Analysis
-
max time kernel
91s -
max time network
79s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
27/06/2023, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
Hugin-2022.0.0-win64.msi
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Hugin-2022.0.0-win64.msi
Resource
win10v2004-20230621-en
General
-
Target
Hugin-2022.0.0-win64.msi
-
Size
37.3MB
-
MD5
2ebfc0e55d1174a259c97a68464d5e46
-
SHA1
ab5f5198a945031122698406a4cd4aa72745a81c
-
SHA256
2edbe698562fb1e963ac5b19a3c42ed80caf6ac9f81d59d5e4c359205b6e84ec
-
SHA512
0bcf02b0186be06015819ec594c0b08d3a8eb420e6cfbc47415932fd133e9b3988d7aca3e45b24d24359a7b8e1d6b16b54092abdbace8872f59ba0cfe036c20b
-
SSDEEP
786432:wqycrigt4X6Y4znyUZClJQpQg8Yclvr58DLFQKZXbVGyO1Al:wqRt46NnyxIi1lvr58DBQoboml
Malware Config
Signatures
-
Loads dropped DLL 64 IoCs
pid Process 648 MsiExec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Drops file in System32 directory 30 IoCs
description ioc Process File opened for modification C:\Windows\system32\msvcp140_codecvt_ids.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140_codecvt_ids.dll msiexec.exe File created C:\Windows\system32\msvcp140.dll msiexec.exe File created C:\Windows\system32\vcruntime140_1.dll msiexec.exe File opened for modification C:\Windows\system32\vcruntime140.dll msiexec.exe File opened for modification C:\Windows\system32\vcruntime140_1.dll msiexec.exe File opened for modification C:\Windows\system32\vcomp140.dll msiexec.exe File opened for modification C:\Windows\system32\vcruntime140.dll msiexec.exe File created C:\Windows\system32\msvcp140_1.dll msiexec.exe File created C:\Windows\system32\msvcp140_atomic_wait.dll msiexec.exe File opened for modification C:\Windows\system32\vccorlib140.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140_1.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140_2.dll msiexec.exe File opened for modification C:\Windows\system32\concrt140.dll msiexec.exe File opened for modification C:\Windows\system32\vccorlib140.dll msiexec.exe File created C:\Windows\system32\vcruntime140.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140_1.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140_atomic_wait.dll msiexec.exe File opened for modification C:\Windows\system32\vcomp140.dll msiexec.exe File created C:\Windows\system32\vcomp140.dll msiexec.exe File opened for modification C:\Windows\system32\concrt140.dll msiexec.exe File created C:\Windows\system32\concrt140.dll msiexec.exe File created C:\Windows\system32\msvcp140_codecvt_ids.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140_2.dll msiexec.exe File opened for modification C:\Windows\system32\vcruntime140_1.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140_atomic_wait.dll msiexec.exe File created C:\Windows\system32\vccorlib140.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140.dll msiexec.exe File created C:\Windows\system32\msvcp140_2.dll msiexec.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Hugin\doc\panotools\PTblender.readme msiexec.exe File created C:\Program Files\Hugin\share\hugin\data\celeste.model msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\hugin_small.png msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\ptbatcher.png msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\optimize_photo_panel.xrc msiexec.exe File created C:\Program Files\Hugin\bin\enblend.exe msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\import_raw_dialog.xrc msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\info.png msiexec.exe File created C:\Program Files\Hugin\share\locale\ro\LC_MESSAGES\hugin.mo msiexec.exe File created C:\Program Files\Hugin\bin\OpenEXR-3_1.dll msiexec.exe File created C:\Program Files\Hugin\bin\huginbasewx.dll msiexec.exe File created C:\Program Files\Hugin\bin\PTuncrop.exe msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\logo.png msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\splash.png msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\images_panel.xrc msiexec.exe File created C:\Program Files\Hugin\bin\fulla.exe msiexec.exe File created C:\Program Files\Hugin\bin\pto_var.exe msiexec.exe File created C:\Program Files\Hugin\doc\executor_file_format.txt msiexec.exe File created C:\Program Files\Hugin\doc\panotools\COPYING msiexec.exe File created C:\Program Files\Hugin\share\hugin\data\assistant\stacked.assistant msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\hugin_help_en_EN.chm msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\main_menu.xrc msiexec.exe File created C:\Program Files\Hugin\share\locale\de\LC_MESSAGES\hugin.mo msiexec.exe File created C:\Program Files\Hugin\bin\hugin_lensdb.exe msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\redo.png msiexec.exe File created C:\Program Files\Hugin\bin\pto_move.exe msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\start.png msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\number1.png msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\cp_editor_panel.xrc msiexec.exe File created C:\Program Files\Hugin\share\hugin\data\assistant\multirow.assistant msiexec.exe File created C:\Program Files\Hugin\share\locale\sv\LC_MESSAGES\hugin.mo msiexec.exe File created C:\Program Files\Hugin\bin\cpclean.exe msiexec.exe File created C:\Program Files\Hugin\share\hugin\data\hugin_exiftool_copy.arg msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\cp_list_frame.xrc msiexec.exe File created C:\Program Files\Hugin\bin\geocpset.exe msiexec.exe File created C:\Program Files\Hugin\bin\pano13.dll msiexec.exe File created C:\Program Files\Hugin\share\hugin\data\assistant\scanned.assistant msiexec.exe File created C:\Program Files\Hugin\share\hugin\data\output\median_stack.executor msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\output_blended_fused.png msiexec.exe File created C:\Program Files\Hugin\bin\deghosting_mask.exe msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\identify_tool_small.png msiexec.exe File created C:\Program Files\Hugin\share\locale\ru\LC_MESSAGES\hugin.mo msiexec.exe File created C:\Program Files\Hugin\doc\panotools\README msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\crop_tool_small.png msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\preview_layout.png msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\ptbatcher_pause.ico msiexec.exe File created C:\Program Files\Hugin\bin\hugin.exe msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\pause.png msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\tips.txt msiexec.exe File created C:\Program Files\Hugin\share\locale\es\LC_MESSAGES\hugin.mo msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\autocrop_tool.png msiexec.exe File created C:\Program Files\Hugin\bin\pto_template.exe msiexec.exe File created C:\Program Files\Hugin\doc\panotools\PTmender.readme msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\filenew.png msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\preview_show_all.png msiexec.exe File created C:\Program Files\Hugin\bin\libexpat.dll msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\about.htm msiexec.exe File created C:\Program Files\Hugin\bin\hugin_stacker.exe msiexec.exe File created C:\Program Files\Hugin\bin\OpenEXRCore-3_1.dll msiexec.exe File created C:\Program Files\Hugin\share\hugin\xrc\data\ptbatcher.ico msiexec.exe File created C:\Program Files\Hugin\bin\glew32.dll msiexec.exe File created C:\Program Files\Hugin\bin\nona.exe msiexec.exe File created C:\Program Files\Hugin\bin\PTmender.exe msiexec.exe File created C:\Program Files\Hugin\bin\pto_gen.exe msiexec.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\Installer\6cf6fd.msi msiexec.exe File created C:\Windows\Installer\6cf6fe.ipi msiexec.exe File created C:\Windows\Installer\{DF29440A-B9A6-427A-A203-574343E909D5}\ProductIcon.ico msiexec.exe File created C:\Windows\Installer\6cf70a.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\6cf6fd.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI2E71.tmp msiexec.exe File opened for modification C:\Windows\Installer\{DF29440A-B9A6-427A-A203-574343E909D5}\ProductIcon.ico msiexec.exe File opened for modification C:\Windows\Installer\6cf6fe.ipi msiexec.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe -
Modifies registry class 42 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hugin.ptofile\shell\open\command\ = "\"C:\\Program Files\\Hugin\\bin\\hugin.exe\" \"%1\"" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hugin.ptofile\shell\stitch\ = "Stitch" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hugin.ptofile\shell\stitch\command\ = "\"C:\\Program Files\\Hugin\\bin\\PTBatcherGUI.exe\" \"%1\"" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.pto\ = "Hugin.ptofile" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Hugin.ptofile msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\A04492FD6A9BA7242A307534349E905D\VCRedist = "ProductFeature" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hugin.ptofile\shell msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\A04492FD6A9BA7242A307534349E905D\ProductFeature msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\SourceList\Net msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hugin.ptofile\shell\open\ = "Open" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\.pto msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\PackageCode = "EAB1E7B8E53CD784996AE28941A01E91" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\Version = "336986112" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Hugin.ptofile\shell\open msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hugin.ptofile\ = "Hugin pto file" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hugin.ptofile\DefaultIcon\ = "\"C:\\Program Files\\Hugin\\share\\hugin\\xrc\\data\\pto_icon.ico\"" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\BEFE58B1348F6C94083D5A930B533D91 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.pto\Content Type = "application/x-ptoptimizer-script" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Hugin.ptofile\DefaultIcon msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\ProductName = "Hugin" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\SourceList\PackageName = "Hugin-2022.0.0-win64.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hugin.ptofile msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Hugin.ptofile\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hugin.ptofile\shell\open msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\BEFE58B1348F6C94083D5A930B533D91\A04492FD6A9BA7242A307534349E905D msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\A04492FD6A9BA7242A307534349E905D msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Hugin.ptofile\shell\stitch\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A04492FD6A9BA7242A307534349E905D\ProductIcon = "C:\\Windows\\Installer\\{DF29440A-B9A6-427A-A203-574343E909D5}\\ProductIcon.ico" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Hugin.ptofile\shell\stitch msiexec.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe 1636 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1704 msiexec.exe Token: SeIncreaseQuotaPrivilege 1704 msiexec.exe Token: SeRestorePrivilege 1636 msiexec.exe Token: SeTakeOwnershipPrivilege 1636 msiexec.exe Token: SeSecurityPrivilege 1636 msiexec.exe Token: SeCreateTokenPrivilege 1704 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1704 msiexec.exe Token: SeLockMemoryPrivilege 1704 msiexec.exe Token: SeIncreaseQuotaPrivilege 1704 msiexec.exe Token: SeMachineAccountPrivilege 1704 msiexec.exe Token: SeTcbPrivilege 1704 msiexec.exe Token: SeSecurityPrivilege 1704 msiexec.exe Token: SeTakeOwnershipPrivilege 1704 msiexec.exe Token: SeLoadDriverPrivilege 1704 msiexec.exe Token: SeSystemProfilePrivilege 1704 msiexec.exe Token: SeSystemtimePrivilege 1704 msiexec.exe Token: SeProfSingleProcessPrivilege 1704 msiexec.exe Token: SeIncBasePriorityPrivilege 1704 msiexec.exe Token: SeCreatePagefilePrivilege 1704 msiexec.exe Token: SeCreatePermanentPrivilege 1704 msiexec.exe Token: SeBackupPrivilege 1704 msiexec.exe Token: SeRestorePrivilege 1704 msiexec.exe Token: SeShutdownPrivilege 1704 msiexec.exe Token: SeDebugPrivilege 1704 msiexec.exe Token: SeAuditPrivilege 1704 msiexec.exe Token: SeSystemEnvironmentPrivilege 1704 msiexec.exe Token: SeChangeNotifyPrivilege 1704 msiexec.exe Token: SeRemoteShutdownPrivilege 1704 msiexec.exe Token: SeUndockPrivilege 1704 msiexec.exe Token: SeSyncAgentPrivilege 1704 msiexec.exe Token: SeEnableDelegationPrivilege 1704 msiexec.exe Token: SeManageVolumePrivilege 1704 msiexec.exe Token: SeImpersonatePrivilege 1704 msiexec.exe Token: SeCreateGlobalPrivilege 1704 msiexec.exe Token: SeCreateTokenPrivilege 1704 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1704 msiexec.exe Token: SeLockMemoryPrivilege 1704 msiexec.exe Token: SeIncreaseQuotaPrivilege 1704 msiexec.exe Token: SeMachineAccountPrivilege 1704 msiexec.exe Token: SeTcbPrivilege 1704 msiexec.exe Token: SeSecurityPrivilege 1704 msiexec.exe Token: SeTakeOwnershipPrivilege 1704 msiexec.exe Token: SeLoadDriverPrivilege 1704 msiexec.exe Token: SeSystemProfilePrivilege 1704 msiexec.exe Token: SeSystemtimePrivilege 1704 msiexec.exe Token: SeProfSingleProcessPrivilege 1704 msiexec.exe Token: SeIncBasePriorityPrivilege 1704 msiexec.exe Token: SeCreatePagefilePrivilege 1704 msiexec.exe Token: SeCreatePermanentPrivilege 1704 msiexec.exe Token: SeBackupPrivilege 1704 msiexec.exe Token: SeRestorePrivilege 1704 msiexec.exe Token: SeShutdownPrivilege 1704 msiexec.exe Token: SeDebugPrivilege 1704 msiexec.exe Token: SeAuditPrivilege 1704 msiexec.exe Token: SeSystemEnvironmentPrivilege 1704 msiexec.exe Token: SeChangeNotifyPrivilege 1704 msiexec.exe Token: SeRemoteShutdownPrivilege 1704 msiexec.exe Token: SeUndockPrivilege 1704 msiexec.exe Token: SeSyncAgentPrivilege 1704 msiexec.exe Token: SeEnableDelegationPrivilege 1704 msiexec.exe Token: SeManageVolumePrivilege 1704 msiexec.exe Token: SeImpersonatePrivilege 1704 msiexec.exe Token: SeCreateGlobalPrivilege 1704 msiexec.exe Token: SeCreateTokenPrivilege 1704 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1636 wrote to memory of 648 1636 msiexec.exe 28 PID 1636 wrote to memory of 648 1636 msiexec.exe 28 PID 1636 wrote to memory of 648 1636 msiexec.exe 28 PID 1636 wrote to memory of 648 1636 msiexec.exe 28 PID 1636 wrote to memory of 648 1636 msiexec.exe 28 PID 1636 wrote to memory of 648 1636 msiexec.exe 28 PID 1636 wrote to memory of 648 1636 msiexec.exe 28 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Hugin-2022.0.0-win64.msi1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1704
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4EDB7174DC0FDB3486C276C4FC009DDC C2⤵
- Loads dropped DLL
PID:648
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1880
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004A0" "0000000000000060"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5565930a453abb5f9cbd88d3a9d2fc113
SHA16630bad8a534c9abc52b7655e0aec47cd8b5d3bd
SHA256b147f4b7bb8bd26d5433e9764c0bd9ff7885a6c0b549c5245a13af9f477e9bd5
SHA51232eb76c4d482340581020a1b947efc4741ea89e87681579269c2c35a534ce01e75bd02e5c8d1ede25a5edf322c3d8a99dbd3bf1bba3e128b34c8104cdacf3535
-
Filesize
168KB
MD559751103028559e7e6c0bd5b05769a6c
SHA1c533cd5a151c78fc12e597f3b8d9919fb6246907
SHA2564fa3984d8d5e0b79fc5d311da09aa6c95d26797db04db7c0afd8ba7c56ece0a9
SHA5121f877fe720dd59caec6a957c11067317d3924b4289088a173de2e29105be8e07f1377e9dc260d53e44b5e28cbc9bcef93136bb118d34acf79c1b3558f5a25948
-
Filesize
113KB
MD54fdd16752561cf585fed1506914d73e0
SHA1f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424
SHA256aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7
SHA5123695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600
-
Filesize
37.3MB
MD52ebfc0e55d1174a259c97a68464d5e46
SHA1ab5f5198a945031122698406a4cd4aa72745a81c
SHA2562edbe698562fb1e963ac5b19a3c42ed80caf6ac9f81d59d5e4c359205b6e84ec
SHA5120bcf02b0186be06015819ec594c0b08d3a8eb420e6cfbc47415932fd133e9b3988d7aca3e45b24d24359a7b8e1d6b16b54092abdbace8872f59ba0cfe036c20b
-
Filesize
113KB
MD54fdd16752561cf585fed1506914d73e0
SHA1f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424
SHA256aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7
SHA5123695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600
-
Filesize
308KB
MD50b42ac3aff1633b0d7edb9fdf5e4ecd6
SHA12ca2129c8bbcbabc4e21368a6f9acf59a64d33fe
SHA2565b757f98a5f3e4ab8b944067c12bec9d67a80aa31c7de702b15dbd199dd602ed
SHA512afc8942f002ec2958eafebbbeb4b30c47c3e286c387322c4be8839b56f9a1621d556d8cb93caee6ece8bcbd1b99c96972a562b758080c183c27762b5a2acbee7
-
Filesize
308KB
MD50b42ac3aff1633b0d7edb9fdf5e4ecd6
SHA12ca2129c8bbcbabc4e21368a6f9acf59a64d33fe
SHA2565b757f98a5f3e4ab8b944067c12bec9d67a80aa31c7de702b15dbd199dd602ed
SHA512afc8942f002ec2958eafebbbeb4b30c47c3e286c387322c4be8839b56f9a1621d556d8cb93caee6ece8bcbd1b99c96972a562b758080c183c27762b5a2acbee7
-
Filesize
308KB
MD50b42ac3aff1633b0d7edb9fdf5e4ecd6
SHA12ca2129c8bbcbabc4e21368a6f9acf59a64d33fe
SHA2565b757f98a5f3e4ab8b944067c12bec9d67a80aa31c7de702b15dbd199dd602ed
SHA512afc8942f002ec2958eafebbbeb4b30c47c3e286c387322c4be8839b56f9a1621d556d8cb93caee6ece8bcbd1b99c96972a562b758080c183c27762b5a2acbee7
-
Filesize
308KB
MD50b42ac3aff1633b0d7edb9fdf5e4ecd6
SHA12ca2129c8bbcbabc4e21368a6f9acf59a64d33fe
SHA2565b757f98a5f3e4ab8b944067c12bec9d67a80aa31c7de702b15dbd199dd602ed
SHA512afc8942f002ec2958eafebbbeb4b30c47c3e286c387322c4be8839b56f9a1621d556d8cb93caee6ece8bcbd1b99c96972a562b758080c183c27762b5a2acbee7
-
Filesize
308KB
MD50b42ac3aff1633b0d7edb9fdf5e4ecd6
SHA12ca2129c8bbcbabc4e21368a6f9acf59a64d33fe
SHA2565b757f98a5f3e4ab8b944067c12bec9d67a80aa31c7de702b15dbd199dd602ed
SHA512afc8942f002ec2958eafebbbeb4b30c47c3e286c387322c4be8839b56f9a1621d556d8cb93caee6ece8bcbd1b99c96972a562b758080c183c27762b5a2acbee7
-
Filesize
308KB
MD50b42ac3aff1633b0d7edb9fdf5e4ecd6
SHA12ca2129c8bbcbabc4e21368a6f9acf59a64d33fe
SHA2565b757f98a5f3e4ab8b944067c12bec9d67a80aa31c7de702b15dbd199dd602ed
SHA512afc8942f002ec2958eafebbbeb4b30c47c3e286c387322c4be8839b56f9a1621d556d8cb93caee6ece8bcbd1b99c96972a562b758080c183c27762b5a2acbee7
-
Filesize
308KB
MD50b42ac3aff1633b0d7edb9fdf5e4ecd6
SHA12ca2129c8bbcbabc4e21368a6f9acf59a64d33fe
SHA2565b757f98a5f3e4ab8b944067c12bec9d67a80aa31c7de702b15dbd199dd602ed
SHA512afc8942f002ec2958eafebbbeb4b30c47c3e286c387322c4be8839b56f9a1621d556d8cb93caee6ece8bcbd1b99c96972a562b758080c183c27762b5a2acbee7
-
Filesize
308KB
MD50b42ac3aff1633b0d7edb9fdf5e4ecd6
SHA12ca2129c8bbcbabc4e21368a6f9acf59a64d33fe
SHA2565b757f98a5f3e4ab8b944067c12bec9d67a80aa31c7de702b15dbd199dd602ed
SHA512afc8942f002ec2958eafebbbeb4b30c47c3e286c387322c4be8839b56f9a1621d556d8cb93caee6ece8bcbd1b99c96972a562b758080c183c27762b5a2acbee7
-
Filesize
554KB
MD5c7a693fcffcb6c245282d1132e38ac5b
SHA18965f69c938eecb2226ad7329a9df5109d93cb8c
SHA256a8102891d06b5f21c35c67e4ab26eb84f54405b67e67eaf75dadc62cef08b55a
SHA512321456ae04eb392734a0aba27e965500467d58dc1277fc550b6573916607ba53c686db05219ce326fb3f9289cc4430b85990362f630e4a7829345067986ca6d2
-
Filesize
554KB
MD5c7a693fcffcb6c245282d1132e38ac5b
SHA18965f69c938eecb2226ad7329a9df5109d93cb8c
SHA256a8102891d06b5f21c35c67e4ab26eb84f54405b67e67eaf75dadc62cef08b55a
SHA512321456ae04eb392734a0aba27e965500467d58dc1277fc550b6573916607ba53c686db05219ce326fb3f9289cc4430b85990362f630e4a7829345067986ca6d2
-
Filesize
554KB
MD5c7a693fcffcb6c245282d1132e38ac5b
SHA18965f69c938eecb2226ad7329a9df5109d93cb8c
SHA256a8102891d06b5f21c35c67e4ab26eb84f54405b67e67eaf75dadc62cef08b55a
SHA512321456ae04eb392734a0aba27e965500467d58dc1277fc550b6573916607ba53c686db05219ce326fb3f9289cc4430b85990362f630e4a7829345067986ca6d2
-
Filesize
554KB
MD5c7a693fcffcb6c245282d1132e38ac5b
SHA18965f69c938eecb2226ad7329a9df5109d93cb8c
SHA256a8102891d06b5f21c35c67e4ab26eb84f54405b67e67eaf75dadc62cef08b55a
SHA512321456ae04eb392734a0aba27e965500467d58dc1277fc550b6573916607ba53c686db05219ce326fb3f9289cc4430b85990362f630e4a7829345067986ca6d2
-
Filesize
554KB
MD5c7a693fcffcb6c245282d1132e38ac5b
SHA18965f69c938eecb2226ad7329a9df5109d93cb8c
SHA256a8102891d06b5f21c35c67e4ab26eb84f54405b67e67eaf75dadc62cef08b55a
SHA512321456ae04eb392734a0aba27e965500467d58dc1277fc550b6573916607ba53c686db05219ce326fb3f9289cc4430b85990362f630e4a7829345067986ca6d2
-
Filesize
554KB
MD5c7a693fcffcb6c245282d1132e38ac5b
SHA18965f69c938eecb2226ad7329a9df5109d93cb8c
SHA256a8102891d06b5f21c35c67e4ab26eb84f54405b67e67eaf75dadc62cef08b55a
SHA512321456ae04eb392734a0aba27e965500467d58dc1277fc550b6573916607ba53c686db05219ce326fb3f9289cc4430b85990362f630e4a7829345067986ca6d2
-
Filesize
23KB
MD51dd99e6af2a3540646178c6cff4bb1a3
SHA1e6ee44e1757eeefcaeec0a8b59bf26924ba7115e
SHA2563b863fdbaf3d8743f49f9582c7424abe82874859752c89a5dbfe410682e0df21
SHA51277f52f97263cb596e3acddeec96462e5c7d037efb3c99d88799e195fed971e85faf765b02a44049296e41bb7a61485201fb39675cca926f5bc0ed9713facfac8
-
Filesize
23KB
MD51dd99e6af2a3540646178c6cff4bb1a3
SHA1e6ee44e1757eeefcaeec0a8b59bf26924ba7115e
SHA2563b863fdbaf3d8743f49f9582c7424abe82874859752c89a5dbfe410682e0df21
SHA51277f52f97263cb596e3acddeec96462e5c7d037efb3c99d88799e195fed971e85faf765b02a44049296e41bb7a61485201fb39675cca926f5bc0ed9713facfac8
-
Filesize
23KB
MD51dd99e6af2a3540646178c6cff4bb1a3
SHA1e6ee44e1757eeefcaeec0a8b59bf26924ba7115e
SHA2563b863fdbaf3d8743f49f9582c7424abe82874859752c89a5dbfe410682e0df21
SHA51277f52f97263cb596e3acddeec96462e5c7d037efb3c99d88799e195fed971e85faf765b02a44049296e41bb7a61485201fb39675cca926f5bc0ed9713facfac8
-
Filesize
23KB
MD51dd99e6af2a3540646178c6cff4bb1a3
SHA1e6ee44e1757eeefcaeec0a8b59bf26924ba7115e
SHA2563b863fdbaf3d8743f49f9582c7424abe82874859752c89a5dbfe410682e0df21
SHA51277f52f97263cb596e3acddeec96462e5c7d037efb3c99d88799e195fed971e85faf765b02a44049296e41bb7a61485201fb39675cca926f5bc0ed9713facfac8
-
Filesize
23KB
MD51dd99e6af2a3540646178c6cff4bb1a3
SHA1e6ee44e1757eeefcaeec0a8b59bf26924ba7115e
SHA2563b863fdbaf3d8743f49f9582c7424abe82874859752c89a5dbfe410682e0df21
SHA51277f52f97263cb596e3acddeec96462e5c7d037efb3c99d88799e195fed971e85faf765b02a44049296e41bb7a61485201fb39675cca926f5bc0ed9713facfac8
-
Filesize
23KB
MD51dd99e6af2a3540646178c6cff4bb1a3
SHA1e6ee44e1757eeefcaeec0a8b59bf26924ba7115e
SHA2563b863fdbaf3d8743f49f9582c7424abe82874859752c89a5dbfe410682e0df21
SHA51277f52f97263cb596e3acddeec96462e5c7d037efb3c99d88799e195fed971e85faf765b02a44049296e41bb7a61485201fb39675cca926f5bc0ed9713facfac8
-
Filesize
181KB
MD54e15ae636bda43111ce456ae0f28c535
SHA1c84ef65fbc8fafa30cf5963658e9bd05f6ed1944
SHA2565bda82dffa3e617808bc32c00918bcde8e6a4ee7648bc362a477549c86dec907
SHA512244eeaf63af0e87395bf4e1bb1bf752b4501450b3cf172debe8844aa94cf77ccd1906d3c2faf9ed8c1827eb4be3ad4f2486276e44a9987e872ac026d57df46b6
-
Filesize
181KB
MD54e15ae636bda43111ce456ae0f28c535
SHA1c84ef65fbc8fafa30cf5963658e9bd05f6ed1944
SHA2565bda82dffa3e617808bc32c00918bcde8e6a4ee7648bc362a477549c86dec907
SHA512244eeaf63af0e87395bf4e1bb1bf752b4501450b3cf172debe8844aa94cf77ccd1906d3c2faf9ed8c1827eb4be3ad4f2486276e44a9987e872ac026d57df46b6
-
Filesize
181KB
MD54e15ae636bda43111ce456ae0f28c535
SHA1c84ef65fbc8fafa30cf5963658e9bd05f6ed1944
SHA2565bda82dffa3e617808bc32c00918bcde8e6a4ee7648bc362a477549c86dec907
SHA512244eeaf63af0e87395bf4e1bb1bf752b4501450b3cf172debe8844aa94cf77ccd1906d3c2faf9ed8c1827eb4be3ad4f2486276e44a9987e872ac026d57df46b6
-
Filesize
181KB
MD54e15ae636bda43111ce456ae0f28c535
SHA1c84ef65fbc8fafa30cf5963658e9bd05f6ed1944
SHA2565bda82dffa3e617808bc32c00918bcde8e6a4ee7648bc362a477549c86dec907
SHA512244eeaf63af0e87395bf4e1bb1bf752b4501450b3cf172debe8844aa94cf77ccd1906d3c2faf9ed8c1827eb4be3ad4f2486276e44a9987e872ac026d57df46b6
-
Filesize
181KB
MD54e15ae636bda43111ce456ae0f28c535
SHA1c84ef65fbc8fafa30cf5963658e9bd05f6ed1944
SHA2565bda82dffa3e617808bc32c00918bcde8e6a4ee7648bc362a477549c86dec907
SHA512244eeaf63af0e87395bf4e1bb1bf752b4501450b3cf172debe8844aa94cf77ccd1906d3c2faf9ed8c1827eb4be3ad4f2486276e44a9987e872ac026d57df46b6
-
Filesize
181KB
MD54e15ae636bda43111ce456ae0f28c535
SHA1c84ef65fbc8fafa30cf5963658e9bd05f6ed1944
SHA2565bda82dffa3e617808bc32c00918bcde8e6a4ee7648bc362a477549c86dec907
SHA512244eeaf63af0e87395bf4e1bb1bf752b4501450b3cf172debe8844aa94cf77ccd1906d3c2faf9ed8c1827eb4be3ad4f2486276e44a9987e872ac026d57df46b6
-
Filesize
54KB
MD53e57edd976b8c200d53eaf6f065abec1
SHA114bfc824f1c2c5372a04d84b757418bdbb8f43e4
SHA256c4ed383a021518c99e94cba9367a155aba1ce394f4423d02d2a52953ac3ee154
SHA5123cc77094fbfb0e426fc11edc01242b59c3c980cc59f3bd74ae050fb349f378f167b8edb7541b46fa554963d85395fe493f5ac2c620f301dec3647c554a80e8ac
-
Filesize
54KB
MD53e57edd976b8c200d53eaf6f065abec1
SHA114bfc824f1c2c5372a04d84b757418bdbb8f43e4
SHA256c4ed383a021518c99e94cba9367a155aba1ce394f4423d02d2a52953ac3ee154
SHA5123cc77094fbfb0e426fc11edc01242b59c3c980cc59f3bd74ae050fb349f378f167b8edb7541b46fa554963d85395fe493f5ac2c620f301dec3647c554a80e8ac
-
Filesize
54KB
MD53e57edd976b8c200d53eaf6f065abec1
SHA114bfc824f1c2c5372a04d84b757418bdbb8f43e4
SHA256c4ed383a021518c99e94cba9367a155aba1ce394f4423d02d2a52953ac3ee154
SHA5123cc77094fbfb0e426fc11edc01242b59c3c980cc59f3bd74ae050fb349f378f167b8edb7541b46fa554963d85395fe493f5ac2c620f301dec3647c554a80e8ac
-
Filesize
54KB
MD53e57edd976b8c200d53eaf6f065abec1
SHA114bfc824f1c2c5372a04d84b757418bdbb8f43e4
SHA256c4ed383a021518c99e94cba9367a155aba1ce394f4423d02d2a52953ac3ee154
SHA5123cc77094fbfb0e426fc11edc01242b59c3c980cc59f3bd74ae050fb349f378f167b8edb7541b46fa554963d85395fe493f5ac2c620f301dec3647c554a80e8ac
-
Filesize
54KB
MD53e57edd976b8c200d53eaf6f065abec1
SHA114bfc824f1c2c5372a04d84b757418bdbb8f43e4
SHA256c4ed383a021518c99e94cba9367a155aba1ce394f4423d02d2a52953ac3ee154
SHA5123cc77094fbfb0e426fc11edc01242b59c3c980cc59f3bd74ae050fb349f378f167b8edb7541b46fa554963d85395fe493f5ac2c620f301dec3647c554a80e8ac
-
Filesize
54KB
MD53e57edd976b8c200d53eaf6f065abec1
SHA114bfc824f1c2c5372a04d84b757418bdbb8f43e4
SHA256c4ed383a021518c99e94cba9367a155aba1ce394f4423d02d2a52953ac3ee154
SHA5123cc77094fbfb0e426fc11edc01242b59c3c980cc59f3bd74ae050fb349f378f167b8edb7541b46fa554963d85395fe493f5ac2c620f301dec3647c554a80e8ac
-
Filesize
19KB
MD53dd7dd018d9ef510b571068562d439ab
SHA1e78d09f5b5a2f92d2af52d52ed40efeb28920680
SHA2565baa6445b21d07ce183144cc2a997d17892dbe38d7fe3acdcfb37e081d41eb17
SHA512a6e430da3fa92715461f21d7e48bd5002cd16ab9f9827304cd789ce8e615b123f0e377958b1a49ac85ca1c15147f9cbaa9656b1322a853cd51e748da1a4973de
-
Filesize
19KB
MD53dd7dd018d9ef510b571068562d439ab
SHA1e78d09f5b5a2f92d2af52d52ed40efeb28920680
SHA2565baa6445b21d07ce183144cc2a997d17892dbe38d7fe3acdcfb37e081d41eb17
SHA512a6e430da3fa92715461f21d7e48bd5002cd16ab9f9827304cd789ce8e615b123f0e377958b1a49ac85ca1c15147f9cbaa9656b1322a853cd51e748da1a4973de
-
Filesize
19KB
MD53dd7dd018d9ef510b571068562d439ab
SHA1e78d09f5b5a2f92d2af52d52ed40efeb28920680
SHA2565baa6445b21d07ce183144cc2a997d17892dbe38d7fe3acdcfb37e081d41eb17
SHA512a6e430da3fa92715461f21d7e48bd5002cd16ab9f9827304cd789ce8e615b123f0e377958b1a49ac85ca1c15147f9cbaa9656b1322a853cd51e748da1a4973de
-
Filesize
19KB
MD53dd7dd018d9ef510b571068562d439ab
SHA1e78d09f5b5a2f92d2af52d52ed40efeb28920680
SHA2565baa6445b21d07ce183144cc2a997d17892dbe38d7fe3acdcfb37e081d41eb17
SHA512a6e430da3fa92715461f21d7e48bd5002cd16ab9f9827304cd789ce8e615b123f0e377958b1a49ac85ca1c15147f9cbaa9656b1322a853cd51e748da1a4973de
-
Filesize
19KB
MD53dd7dd018d9ef510b571068562d439ab
SHA1e78d09f5b5a2f92d2af52d52ed40efeb28920680
SHA2565baa6445b21d07ce183144cc2a997d17892dbe38d7fe3acdcfb37e081d41eb17
SHA512a6e430da3fa92715461f21d7e48bd5002cd16ab9f9827304cd789ce8e615b123f0e377958b1a49ac85ca1c15147f9cbaa9656b1322a853cd51e748da1a4973de
-
Filesize
19KB
MD53dd7dd018d9ef510b571068562d439ab
SHA1e78d09f5b5a2f92d2af52d52ed40efeb28920680
SHA2565baa6445b21d07ce183144cc2a997d17892dbe38d7fe3acdcfb37e081d41eb17
SHA512a6e430da3fa92715461f21d7e48bd5002cd16ab9f9827304cd789ce8e615b123f0e377958b1a49ac85ca1c15147f9cbaa9656b1322a853cd51e748da1a4973de
-
Filesize
327KB
MD506167b46ff993f09d93d876cd343082c
SHA178433956ad807a292757fefb41bca7b54ff1a7df
SHA256612830ea96814be2501a171b9065b672efff21c117276cdf11994830c1dd3b2b
SHA5126b3cc4795423ce108d2f721d1ef29ff799d6edd9cec5d41c8d67d99053ba26179e2644ca7ad922e62cf375f65fdef7a1f4e7986a1200e12719088d31268d4d9c
-
Filesize
327KB
MD506167b46ff993f09d93d876cd343082c
SHA178433956ad807a292757fefb41bca7b54ff1a7df
SHA256612830ea96814be2501a171b9065b672efff21c117276cdf11994830c1dd3b2b
SHA5126b3cc4795423ce108d2f721d1ef29ff799d6edd9cec5d41c8d67d99053ba26179e2644ca7ad922e62cf375f65fdef7a1f4e7986a1200e12719088d31268d4d9c
-
Filesize
327KB
MD506167b46ff993f09d93d876cd343082c
SHA178433956ad807a292757fefb41bca7b54ff1a7df
SHA256612830ea96814be2501a171b9065b672efff21c117276cdf11994830c1dd3b2b
SHA5126b3cc4795423ce108d2f721d1ef29ff799d6edd9cec5d41c8d67d99053ba26179e2644ca7ad922e62cf375f65fdef7a1f4e7986a1200e12719088d31268d4d9c
-
Filesize
327KB
MD506167b46ff993f09d93d876cd343082c
SHA178433956ad807a292757fefb41bca7b54ff1a7df
SHA256612830ea96814be2501a171b9065b672efff21c117276cdf11994830c1dd3b2b
SHA5126b3cc4795423ce108d2f721d1ef29ff799d6edd9cec5d41c8d67d99053ba26179e2644ca7ad922e62cf375f65fdef7a1f4e7986a1200e12719088d31268d4d9c
-
Filesize
327KB
MD506167b46ff993f09d93d876cd343082c
SHA178433956ad807a292757fefb41bca7b54ff1a7df
SHA256612830ea96814be2501a171b9065b672efff21c117276cdf11994830c1dd3b2b
SHA5126b3cc4795423ce108d2f721d1ef29ff799d6edd9cec5d41c8d67d99053ba26179e2644ca7ad922e62cf375f65fdef7a1f4e7986a1200e12719088d31268d4d9c
-
Filesize
327KB
MD506167b46ff993f09d93d876cd343082c
SHA178433956ad807a292757fefb41bca7b54ff1a7df
SHA256612830ea96814be2501a171b9065b672efff21c117276cdf11994830c1dd3b2b
SHA5126b3cc4795423ce108d2f721d1ef29ff799d6edd9cec5d41c8d67d99053ba26179e2644ca7ad922e62cf375f65fdef7a1f4e7986a1200e12719088d31268d4d9c
-
Filesize
176KB
MD5cb14f3a1cbbad7bfc0a4746d53e43d84
SHA198222694d5ad2aae1b44612f57b74bedf223d9ed
SHA256f33d7393bd27de380d29a3fe55b05b9ebada56355dbcd939d9deb477305387ca
SHA512e35a46ecf5e5c81faf83dd1c33f699387ed4a43561441537829140b2bc7069843b53d7b25c902e9e2f977134c4e83718585e9cbea7e1b378408d6952978adbd2
-
Filesize
176KB
MD5cb14f3a1cbbad7bfc0a4746d53e43d84
SHA198222694d5ad2aae1b44612f57b74bedf223d9ed
SHA256f33d7393bd27de380d29a3fe55b05b9ebada56355dbcd939d9deb477305387ca
SHA512e35a46ecf5e5c81faf83dd1c33f699387ed4a43561441537829140b2bc7069843b53d7b25c902e9e2f977134c4e83718585e9cbea7e1b378408d6952978adbd2
-
Filesize
176KB
MD5cb14f3a1cbbad7bfc0a4746d53e43d84
SHA198222694d5ad2aae1b44612f57b74bedf223d9ed
SHA256f33d7393bd27de380d29a3fe55b05b9ebada56355dbcd939d9deb477305387ca
SHA512e35a46ecf5e5c81faf83dd1c33f699387ed4a43561441537829140b2bc7069843b53d7b25c902e9e2f977134c4e83718585e9cbea7e1b378408d6952978adbd2
-
Filesize
176KB
MD5cb14f3a1cbbad7bfc0a4746d53e43d84
SHA198222694d5ad2aae1b44612f57b74bedf223d9ed
SHA256f33d7393bd27de380d29a3fe55b05b9ebada56355dbcd939d9deb477305387ca
SHA512e35a46ecf5e5c81faf83dd1c33f699387ed4a43561441537829140b2bc7069843b53d7b25c902e9e2f977134c4e83718585e9cbea7e1b378408d6952978adbd2
-
Filesize
176KB
MD5cb14f3a1cbbad7bfc0a4746d53e43d84
SHA198222694d5ad2aae1b44612f57b74bedf223d9ed
SHA256f33d7393bd27de380d29a3fe55b05b9ebada56355dbcd939d9deb477305387ca
SHA512e35a46ecf5e5c81faf83dd1c33f699387ed4a43561441537829140b2bc7069843b53d7b25c902e9e2f977134c4e83718585e9cbea7e1b378408d6952978adbd2
-
Filesize
176KB
MD5cb14f3a1cbbad7bfc0a4746d53e43d84
SHA198222694d5ad2aae1b44612f57b74bedf223d9ed
SHA256f33d7393bd27de380d29a3fe55b05b9ebada56355dbcd939d9deb477305387ca
SHA512e35a46ecf5e5c81faf83dd1c33f699387ed4a43561441537829140b2bc7069843b53d7b25c902e9e2f977134c4e83718585e9cbea7e1b378408d6952978adbd2
-
Filesize
94KB
MD56e34fc4a713c3fbd88e47ac188d2540d
SHA11877a17da406d147566168c56aac1eb576782b37
SHA256d8faf8ebf360ed0b3b1a43877a04863f7e044b3d19b641d88737e0829d683b36
SHA512848a1d9602210d7da0f6e4d7817af08dc02baac7eccf1cfaadaf3a24b55e1316e77c40672a6a1195797e525f448817e534ae200e99cdf548ee64a7996fbcec4f
-
Filesize
94KB
MD56e34fc4a713c3fbd88e47ac188d2540d
SHA11877a17da406d147566168c56aac1eb576782b37
SHA256d8faf8ebf360ed0b3b1a43877a04863f7e044b3d19b641d88737e0829d683b36
SHA512848a1d9602210d7da0f6e4d7817af08dc02baac7eccf1cfaadaf3a24b55e1316e77c40672a6a1195797e525f448817e534ae200e99cdf548ee64a7996fbcec4f
-
Filesize
94KB
MD56e34fc4a713c3fbd88e47ac188d2540d
SHA11877a17da406d147566168c56aac1eb576782b37
SHA256d8faf8ebf360ed0b3b1a43877a04863f7e044b3d19b641d88737e0829d683b36
SHA512848a1d9602210d7da0f6e4d7817af08dc02baac7eccf1cfaadaf3a24b55e1316e77c40672a6a1195797e525f448817e534ae200e99cdf548ee64a7996fbcec4f
-
Filesize
94KB
MD56e34fc4a713c3fbd88e47ac188d2540d
SHA11877a17da406d147566168c56aac1eb576782b37
SHA256d8faf8ebf360ed0b3b1a43877a04863f7e044b3d19b641d88737e0829d683b36
SHA512848a1d9602210d7da0f6e4d7817af08dc02baac7eccf1cfaadaf3a24b55e1316e77c40672a6a1195797e525f448817e534ae200e99cdf548ee64a7996fbcec4f
-
Filesize
94KB
MD56e34fc4a713c3fbd88e47ac188d2540d
SHA11877a17da406d147566168c56aac1eb576782b37
SHA256d8faf8ebf360ed0b3b1a43877a04863f7e044b3d19b641d88737e0829d683b36
SHA512848a1d9602210d7da0f6e4d7817af08dc02baac7eccf1cfaadaf3a24b55e1316e77c40672a6a1195797e525f448817e534ae200e99cdf548ee64a7996fbcec4f
-
Filesize
94KB
MD56e34fc4a713c3fbd88e47ac188d2540d
SHA11877a17da406d147566168c56aac1eb576782b37
SHA256d8faf8ebf360ed0b3b1a43877a04863f7e044b3d19b641d88737e0829d683b36
SHA512848a1d9602210d7da0f6e4d7817af08dc02baac7eccf1cfaadaf3a24b55e1316e77c40672a6a1195797e525f448817e534ae200e99cdf548ee64a7996fbcec4f
-
Filesize
36KB
MD5d76532f224b6648179b77525326e8754
SHA1cb0a90adf84b9c19e750b166789452693f031053
SHA2560d8217dbb0d52a3f8cd233b089131ca19aa6e0fc0c0fb10081f3c50761f5d15e
SHA512721b4f0f55fbeefa394d3471c66d32e2f0f452f9977987450b1662b8e2e9a88d1b9c014b5f2a4b378d99f6fe4de6b5810f8b00157ae25b0de2a3bf3e211ea2fc
-
Filesize
36KB
MD5d76532f224b6648179b77525326e8754
SHA1cb0a90adf84b9c19e750b166789452693f031053
SHA2560d8217dbb0d52a3f8cd233b089131ca19aa6e0fc0c0fb10081f3c50761f5d15e
SHA512721b4f0f55fbeefa394d3471c66d32e2f0f452f9977987450b1662b8e2e9a88d1b9c014b5f2a4b378d99f6fe4de6b5810f8b00157ae25b0de2a3bf3e211ea2fc
-
Filesize
36KB
MD5d76532f224b6648179b77525326e8754
SHA1cb0a90adf84b9c19e750b166789452693f031053
SHA2560d8217dbb0d52a3f8cd233b089131ca19aa6e0fc0c0fb10081f3c50761f5d15e
SHA512721b4f0f55fbeefa394d3471c66d32e2f0f452f9977987450b1662b8e2e9a88d1b9c014b5f2a4b378d99f6fe4de6b5810f8b00157ae25b0de2a3bf3e211ea2fc
-
Filesize
36KB
MD5d76532f224b6648179b77525326e8754
SHA1cb0a90adf84b9c19e750b166789452693f031053
SHA2560d8217dbb0d52a3f8cd233b089131ca19aa6e0fc0c0fb10081f3c50761f5d15e
SHA512721b4f0f55fbeefa394d3471c66d32e2f0f452f9977987450b1662b8e2e9a88d1b9c014b5f2a4b378d99f6fe4de6b5810f8b00157ae25b0de2a3bf3e211ea2fc
-
Filesize
36KB
MD5d76532f224b6648179b77525326e8754
SHA1cb0a90adf84b9c19e750b166789452693f031053
SHA2560d8217dbb0d52a3f8cd233b089131ca19aa6e0fc0c0fb10081f3c50761f5d15e
SHA512721b4f0f55fbeefa394d3471c66d32e2f0f452f9977987450b1662b8e2e9a88d1b9c014b5f2a4b378d99f6fe4de6b5810f8b00157ae25b0de2a3bf3e211ea2fc
-
Filesize
36KB
MD5d76532f224b6648179b77525326e8754
SHA1cb0a90adf84b9c19e750b166789452693f031053
SHA2560d8217dbb0d52a3f8cd233b089131ca19aa6e0fc0c0fb10081f3c50761f5d15e
SHA512721b4f0f55fbeefa394d3471c66d32e2f0f452f9977987450b1662b8e2e9a88d1b9c014b5f2a4b378d99f6fe4de6b5810f8b00157ae25b0de2a3bf3e211ea2fc