filesize
1.7MB
MD5231184bc9cee6ca723dd9e12107c4074
SHA1380a8b47a8842fb1a4849e35d8e9a2b76b7822ee
SHA256c14a0617f232d08a191c50bdb27528ffe087097428c23e8d1a77550ef6600bde
SHA512d6d5f2543c20c4e95aa78edef3dad7a6be473093ce0e2e57cfba4bd2eddc3c38f3aaf61f241377a47f0a83fa89222fee19d51f3f45ac29b1bc25f255977450b5
-
Filesize
1.4MB
MD5c48623d8da3d701a83da2b484cb8e373
SHA1e4adfbcd92d0c15adff6c24b0fd7b52d099abbb3
SHA25667470fb148caa506e7332c86a62e4eab85841a45138aa842ae9d82113d7ff7cd
SHA512fe6b3117c7fb08f6b3121dca30489b0ff9d6fa5fb0def60a42abf003401d8989f2310e9ec56532e91b4581722fecf8de7036761a61c060c57de4dc3ac296f345
-
Filesize
2.0MB
MD5781ede5827b76115f8a03f940782cb7f
SHA1d1640d8e9d27cd09bfcd8c32efed1e2b52003f28
SHA2564c1117c8f182d9dddc3be9d7705a612bfa76efd0a2422e4766775400eeac5136
SHA512fcdc09c7b877e5d9228ab49d02e7e2ec8efecda260bdc40b5644330e627fa958dddfa6bc2197a67bd559d5bda3d32c6abd7f8c58ac020215a5cc3ba0695958c4
-
Filesize
1.2MB
MD5b79f53a68e37da9c5a8d9002fe593ac0
SHA139b6234b3fe7cf1b29c23c946dbaafacbc9e1527
SHA256a97f4684f8eca8ad113699c8b128095a127723da8719df3d751d046f8f9984ca
SHA51208cfa3740d06956a59d2257b31a0e11fae0032cdf58c83d1e8cbcf118a935a6debe92e00789228835beb22f8f320fd4af3889577afd1a3137507f2eb556e384f
-
Filesize
1.3MB
MD522abc2af5a8b1bb7744d99bf31d44d6d
SHA1c17eeb4b1c0ac03f44533b4d20f8003d7f82e1de
SHA25680f9388904eb34d1589164ccee41edb68a64aa50dbdb55b96501a5aa3fd34e76
SHA512d0d519922268321b62abc072f44170b224d8f630eb0b77a439bc40742679e9547341cd8ae039991e047a70e5604af906803fc4cd15a26c08ae1f36738661ffb5
-
Filesize
1.3MB
MD5c98a6d8284136d30aacbc97961fd78da
SHA1ab65b0a47340bd1c4cbc193b07e1a8443e84474a
SHA2560fa380905a70bd0d852b115837fd0a191c5bd721f5da0d36ce38a5882606a537
SHA512b51763d0b7377fb5ba750f42056eb906805f8b350a9247c4fd3a79ffcdec039473612fca8fb7af0c868efb7b5c8872455c456d8b5d85d0b27aa3fb7738e0319b
-
Filesize
2.0MB
MD521dca6522200ba77afdf6baaf22e0970
SHA1a9b750b76835f38329646aed491f90826d6150b6
SHA25653ec4eb28287cc8300ca037d203514fc7e176756c4933b897c10852bcc135fab
SHA5122e7faac56540fb7dc49eea6aa310d001ab22daabf86010f26df6e8f21834b0cf0c005957257768b19b049ffeae40f8d10d072ed30f357c59f3cd3d9a6d393d4c
-
Filesize
2.0MB
MD521dca6522200ba77afdf6baaf22e0970
SHA1a9b750b76835f38329646aed491f90826d6150b6
SHA25653ec4eb28287cc8300ca037d203514fc7e176756c4933b897c10852bcc135fab
SHA5122e7faac56540fb7dc49eea6aa310d001ab22daabf86010f26df6e8f21834b0cf0c005957257768b19b049ffeae40f8d10d072ed30f357c59f3cd3d9a6d393d4c
-
Filesize
1.3MB
MD53ab7d9bdb5d44457a91b9625ab3af79d
SHA1ad65c8ce408cb1cb071f016ce89f38440ec11036
SHA25658e8ab2641a31bad15f0e6a8a3b1cb231bff96296727bbee7d1253cbc678a255
SHA51224ed8ddad24f85f25c0ea28ea1bd80051c100f6d0903c261fcfe8c438a5d2494a2960c0590a4cdb85d1fd6a1c192ee2b1f7556680d1efed93a0ebd57a428b73c
-
Filesize
1.3MB
MD50abe4aeece2bcda397cfcc6358d3f8a9
SHA1069770cef7eafe9a7eb880d1c53b9998f7524542
SHA256a675b6f2eac92fec155bff43a8f0fa8bd20e37ecfb2921935e57158cf4cf2535
SHA512ce0a19e905ec0634a0f56f64fafdc441219f868f3d04a144ac61d6943cb0b82bef1c8dbe636c36d29b9da708fdbbdc523aa2109463a176b948f9eac2902305ee
-
Filesize
1.2MB
MD5744d70d2fe94933a36a92a84750c675d
SHA1812602a60f4e9a6362ecb8a533579c518b4e930c
SHA256dbf5f197b49adb496b65804ae5893d325e666d7658c13d3f7c2c6a4299055605
SHA512ec4b5f76d2cf9415a00723968ec803d9312526ab46427f01557b7c5c6d81e2be11f1182030c47f48731ea00357bbc9b48bb6c3e6458e193c97a3a19e1914387c
-
Filesize
1.3MB
MD5cce90c9e6a9cf5bdd49a9332d036501a
SHA170ab5d8fb3951d7219d4b92a8db657e25dce3866
SHA256c4d9a73315ce742ff3eabcf02635fa47d222949b003cea201b248429a8a89742
SHA512743fff3cc5353306e8957ee82d93dc5f4a228df303203dbe059fea80a9a9aa41e2c5e510c79ef2dcd75aeec99fb43d93b81dff13ad2122912144195fddc714c7
-
Filesize
1.2MB
MD5cae9ff749bf3be7ac6152d94d3bf0085
SHA1fc2c6dfb1ed3a8413504da2ae655bce7ec20dc96
SHA256be81d58b1a8a7e002ecff9d335fd79a9d0767f2b2072f99cdadf6ce4ccda7e00
SHA5123067b5ee3966b6a6a05aedada93946419b26fb3acd12ef4d4b50142c194a4dcc67a96847aed27cc6c4aec4269ed8c60a044e315fbf129134e91aa875f6f97cdf
-
Filesize
1.3MB
MD518b8a18f1e505da21f38e7b8832e595a
SHA11172f896f1c607584acb811019f87654905e5cc8
SHA256c02b16e080573b18626f7e8fbdc44ec96528eb08151493b514534a55b204f316
SHA5128410d4106233d0df9d261702c44865c209cdcb4f2c59396b43e8927ef82168e0d3aeedc427191e588da9683947530c4ba7761991359ba6403fc589e82544434d
-
Filesize
1.4MB
MD59853800b56b72761888dd39513f65a80
SHA1fdaaadf9f7d7ba5edcf2b2542b5072adf66e1e22
SHA256bbc768a5c672a15db722d29ed263ab56d66fdc20021d2a78a664ec9b989c419b
SHA512a8f62ef8efd4ec6f5457b674c11ed6576af1b505970e6255570aa7f6017b0c3deacb45dad030d280684b347e827c1a02b2d3724c2dcc4a0b00b244eb71b71854
-
Filesize
1.3MB
MD5c98a6d8284136d30aacbc97961fd78da
SHA1ab65b0a47340bd1c4cbc193b07e1a8443e84474a
SHA2560fa380905a70bd0d852b115837fd0a191c5bd721f5da0d36ce38a5882606a537
SHA512b51763d0b7377fb5ba750f42056eb906805f8b350a9247c4fd3a79ffcdec039473612fca8fb7af0c868efb7b5c8872455c456d8b5d85d0b27aa3fb7738e0319b
-
Filesize
1.3MB
MD5c98a6d8284136d30aacbc97961fd78da
SHA1ab65b0a47340bd1c4cbc193b07e1a8443e84474a
SHA2560fa380905a70bd0d852b115837fd0a191c5bd721f5da0d36ce38a5882606a537
SHA512b51763d0b7377fb5ba750f42056eb906805f8b350a9247c4fd3a79ffcdec039473612fca8fb7af0c868efb7b5c8872455c456d8b5d85d0b27aa3fb7738e0319b
-
Filesize
1.2MB
MD5c4842f3f6c84892d322e5fe95ac9ced9
SHA1a0591bb57c85997e4dc970282caa9ce890ffa01a
SHA25677fc681d00b3fa8311d53516fb8ad982c15adbba4cda2aa484c4624b269224c5
SHA512d2d02aa431b7429167d544a19ed5a2a90de6ab6d8986f20092d3abefb66fea3d1ea25d59a659781d24317d75164b68b6cb621f9ef7fa216ea63be3d30f3f7a98
-
Filesize
1.7MB
MD5231184bc9cee6ca723dd9e12107c4074
SHA1380a8b47a8842fb1a4849e35d8e9a2b76b7822ee
SHA256c14a0617f232d08a191c50bdb27528ffe087097428c23e8d1a77550ef6600bde
SHA512d6d5f2543c20c4e95aa78edef3dad7a6be473093ce0e2e57cfba4bd2eddc3c38f3aaf61f241377a47f0a83fa89222fee19d51f3f45ac29b1bc25f255977450b5
-
Filesize
1.4MB
MD5c48623d8da3d701a83da2b484cb8e373
SHA1e4adfbcd92d0c15adff6c24b0fd7b52d099abbb3
SHA25667470fb148caa506e7332c86a62e4eab85841a45138aa842ae9d82113d7ff7cd
SHA512fe6b3117c7fb08f6b3121dca30489b0ff9d6fa5fb0def60a42abf003401d8989f2310e9ec56532e91b4581722fecf8de7036761a61c060c57de4dc3ac296f345
-
Filesize
2.0MB
MD5781ede5827b76115f8a03f940782cb7f
SHA1d1640d8e9d27cd09bfcd8c32efed1e2b52003f28
SHA2564c1117c8f182d9dddc3be9d7705a612bfa76efd0a2422e4766775400eeac5136
SHA512fcdc09c7b877e5d9228ab49d02e7e2ec8efecda260bdc40b5644330e627fa958dddfa6bc2197a67bd559d5bda3d32c6abd7f8c58ac020215a5cc3ba0695958c4
-
Filesize
1.2MB
MD5b79f53a68e37da9c5a8d9002fe593ac0
SHA139b6234b3fe7cf1b29c23c946dbaafacbc9e1527
SHA256a97f4684f8eca8ad113699c8b128095a127723da8719df3d751d046f8f9984ca
SHA51208cfa3740d06956a59d2257b31a0e11fae0032cdf58c83d1e8cbcf118a935a6debe92e00789228835beb22f8f320fd4af3889577afd1a3137507f2eb556e384f
-
Filesize
1.3MB
MD522abc2af5a8b1bb7744d99bf31d44d6d
SHA1c17eeb4b1c0ac03f44533b4d20f8003d7f82e1de
SHA25680f9388904eb34d1589164ccee41edb68a64aa50dbdb55b96501a5aa3fd34e76
SHA512d0d519922268321b62abc072f44170b224d8f630eb0b77a439bc40742679e9547341cd8ae039991e047a70e5604af906803fc4cd15a26c08ae1f36738661ffb5