Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 22:26
Static task
static1
Behavioral task
behavioral1
Sample
1e6ce4afa0d06702bdaa4df79bb96397.exe
Resource
win7-20231215-en
General
-
Target
1e6ce4afa0d06702bdaa4df79bb96397.exe
-
Size
705KB
-
MD5
1e6ce4afa0d06702bdaa4df79bb96397
-
SHA1
6001049ba66bf194f181cd2f19b02cb5f7abc533
-
SHA256
2cc733b37d6df45873d5420f76cd7521f17ab0ddc4d49bcea9b0e43ba46b8e81
-
SHA512
8527830ec8a42a27dfa737b63b01e0e4d83ccd7a8570b175d318b2870f8621c7a457bd343ed15cc9f82ac2834f79f784371619937c3a9a3e2240933680fdf6c2
-
SSDEEP
12288:ODJnJM4OpSpnO8kTalhrR41pC3blElJe3Y387WQWKmc7:mJnJM4OqTW8hC7CLu4rWD
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 6 IoCs
pid Process 1876 alg.exe 3440 DiagnosticsHub.StandardCollector.Service.exe 3160 fxssvc.exe 5048 elevation_service.exe 2032 elevation_service.exe 3480 SearchIndexer.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-768304381-2824894965-3840216961-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-768304381-2824894965-3840216961-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\T: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\U: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\Z: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\G: alg.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\E: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\W: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\J: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\O: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\Q: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\G: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\I: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\X: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\K: alg.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\H: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\M: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\N: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\Y: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\R: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\S: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\V: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\K: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\P: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\T: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\L: 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\J: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\S: alg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created \??\c:\windows\system32\diagsvcs\mcaediop.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\dllhost.exe alg.exe File created \??\c:\windows\system32\oaeeehgp.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\wbengine.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created \??\c:\windows\system32\plkjfadb.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File created \??\c:\windows\system32\lakghjbk.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\locator.exe alg.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe alg.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created \??\c:\windows\system32\jjjpenlh.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File created \??\c:\windows\system32\adimbeom.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File created \??\c:\windows\system32\eejmfkec.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\spectrum.exe alg.exe File opened for modification \??\c:\windows\system32\Agentservice.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe alg.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe alg.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe alg.exe File opened for modification \??\c:\windows\system32\lsass.exe alg.exe File opened for modification \??\c:\windows\system32\fxssvc.exe alg.exe File created \??\c:\windows\system32\dajblnad.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe alg.exe File created \??\c:\windows\system32\ifokmckg.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\spectrum.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\dllhost.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe alg.exe File opened for modification \??\c:\windows\system32\wbengine.exe alg.exe File created \??\c:\windows\system32\perceptionsimulation\ahkhmeei.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Windows\System32\WindowsPowerShell\v1.0\nbmcjoba.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\locator.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\Agentservice.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\svchost.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\lsass.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\msdtc.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\snmptrap.exe alg.exe File opened for modification \??\c:\windows\system32\fxssvc.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created \??\c:\windows\system32\openssh\ldchdkea.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File created \??\c:\windows\system32\pkaeihfk.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File opened for modification \??\c:\windows\system32\vssvc.exe alg.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\vds.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\elbbkbak.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File created \??\c:\windows\system32\oklbbnoe.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File created \??\c:\windows\system32\wbem\pelgebcp.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\searchindexer.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\alg.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\Appvclient.exe alg.exe File opened for modification \??\c:\windows\system32\msdtc.exe alg.exe File created \??\c:\windows\system32\bgleqfae.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File created \??\c:\windows\system32\dfjhcgfd.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\snmptrap.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created \??\c:\windows\system32\hcblkbjk.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\Appvclient.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\system32\vds.exe alg.exe File created \??\c:\windows\system32\kkgmgkoe.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk-1.8\bin\ekchdkjb.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\cedpmnkl.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\mgecidfd.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File created \??\c:\program files\common files\microsoft shared\source engine\ffqnqkhn.tmp alg.exe File created C:\Program Files\7-Zip\lncjookl.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Program Files\7-Zip\nccafaqk.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe alg.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\occlljkq.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created \??\c:\program files (x86)\mozilla maintenance service\cqdodmae.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\jfjkgccl.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\kihlpche.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Program Files\Java\jdk-1.8\bin\dakeokhg.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\nfgckqkp.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\lhbjhkab.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\pijgofaf.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Program Files\Common Files\microsoft shared\ink\hhfjjgab.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\createdump.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created \??\c:\program files\windows media player\akpinoba.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe alg.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\lfbahmck.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\dotnet\dotnet.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Program Files\Google\Chrome\Application\jmofaklb.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\obkakffi.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File created C:\Program Files\7-Zip\jgpijieg.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Program Files\Internet Explorer\dendjgfp.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Program Files\Common Files\microsoft shared\ink\olemadei.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File created C:\Program Files\Java\jdk-1.8\bin\onbaidqf.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\miqfjfol.tmp 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe 1e6ce4afa0d06702bdaa4df79bb96397.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-180 = "Microsoft PowerPoint 97-2003 Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9934 = "AVCHD Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-1 = "Microsoft Language Detection" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9926 = "M3U file" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xhtml\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-103 = "Windows PowerShell Script" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\msxml3r.dll,-1 = "XML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-174 = "Microsoft PowerPoint Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-915 = "XHTML Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000cb5e4f8a313fda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\wmphoto.dll,-500 = "Windows Media Photo" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000c5473f8c313fda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-184 = "Microsoft PowerPoint Macro-Enabled Design Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9936 = "QuickTime Movie" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-9 = "Microsoft Bengali to Latin Transliteration" SearchIndexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000006d497a8a313fda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9912 = "Windows Media Audio file" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-5 = "Microsoft Transliteration Engine" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-103 = "Microsoft Excel Macro-Enabled Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000005533a58a313fda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-178 = "OpenDocument Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\cabview.dll,-20 = "Cabinet File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9933 = "MPEG-4 Audio" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-101 = "Microsoft Excel Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-4 = "Microsoft Simplified Chinese to Traditional Chinese Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000f96f818a313fda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-114 = "OpenDocument Spreadsheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-3 = "Microsoft Traditional Chinese to Simplified Chinese Transliteration" SearchIndexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000b50f608a313fda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-113 = "Microsoft Excel Binary Worksheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9925 = "MP3 Format Sound" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-120 = "Microsoft Word 97 - 2003 Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-125 = "Microsoft Word Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9905 = "Video Clip" SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe 1876 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4112 1e6ce4afa0d06702bdaa4df79bb96397.exe Token: SeAuditPrivilege 3160 fxssvc.exe Token: SeTakeOwnershipPrivilege 1876 alg.exe Token: 33 3480 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3480 SearchIndexer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3848 3480 SearchIndexer.exe 109 PID 3480 wrote to memory of 3848 3480 SearchIndexer.exe 109 PID 3480 wrote to memory of 2392 3480 SearchIndexer.exe 110 PID 3480 wrote to memory of 2392 3480 SearchIndexer.exe 110 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e6ce4afa0d06702bdaa4df79bb96397.exe"C:\Users\Admin\AppData\Local\Temp\1e6ce4afa0d06702bdaa4df79bb96397.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1876
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:3440
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:3728
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:5048
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2032
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:3848
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 804 808 816 8192 812 7882⤵
- Modifies data under HKEY_USERS
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1023KB
MD58eb68de5a18219ba9dfaa540ab4b9091
SHA1ed10c28627e4629c2b02e18f6667c69bffa9e0ac
SHA25692eda7c7baaaa2020f946bf68d81c1da1657f73ec3bc64a50bd0c8e0f5a97456
SHA5120ef7195c6a42276981761bcaa0295eec9b69f7fa0506fd6414faf78c827d605b2b9f658eaecd805db6763917cedd1fc0cadc7bda1906fb11e3a54f7645e6fdd3
-
Filesize
940KB
MD5eeca588797016153e44b994e740b7704
SHA198430e758c39ef033699ca023b238f03c7d44d63
SHA2562e13b24a240fbaa533b01d61064f6dd3d0190357dfb3e1eae9b9c36ef2d9162b
SHA512b5c0f1944a932bfe518940fe9f8e3bbccafbf1cee6a23cb3d5954259255bee5bd857d464869852450db9db0f3a117623f757c24846595bafe213ca307b01400f
-
Filesize
1.3MB
MD5d9141128b7e5a18a6aa69f1c778a83ec
SHA138f9d547caa9cd338f16121879c95a956b01be0d
SHA256069b7798f6be60b01dcc1c8a30ed9262f4cd1a0212db879ef406d2373c9b1e8d
SHA512424a80aebbdf94486112008447f1ce03168e7767f3417a072b1376e69b0136ae9dd8fea79ee0e08461def4a9968229b0649ee5cdf762e1cb4f2af0eb8a58b5f7
-
Filesize
880KB
MD508b28cdb3fb5cad4a83d6999160cfff5
SHA1f6f3691c3410bab1e31da9415cbf0a2407b16bd1
SHA25678e69a7b80243b9fc3a34ed2827c244545338c7a0815f76810e7af9ee478f401
SHA51299d9d91b481d561b6a79b5647b1328ecbe63d54855822d055d6fc8e264122b5e955a0a2bb8a97f6cb528d54fa15703cb131bcb9ea3abd99d08c9831259e8224f
-
Filesize
410KB
MD5bebf7e64dc6744bf70cef7f3b1237e84
SHA116dee67059e580b6c95be876cce69743d5a5937f
SHA25620d5677c75503e0ae7126a9da2094794f4418d5b310098735aa666c1cb4f3520
SHA512b1027759937b0e3e35f69b75830614fcfb00db90821ab453ea7f78d741ba8207fc9e1c9c1bc171d998479c0f2cc9b80a3f49cad6af6f7faead27b44c30f6a581
-
Filesize
672KB
MD5da9a389f1c8d9df64ab8d56e6243ae59
SHA1680899c5418165011068b5e936a8efc431479b0b
SHA2569242ec03f2359ab383530833634c08f31f0f579186b7b844391492ff3b73f53d
SHA512c5655e102872962b69cd0bf9210d6e59b9839a6d5028b0c769640975ab7654b31d9935b4ad97ce014bc24d7a9081547576f2f732c98a742fd1c8f9641ba4b7dd
-
Filesize
1.6MB
MD5b7a2c91f270ad9c64e21e455a9a7c795
SHA1192530475367582e91029cbb29e6ac2ded229110
SHA25603e85cdc8194182d255592b6f3d0b5b7fbd6c38b57a623b33a1d8013ee5ed307
SHA512d678c1456583672271b66a22edfbf5244e875f47503433b91e280518e074a4c9194a20f5c54ee9cd4d13e6bf44c191a5673830f24a8fd5a64c7c6a37b931e6ae
-
Filesize
270KB
MD5e218f3793bcbc96ff840281b93098d4b
SHA1960b3cc4f520f0d5618735a5604cc9183f53b2c6
SHA25628e9ca7ad212fcc7b6107fad0999ae42191e3ce3e81de7ebb3666b765859d03b
SHA5124edcb5ddfc459df3fdf469404c679580364f05cbe36b1d35da4a615ae008256ab1253129fd029639200fe8a2201a5b7df21e53bf54644d6b26b1a322f1acc258
-
Filesize
3.3MB
MD514c0a1f11cfdbad3042f708504cfd33a
SHA10006739c5eae12005f1c2b3b22d0d48aa3f87ec6
SHA256adebe97fb0e149fddeec3c0631860fd94e85cf4406719bc4aa55bd531c73a5e4
SHA51244f4215dcec7c44be06f874cd46e6fe7ad0a42badcc746a23082cd70bd12c8818089939c79573fbda38da24dc998829f3c3614f7c743fa0bfd536df20eef650e
-
Filesize
2.5MB
MD5c05b48b9c37394d27bfdd8771394737f
SHA192f2ecfc29020033e5f977f34243d67dc1c0a872
SHA2568723d9105b00a829527c4e78cd9ad9eb52298e34942757fb46c7b79a1f4d4afd
SHA51215633da08722ee5a5bf7f7b5f66488fa29fc1ef371821c79cec7bb2489d00f5aa24b47820ffd27b4340e8a71f88335ddda32d6b81ada68ae8b3d232754e1ce98
-
Filesize
637KB
MD56d58b2616adc4f3acaa689b28bfdedac
SHA167f6883c9e87ea36ae196d7f8fda7f08afed8239
SHA25649930e483b154263f1d120c50e7b72b3ab0b950844809892f371f3ebd6171469
SHA51288c499a081f1bec07fcb5e1f6c5e24675294b92641dc492099c09cb724841e9a43fc3b6866e704f5e6ca6081ba019d174fb9ab60e95337f49d413b6250b6a53e
-
Filesize
11KB
MD572e2e300aee09ecf837c699a5afeeacb
SHA12c5f34e616b71ca10b6c58bd0efa84f25a7a8618
SHA256e2cf666902f685ce16d691d648536f969515599bd34fdaaeef30e538f3b73cd5
SHA512efc1a47fc628c63c209946d52f1fd7f47309b0d03a0bee50189fa74a15885276012ae56ef1a16607b1769dc3298a892e82ad6df9a9c69d03a3899403d3fd66d4
-
Filesize
2.0MB
MD57fba28ad82595a788398f960cf6f7649
SHA1a9909d1015ddb2c542e911c166d910f7a79a954c
SHA256811afd7caa0e5f71b541fc02b0f79d37665d42f7390d0d6bb12744c756d428e3
SHA51275be00951affebbf04d10d5dbafcfd6e30226e56f7fb86a7249790059799ec9127bde9c1a6eed4b3b58be08239ad4226a22c1ace87ad9abe4a516826231b1ef4
-
Filesize
184KB
MD518ed58b8d34a878cf22a01d570cb84eb
SHA13821fcc06c3f73b7f5ef163c08f373b30101e42f
SHA256896285a3a60122336d16a678cdb30da3fbcba7f2dbf62089b5447a7dbad21c74
SHA5128ec220ba0abf3a41f57004e05564d3f082313d94771727489002396a484dc7235c3da3f148efc641f6c12e74ce460db200d1bb4ff1322625c55050ed86efd88b
-
Filesize
211KB
MD53c965fa39598a12ac174d495e4c5522d
SHA1fd03c8e324e3fac81601a36e538f00d49e0b3e50
SHA2563511abdd4bbf0d09d3fc3303d0b974a7ab77c7a4061ef0958e4e7d652e3fda78
SHA51236a9b976cf585f6d1751ce19a71eacd8fa175819bb4966b56ef6cbe1c31c9e7ea260fe8174a42ba5e1a6e2180e63f9bfb4a2b0d3193ffc8b309e0e4fe2309573
-
Filesize
249KB
MD518d99d3f616acf388ae6062dbdd49c4f
SHA1887cf25cd27b0dbf8f159e38c92e32cb29e8eaaf
SHA256e87bfbd14bd5a12aa7fa4855bac08ba475fc207f37cf4340dc6e2d60316f05af
SHA51288042f868870cae3d4247f3b80c889ee8a8d110ad5c4c8dc10176a1ea558551d76b03f6d43a4255522713a10a8dd33ab2dcd9137af17a1420dc546a77462d282
-
Filesize
1.3MB
MD50ba8f50bd82c7d96cac5ded5f86ae54e
SHA149272d71c71d84d7dff597fc0612255d94eefd6f
SHA2566386ab86431f021450e14d5a5fec9b973591accd0345cdbd161649abbe929690
SHA5125feab6548c4e8a008fbd69cedfce5635aa0c33f9a4b2f96e47a90717832aa7cce85197bf6067a6b2a35715f95bbaa8cb4cf94593d45f78b5d33ed83aa15c59b6
-
Filesize
389KB
MD53a9563c00d23e0e43d8a615fba5985d5
SHA13c5e920a346dc3520d1c9a5da9584747426fb0b8
SHA25632aef692d8bed1bef2e68126f7bb9ce13daa3c63115ddcf1845340decb0cf052
SHA512f09b9afe66b4be1119c05d4922beb142444a591ab9f7193548d2f1c1b37934d6cd1cd9f016934ff48a90ee330b356f9a4a116d1073e4e92c43f69fb796f4c77b
-
Filesize
839KB
MD5c192c67c64b7f8727afb1a4de73954ee
SHA196b8bd33455fab721abdeafcfd3d02f56f33660d
SHA25620c3c740593353213dc6cb2375ac46ae0ca43c38d4914af19643003ef62d7c17
SHA51212e4eecde490c10355dbc731a42d3c9835e68b585d229207bab89afc09ff01e2e80ebc4445f72fbcb46a22ea7db23cebad1d1403042761a7c69c76e35808cf1d
-
Filesize
274KB
MD5286eb389b1ed51744700be5615783c5f
SHA1c15f59325622163ef2edb1e6783b37415f9aae00
SHA2564327886d669ba99a67421fec0ce6dd084078ed33020d1984d46132ff61e264ae
SHA5124ca53413e62993243c452390ad4f1cff9dcece25a909f32114d6acac766292df44244bb42e5d91183e231f12e43bb17f520c2e2adb1e0e0b7f9f210fddd5edc0
-
Filesize
143KB
MD59c0d0dcc205ee7c22c69693fa63e1e81
SHA16e86187b83c4fa7a75f28d2f853ff75a2118d190
SHA256792f9d232f8be2abc6e52ac99ca833c4050967d606e2818d2f675c2104786322
SHA51212431c7830a69abfa4ba9d2fd1523b45b73fe1a9bffb8187e438fe7423c1cd8754898687eff40c8f881915fab1abe02d02639e0b5e288696b7268eef8b3275ac
-
Filesize
539KB
MD5af67df9d5e2e86c451320533663720a1
SHA1ef58cbf0f0177f78f7fbaa02ec7079d18f55f435
SHA25621d7465a271db0a30fe7a330c8f31bd3165a87707d17f1e9b972f7bca0028bfd
SHA51235a6d93179dc513fbb33cab331357184a9782465d9d9f44075fdccf6f2773cec6a005a0a22c6a0db695bfb6a59187747cbc1e175eb5e541a26de54e0c43eb74f
-
Filesize
163KB
MD52e1304ee00613441940cd94d980d37a3
SHA18a987f48027bfff54b92bc3bfb1bd1108e125fff
SHA2563d5668c173289785e0fb9daf9e844bc8135ff913630e2bfeed290ff89c8bdedf
SHA5128143e3f412427bdc77e1b3da5c18e21ed6e46d1a836328e43e9947d482533c29561d84aedf142ba96d1a42715031ec625dda5e260cffbe97c65584c3d571f903