Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 06:36
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-NO 00967-HYU001-Project Order.exe
Resource
win7-20240903-en
General
-
Target
RFQ-NO 00967-HYU001-Project Order.exe
-
Size
1.5MB
-
MD5
58906f0d0d57dc8b5f32a7d779cdea22
-
SHA1
e7e0546255d9595e903a5dd641f1234979dd59ea
-
SHA256
502adbc1e5177691e69d8a3159aae8f5672e9ccf8eadda3f6c4fccb3d258dd6d
-
SHA512
c08dab3ddd376af6405a8816e05525bf099628a6ebb0d29f510fe463f4f47cfe5e134350749272219038c984b8a38961782637a4c96981a916130851b004fdc4
-
SSDEEP
49152:UJT2EhlJjIw8Fhno/SWR7Zosw/19gl3cJ:OBxjIZ9oKoZho1/
Malware Config
Extracted
remcos
RemoteHost
204.10.160.212:6622
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-98KSNN
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1336 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation RFQ-NO 00967-HYU001-Project Order.exe -
Executes dropped EXE 22 IoCs
pid Process 1436 alg.exe 3148 DiagnosticsHub.StandardCollector.Service.exe 2192 fxssvc.exe 4472 elevation_service.exe 3308 elevation_service.exe 4052 maintenanceservice.exe 3688 msdtc.exe 3156 OSE.EXE 3552 PerceptionSimulationService.exe 3432 perfhost.exe 1540 locator.exe 1172 SensorDataService.exe 4908 snmptrap.exe 2736 spectrum.exe 1684 ssh-agent.exe 2800 TieringEngineService.exe 432 AgentService.exe 1408 vds.exe 4512 vssvc.exe 3588 wbengine.exe 2448 WmiApSrv.exe 1076 SearchIndexer.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification C:\Windows\system32\SgrmBroker.exe alg.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\System32\msdtc.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\dllhost.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\system32\vssvc.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\system32\SearchIndexer.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\SysWow64\perfhost.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\system32\locator.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\system32\AgentService.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\System32\SensorDataService.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\System32\snmptrap.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\system32\AgentService.exe alg.exe File opened for modification C:\Windows\System32\SensorDataService.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\aa5f6fc726e8edb0.bin alg.exe File opened for modification C:\Windows\system32\TieringEngineService.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\System32\vds.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\System32\alg.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\system32\spectrum.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\system32\wbengine.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\system32\msiexec.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\SgrmBroker.exe RFQ-NO 00967-HYU001-Project Order.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2844 set thread context of 2380 2844 RFQ-NO 00967-HYU001-Project Order.exe 91 PID 2380 set thread context of 684 2380 RFQ-NO 00967-HYU001-Project Order.exe 109 PID 2380 set thread context of 3020 2380 RFQ-NO 00967-HYU001-Project Order.exe 110 PID 2380 set thread context of 4108 2380 RFQ-NO 00967-HYU001-Project Order.exe 114 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateOnDemand.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files\7-Zip\7z.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateBroker.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe alg.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe alg.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe RFQ-NO 00967-HYU001-Project Order.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe RFQ-NO 00967-HYU001-Project Order.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 3256 3020 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-NO 00967-HYU001-Project Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-NO 00967-HYU001-Project Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-NO 00967-HYU001-Project Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-NO 00967-HYU001-Project Order.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\msxml3r.dll,-2 = "XSL Stylesheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-125 = "Microsoft Word Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xht SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-120 = "Microsoft Word 97 - 2003 Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-131 = "Rich Text Format" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\cabview.dll,-20 = "Cabinet File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000005e5e9446cc13db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xhtml\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000087c0f044cc13db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-111 = "Microsoft Excel Macro-Enabled Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9937 = "3GPP Audio/Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-107 = "Microsoft Excel Comma Separated Values File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-24585 = "Cascading Style Sheet Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000007bb7aa45cc13db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-121 = "Microsoft Word 97 - 2003 Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-177 = "Microsoft PowerPoint Macro-Enabled Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xhtml SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9914 = "Windows Media Audio/Video file" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{80009818-F38F-4AF1-87B5-EADAB9433E58} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000b5abfc44cc13db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9923 = "Windows Media playlist" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\wshext.dll,-4802 = "VBScript Script File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9939 = "ADTS Audio" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000002137e744cc13db01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000d3279644cc13db01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000be87b744cc13db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-115 = "Microsoft Excel 97-2003 Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-116 = "Microsoft Excel Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9910 = "Windows Media Audio/Video playlist" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-914 = "SVG Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-180 = "Microsoft PowerPoint 97-2003 Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9936 = "QuickTime Movie" SearchProtocolHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4192 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2844 RFQ-NO 00967-HYU001-Project Order.exe 1336 powershell.exe 2844 RFQ-NO 00967-HYU001-Project Order.exe 1336 powershell.exe 684 RFQ-NO 00967-HYU001-Project Order.exe 684 RFQ-NO 00967-HYU001-Project Order.exe 4108 RFQ-NO 00967-HYU001-Project Order.exe 4108 RFQ-NO 00967-HYU001-Project Order.exe 684 RFQ-NO 00967-HYU001-Project Order.exe 684 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe 2380 RFQ-NO 00967-HYU001-Project Order.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 2844 RFQ-NO 00967-HYU001-Project Order.exe Token: SeDebugPrivilege 1336 powershell.exe Token: SeTakeOwnershipPrivilege 2380 RFQ-NO 00967-HYU001-Project Order.exe Token: SeAuditPrivilege 2192 fxssvc.exe Token: SeDebugPrivilege 4108 RFQ-NO 00967-HYU001-Project Order.exe Token: SeRestorePrivilege 2800 TieringEngineService.exe Token: SeManageVolumePrivilege 2800 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 432 AgentService.exe Token: SeBackupPrivilege 4512 vssvc.exe Token: SeRestorePrivilege 4512 vssvc.exe Token: SeAuditPrivilege 4512 vssvc.exe Token: SeBackupPrivilege 3588 wbengine.exe Token: SeRestorePrivilege 3588 wbengine.exe Token: SeSecurityPrivilege 3588 wbengine.exe Token: 33 1076 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1076 SearchIndexer.exe Token: SeDebugPrivilege 2380 RFQ-NO 00967-HYU001-Project Order.exe Token: SeDebugPrivilege 2380 RFQ-NO 00967-HYU001-Project Order.exe Token: SeDebugPrivilege 2380 RFQ-NO 00967-HYU001-Project Order.exe Token: SeDebugPrivilege 2380 RFQ-NO 00967-HYU001-Project Order.exe Token: SeDebugPrivilege 2380 RFQ-NO 00967-HYU001-Project Order.exe Token: SeDebugPrivilege 1436 alg.exe Token: SeDebugPrivilege 1436 alg.exe Token: SeDebugPrivilege 1436 alg.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3020 RFQ-NO 00967-HYU001-Project Order.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2844 wrote to memory of 1336 2844 RFQ-NO 00967-HYU001-Project Order.exe 87 PID 2844 wrote to memory of 1336 2844 RFQ-NO 00967-HYU001-Project Order.exe 87 PID 2844 wrote to memory of 1336 2844 RFQ-NO 00967-HYU001-Project Order.exe 87 PID 2844 wrote to memory of 4192 2844 RFQ-NO 00967-HYU001-Project Order.exe 89 PID 2844 wrote to memory of 4192 2844 RFQ-NO 00967-HYU001-Project Order.exe 89 PID 2844 wrote to memory of 4192 2844 RFQ-NO 00967-HYU001-Project Order.exe 89 PID 2844 wrote to memory of 2380 2844 RFQ-NO 00967-HYU001-Project Order.exe 91 PID 2844 wrote to memory of 2380 2844 RFQ-NO 00967-HYU001-Project Order.exe 91 PID 2844 wrote to memory of 2380 2844 RFQ-NO 00967-HYU001-Project Order.exe 91 PID 2844 wrote to memory of 2380 2844 RFQ-NO 00967-HYU001-Project Order.exe 91 PID 2844 wrote to memory of 2380 2844 RFQ-NO 00967-HYU001-Project Order.exe 91 PID 2844 wrote to memory of 2380 2844 RFQ-NO 00967-HYU001-Project Order.exe 91 PID 2844 wrote to memory of 2380 2844 RFQ-NO 00967-HYU001-Project Order.exe 91 PID 2844 wrote to memory of 2380 2844 RFQ-NO 00967-HYU001-Project Order.exe 91 PID 2844 wrote to memory of 2380 2844 RFQ-NO 00967-HYU001-Project Order.exe 91 PID 2844 wrote to memory of 2380 2844 RFQ-NO 00967-HYU001-Project Order.exe 91 PID 2844 wrote to memory of 2380 2844 RFQ-NO 00967-HYU001-Project Order.exe 91 PID 2844 wrote to memory of 2380 2844 RFQ-NO 00967-HYU001-Project Order.exe 91 PID 2380 wrote to memory of 684 2380 RFQ-NO 00967-HYU001-Project Order.exe 109 PID 2380 wrote to memory of 684 2380 RFQ-NO 00967-HYU001-Project Order.exe 109 PID 2380 wrote to memory of 684 2380 RFQ-NO 00967-HYU001-Project Order.exe 109 PID 2380 wrote to memory of 684 2380 RFQ-NO 00967-HYU001-Project Order.exe 109 PID 2380 wrote to memory of 3020 2380 RFQ-NO 00967-HYU001-Project Order.exe 110 PID 2380 wrote to memory of 3020 2380 RFQ-NO 00967-HYU001-Project Order.exe 110 PID 2380 wrote to memory of 3020 2380 RFQ-NO 00967-HYU001-Project Order.exe 110 PID 2380 wrote to memory of 3020 2380 RFQ-NO 00967-HYU001-Project Order.exe 110 PID 2380 wrote to memory of 2192 2380 RFQ-NO 00967-HYU001-Project Order.exe 111 PID 2380 wrote to memory of 2192 2380 RFQ-NO 00967-HYU001-Project Order.exe 111 PID 2380 wrote to memory of 2192 2380 RFQ-NO 00967-HYU001-Project Order.exe 111 PID 2380 wrote to memory of 1272 2380 RFQ-NO 00967-HYU001-Project Order.exe 113 PID 2380 wrote to memory of 1272 2380 RFQ-NO 00967-HYU001-Project Order.exe 113 PID 2380 wrote to memory of 1272 2380 RFQ-NO 00967-HYU001-Project Order.exe 113 PID 2380 wrote to memory of 4108 2380 RFQ-NO 00967-HYU001-Project Order.exe 114 PID 2380 wrote to memory of 4108 2380 RFQ-NO 00967-HYU001-Project Order.exe 114 PID 2380 wrote to memory of 4108 2380 RFQ-NO 00967-HYU001-Project Order.exe 114 PID 2380 wrote to memory of 4108 2380 RFQ-NO 00967-HYU001-Project Order.exe 114 PID 1076 wrote to memory of 5508 1076 SearchIndexer.exe 128 PID 1076 wrote to memory of 5508 1076 SearchIndexer.exe 128 PID 1076 wrote to memory of 5532 1076 SearchIndexer.exe 129 PID 1076 wrote to memory of 5532 1076 SearchIndexer.exe 129 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ-NO 00967-HYU001-Project Order.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-NO 00967-HYU001-Project Order.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ZHEwoSAkU.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZHEwoSAkU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9C4F.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4192
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ-NO 00967-HYU001-Project Order.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-NO 00967-HYU001-Project Order.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\RFQ-NO 00967-HYU001-Project Order.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-NO 00967-HYU001-Project Order.exe" /stext "C:\Users\Admin\AppData\Local\Temp\dsxkohrapnpnotjxgfcisbk"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ-NO 00967-HYU001-Project Order.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-NO 00967-HYU001-Project Order.exe" /stext "C:\Users\Admin\AppData\Local\Temp\guccpzcudvhryzfbypocvoeolq"3⤵
- Suspicious use of UnmapMainImage
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 124⤵
- Program crash
PID:3256
-
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ-NO 00967-HYU001-Project Order.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-NO 00967-HYU001-Project Order.exe" /stext "C:\Users\Admin\AppData\Local\Temp\qoivqrnvrdzwantfhabdgtrxmweuc"3⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ-NO 00967-HYU001-Project Order.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-NO 00967-HYU001-Project Order.exe" /stext "C:\Users\Admin\AppData\Local\Temp\qoivqrnvrdzwantfhabdgtrxmweuc"3⤵PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ-NO 00967-HYU001-Project Order.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-NO 00967-HYU001-Project Order.exe" /stext "C:\Users\Admin\AppData\Local\Temp\qoivqrnvrdzwantfhabdgtrxmweuc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:3148
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1532
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4472
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3308
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4052
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3688
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:3156
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:3552
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:3432
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:1540
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1172
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:4908
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2736
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:1684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:2552
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3020 -ip 30201⤵PID:4048
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:432
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:1408
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:2448
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:5508
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:5532
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5b71e2d6da2b701514f7dc02758aa81ce
SHA168f9c05a209cf6bee251311264da1ed092d1b3b3
SHA2568205b6ab009b93a175e169fc79f7bd19a505a819725b5089ba190997856bce9b
SHA512f225b5b9d6152b2d3e263633a5294ee6c0d34d8913b8a31b49f1f747388ca4e08aa2b7dd53d18fbed05d1133837d9854f0b9a531be6dbc785e0348ee45abd998
-
Filesize
1.3MB
MD50520f88636b6af0dadc14fbcbe924500
SHA109739651c93ec93358ac9769c72030a17d725e20
SHA25610036d1079cf297130ae6221f98b19c3e8ce493afe69068bdaabda95100ad633
SHA5125721d82581e55170d6d25b37bb5332ef7beff75b9333a1195a277ea37f099a6af4d5d74d4ba1452fd3afaa212ba65ed1780704de595452113f47927646ba9e00
-
Filesize
1.6MB
MD511b95b0a26f8d81a056cf81a31d0f7b8
SHA1d01aaf092c3661a036196b19a76eebaa9f0e6d87
SHA2562943f1dc4eedf73c1b0bf5f2ed632cc6c3f0177a62bc602bb51eb6862d74ac9f
SHA512b87d96092bcf95aee1f9b2c2f3d27b8e3061face60603bf7a5c9ebe5cf2f52006d075ae175742a24f5fda91238e6c1cc21b16fd84546fa222e921230a3c360f1
-
Filesize
1.5MB
MD5539383fa63d65396c83d7cccb19478a7
SHA1f83c0fcc94886b9c1e8d45a21b3c587a8a70665a
SHA2569c29c5c5df732e58c327accdd806087bacb0474990999609177f57cfbc137ab9
SHA512a4523d610a53a1351d4a25c8aa740259b8fdf9cffbbf5efb6a3ef2afc069f11aa7c9738c71971a66d742fc4533335b2ab57fbe3d9b36dd797d793e867cc61fc2
-
Filesize
1.2MB
MD5f95e2ecb3d424721cb1b5b4d9be18218
SHA1ec94d2f2da28333e91d537dca5bfff2dd452d75e
SHA256017e3a9ee422f16fb04deb2066718938f269db35b0aa0589308a464010c3ca3f
SHA5128249cd7461d64ebebf47768b36727e23d76961bbb86957ed5dfb26f9a650bb526c43ea0fe0577625b6da9f2a8749850b00b3b46510a068e060cb3f3c9cc7caba
-
Filesize
1.1MB
MD57f0bbe430bc8ed5cd581053ff9c85bda
SHA1836995b54a2561aef4c5ceffcc4bb99972e489a7
SHA256ac4e756e387df340d3492c02cfbcb09fbadb3a1668a0e4722805a3174454812d
SHA51249abfce3211fb5ec2bc35c18bd93d32656651c77093008c1a7e792353325bd42830c33eacb0d54a342307f064d4cda9f249d1508d6ef88d0feb235cd6f8b3c5e
-
Filesize
1.3MB
MD5fabb30fbba0228b73679a79630ffef89
SHA185206b54b6270083de5b922af4b09519b88a70eb
SHA2568ac20dd4158b0b10fc1f56d79cfdcbf244b227aee7ae74f02a4aef1eb9b27e06
SHA512094c37c153efe57cfd6763e4a90963053d8938750cef381184c8b3052197515a5a9277b0e4a3d99588c72c8ded7b1ceded2133704c8d3ae3891aa3107e635637
-
Filesize
4.6MB
MD55d61b483b6bab1b92ca9797b09366876
SHA15ed6cfef4d0d4f4bcf8741370cca43a129ac8259
SHA256adc65692cafa86e283e6227fe729544d2b7df0e7829d0e27e19d4816b89c600a
SHA51260c14cc66c29739a785cd476df9660dcb387d562fcd47ba80a0ae70e101fb7f89daa575c4498237daaf29ee2d0cf5d3f1028b7ce71e98ed068df66e0c615f9f0
-
Filesize
1.4MB
MD52b90f8f28c82cf531a15249bee98cdfe
SHA17645059f8fa2c6914d4f038517de3126ce0434e4
SHA2562d348861801a26e568d1a997d081561fae768b225287eaea707337e248e81bff
SHA512d692ffa8604a05b61de41b6f6a469fe90b932871bdbcc2455c6abd2162452f6c30dda8ce5b7bec16d03e0bd7c06c712f63df52b99486ad9f2890661462a197e0
-
Filesize
24.0MB
MD53d4c00d2fdab112c3195fe5da8421ce8
SHA14996ccd9a8446bcf6ee7113b81cb8a089720e4b7
SHA2567a0c4aa1b6b8f7bd952dae1c9a1a43c2c6b3700fcb1dd5ee7c83d0e35518d842
SHA5129e3930d709dd22e1759fa2153ef0332e0885058afb9eb7bb861cbef67aff1ce6149b6ce583def37adecd2c045ae685902230219298bab9350711a9d46851878a
-
Filesize
2.7MB
MD5522083f63e613bca6b2fe17130e024a1
SHA13dfefaa90d8b5e518b2f3698d6a8bce4e9d6ffeb
SHA25604e94aaf4d8a4483a176fbcafdd2199a1891cef3263681fe5982d0d1854e0c74
SHA51248e78fd17d5751569e8aca9d520baeaf77c98953682815e7adb98d2256de97995447612a7f50133a9396209eb9c7faa6e3e4cf0e2a0378656703f35106d3dee9
-
Filesize
1.1MB
MD5a99e5e590123f7fad581d8f5d1dc41a8
SHA1beb39cfc8c31007640f680a54a1d53913176d3fa
SHA2562ad358b3555e349c589d432f2cc0a94d9d17356b7a87263c544e46e95abcc51b
SHA512bcb1bf0161cfbec69a69f3f21536a0232f61120c6ef8747ab48b5bb923550c3b03ae3761eb16824df50cc70c7dc6836cf380202bebd8ac6f07e21d3aab8c9dc5
-
Filesize
1.3MB
MD574b3653be83e5341d48b75ade5cd5ad1
SHA1ca537a74f385ebb2a66a14114f47c45226163a31
SHA256f483b7d094ddf8a6db9199cc37dad7fdbf31cc1bcd3f980a4e4d0b5b2b2a91ff
SHA51259a586139cc6dac38ada0b9ca7d9779d3f3f52707507e1d56accc1542e5e0d1c6519ceff7a7172b5972a1655ac94cf9750b96024665441de82b95492d655a2d3
-
Filesize
1.2MB
MD5ce8df98a4ed4b21b34c2f632f1c23be3
SHA1c5cda982dc9d9b9eb3564b64cd7c42a3ad7593a3
SHA2564f17b9d05c625e1ba0b32740d4e1c3df29c40aded3dfa6a7afdb11a08421b16a
SHA51262895ac358e2c1a5cca9ce724fb6942aec4637c18a7a140345c35774f4b1b07da9ecc89f5f46afe43f91a5a1d70d5fd9cdbf0cb4f60c265c9fa3b34d3f811422
-
Filesize
4.6MB
MD5570cf640a59df91a1adda70ad3d2bae2
SHA11d7d660358fb570797694123d62974628caf3970
SHA256a1d53d03434cd92c3f4059263a2c8dc962977410e6149792f46f131c086891de
SHA5129ac2d506c927ad104ba8fd040a0e237452c35b5e56ab0475123c2bdbba5a57420df520a414594684b7602c067e0f73b4c4cf2dd60735847ebb5cb57ae7ecc106
-
Filesize
4.6MB
MD57af8106c6d73bf8e1523399586dfe4ad
SHA19473a0d655d187b4bc6105634612c666d856fad2
SHA2565ab3ef378e6059b7dcd88b895e629b7d477fdd56d0b52ddb9ef22614226b1969
SHA5123da8f2ec7e22fd82aa88484c5eb8614427c64125f26dea4f31ac4c08161778211b78891debfd8bedcacf5a5f0b3d19bd4f963041d92b2a793773b9bf2d32c256
-
Filesize
1.9MB
MD5963ef272aaeb4c400a919e69c80c70e7
SHA17045a4387736152be86da40c819bc682839b672a
SHA256dd5b60d0b0c3efa30cd7f03264e90583dc448a045c7e5ec7ae4e9736ad5c2625
SHA51240f015dc32596a8f95bd3bc50aa4e8d7d0b89e8729edbd394fbe34874b2181dc980f91cd71fd7033d87d1413d759f9c4134bbb57f272185a1e873a7f74c3e194
-
Filesize
2.1MB
MD55a4a54cd3045bc97de67e54d43377ec3
SHA1b3df82d41c315cd3399cd2b2a58c756abeab5cfe
SHA256ff44a5d86948948baccbdc06e758a3bde99a0badad69e7961818bc89130969c9
SHA5122cb97557578485de962e8a3ee09d6aa69be0bef3597446e2b573de2a0d91222648b19fe6ec2917c70edf4bf1da1e0d9bd7a9dfd6d7163cfd1ee4ef8ec2b7ac2c
-
Filesize
1.8MB
MD566b1b7058039ab50eedbd679ae10c791
SHA1169fda6fb0f1ae9bdafae2397a2a0b010141818c
SHA256e5411c8409373c18bddcafdbd870347ffb845f61cb307a1e422f4a0e951ab78b
SHA512c093af0ff1ea06418f21667defd187c2f241edb4a46548a5c54d568f788f95cf80bfd9337d5065209291ac5e67dc17447cd2264e47de5e2d0633d72a0912a6f2
-
Filesize
1.6MB
MD59a40378c586c4a6d536feeb5038d3f4b
SHA14d28c0a7867900553b44c7e447122dfdc80b290c
SHA256f96a7f6a541e6f0c1224808d8981d9c92f9cfe878450a4f223c45d8be10dc1f2
SHA512f3fddb83fe554818e35167261fc429426d0043c745432a64e8aac0ba04bb8be15b6e06486c6b60ebe2f51d3ad054272ef6841f788e4c8e275f62af50f4d1479f
-
Filesize
1.1MB
MD5b82307d92a0fece8fb7f7ce50d7ddb66
SHA1a6cc787c19a4f4e9cc3f195809084bd9629fc0f3
SHA2561157a4b0812cad3c8f0f1482df9ffffff4404b0b2364cb7d7e3abc96265960f5
SHA51287e4cba67559654ad3e7f3c79bb46cf5fd7727cfdc1e741e2ce1690a58bbce3f11c509653ce0e2d57e7d0567700a315e355adb8021205bf90d837d08b3f7dad7
-
Filesize
1.1MB
MD5725afc5dad55567251e41d40ae312d89
SHA1ac07a0142b6b8c95ae30dbd899231183bcf5c4f2
SHA2568dba03e9f07a2fb2a03a5af2683e9463af9b98b94245c130fa3d3683ff2c333e
SHA5124f5274000d62536620387bdb0465f34c8d9e38d4efdd59885c2c0ef5e0fd5af5eff2ce59541020e0246749543f50e36bc1964cb02238ab91f63d709047cc4868
-
Filesize
1.1MB
MD52f3154963eb60ab594c49286a6c4024a
SHA1b6ee3f2a512b0715655f0bcd8074d3f01758e787
SHA25690b09dee9c9a92637a4b9d897bc2d700c14a5dd074be46848f538961f146bae9
SHA51297573ed1c0198687c7b09bd79df571356fd12c14f562367ec91737960013b4843453e8add810c4ac992c069d6c32f96598d7260befbeda7b5a6c1f622c209db8
-
Filesize
1.1MB
MD5e372819c150c390e97dc810bb461e6cd
SHA1cec4d9c95b74f917fd4743c8247eab9f00a78999
SHA256bfc9ebe52cc40f6c97a84f4878bfeec06251197271d76837738697d76abdc700
SHA512c39301a1194411acf9651a3623f85b1ea6f7ca301267f755eece269b48821c807bbc4d71f531acdf8f6255bb348d4684a22318be28b8fd60c1c8c85bdfed91ff
-
Filesize
1.1MB
MD5b4b72cd5b6e40b443e23d983fb4bcd42
SHA17b89e22d8dc199fb49cdfafe4e91d9ea6ad7138c
SHA2560680b301f03b963276c846d5af2c8748946c9dbec2f0b8b277072fcd594e0ecd
SHA512151ff4b51d68aed9c1992bd4540e7ffbb53c00cfead8f4518517463681db18324e9770a4ab1395257eac22a815f1f2457c81fb8b8637d0f2cee3d1249bac5e2e
-
Filesize
1.1MB
MD5152edfea2346b4167cd3902962828eeb
SHA163ba0eb05cb7bfc0db904abec64474f708102a58
SHA256364835b8f6e7c0e828d982fe55bde62c289aef91732f31a8ba1198b739c5f5e7
SHA512152978d1e83d55f270de20e2bf5a9141abddb4e16bc461e9ec69cb4ceebe04fbbaaccb00e2c3edac6b03ed21256f46f1b6d665a59058bc0943188deeed387ee4
-
Filesize
1.1MB
MD58ce18e1963c79f559effdb3c98d89edb
SHA1258c95129c6e31de0b97a8ff7ce3898fa43826a7
SHA256abb22d2fb26353b2ec6eaa02ca85a02a357205557986878602a34a29882e9171
SHA512292c025eb401c53cde30c5759f90fca588bd1d87b1d05839f39a6bb070753a0f3c1e6fe87979425ea87ef60d915f7c0e19717724d0e4fea34bfe4b1adbe7d30c
-
Filesize
1.3MB
MD5cf644de61aad6894bad944d6c9737a55
SHA140d685e4026320e15b8faabe9c0cd0d254f010ca
SHA25620e8b38c22a94eeee6b7461e85fe96f98e75e7f93e7db28c5d68a30bf7e4cc92
SHA512c0519083a9a560d3bf1078504a1db081dd21f74fa6ffa625689c358219f49c46a507205d676ad808bd7d703e255286e36ab443c85fab5cac8335ac0f22d737ee
-
Filesize
1.1MB
MD514760feba5ef5443c6fc345fcf95c497
SHA1e4242c1b3be00e04fb8358da2f1f43522472f11d
SHA256a38476ef6f29aedf8de2f9df7aae8d266bf4e8e7b385889dbd52cfa28613b8c1
SHA5124d2f6382a79616ae66dba0a1dbd00c06bea05cc0b133104e41b227b89004118e224d64f2b2adf1a59e629bf7906d2c23a4a5b49b28c4fd071c48bdd65e9ec8b7
-
Filesize
1.1MB
MD506d1a1b3aa892abc6247f8a46582b265
SHA19dc373cad083cce2fbcdf9b1b98185974a0a5c9c
SHA256c3ac4c384787d7c44273188636630bb11ce80a915318c32519e49e9e429c625d
SHA5126965699f7b31584cdcf16bf22ab3e41e9c9e8bf2137a4bc39a4f45a6c59dd28e42a91ad942f30ba79a2040b521dea4fe715febaf01766db05de8a22eccf37f42
-
Filesize
1.2MB
MD53ed88e3bf6e32fb0eb5f240be5edfee5
SHA164df0d106260115b904c551a21d2e5ed6be75e46
SHA256f7c65b7946705d49381fa94d4a6ea07199a38a909b1ec468fed195af71ddc220
SHA51236f6b378300b1e48b5fed4ebeed62897a4fa64d952dbbcf90cb97df486e82453486c632ddf29e7e652f25880ab3a9bcc68279f0b0c406894896f59c05ebfc9ee
-
Filesize
1.1MB
MD527b752f79217048fa8e8bb94a85bc611
SHA1dda608da874ad020af8323aada55b79dd07db542
SHA2565eb62e3d8db12142a3f02594ce41f09c6a9b74f82dbe7f4f839cc189ec6e26a8
SHA512b12a5f4ecd51096d9dc5c973bc3aabbb1a8e7965db436948acd660e1b2d95310f9386f8bcc73f6b0d6fc3b7a41900bea0113b75a4523fe1b24f1ea559a227fe2
-
Filesize
1.1MB
MD587068f2d2e6a8c932a353f52ed941bb9
SHA15dac7b6b25a9f26d7628271930be56178e252e8d
SHA2569135117e66cd66afef7e4d49f9a3d36728daad4d5a044f1c8d4275540594974c
SHA5125874c7711342670e64d920889141c2fde0145ada6d6b7081018dee5b6b87e6b3eeb22fb2759d2996e24da0927c08bc5ec95442ca4644ba01c685bdbbae979d4c
-
Filesize
1.2MB
MD57300bf492a2450564ebf44c39d3d8a1f
SHA11e331daea96d4531a57624f22e4fc1cfd3fef98b
SHA256626304593705ddacefcaac19226423f9c8b97efb933b246053c575d6ec57ea45
SHA512c99bd6d083e6bf9deb18bb04438018d097cbeb5434a58e86c15476d23d41a635c42eecfa0d949cb7903f62eb971a88b8c24ba8d10ab0ffd0b3fe4a912562946d
-
Filesize
1.5MB
MD54098a81b9c0b6c68c14489b937c75768
SHA124f53c5d28e31265a4a59308d0e87c36dadd5123
SHA2569ce2bf07977eceb07bdc83c1c73670e362d7dff89dd5e26b609e8ed152d51ddc
SHA512cb0c5a08cdbb5d10a584035c6c80e4dec90dd3a9f12682f40422fe9c911a1f7693f347a4b119e7616a9b0a0b4a50576ab254dca5cb0ed4e5623a0d48d11aa1ba
-
Filesize
1.2MB
MD540c0e63c974ab310d4646324229cda0b
SHA149ed94bfad8ea23c64a40a34c7d4f6b0feb4fa49
SHA2560e8bc6ed9f0a017257e6c24766c0f5d7f38b0d41061c7a26157c368b100718e4
SHA5128558962621ad8ddac823477cf47d61198b4f7904908d7afcb121050c4dda95a498cc9099a007b38b1975d8af8d3517ef421c6fe4f1707d90a670789fe8f456cc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5c7ac5a21cac5bd5580a6e28112212613
SHA10a256177c387053fec680e599bcb63729a16c161
SHA25689e0e7dc8ad418f8613610b71d0c140247e26a5f9a453ee255b1467fb80f15ff
SHA512753675a75b643132e50175d67589a3952cb5154a7e51c11883b2e28bf4fe406afbaed88e61575cc114156e41ed5c587b0f76845e6d20ddf922e775bfff3f0b43
-
Filesize
1KB
MD5d6d134fe65e44066c28a7e2601dd0d84
SHA11467418c36fef9e9b587cf0cd5ba5f1d927459ce
SHA256eb9ca6d4f1aa10a90a7da50c2a064c8fe333e832e6c10a1aa01f1aeb3165a0bd
SHA51259c32869708ae35d0f531ee5627c15344db9c87230d1c00b6aa732323ab789552c4983414ad2bf660ca5ba36228d8d8ad4b2eecee8247a970cfcda7551103d46
-
Filesize
1.1MB
MD50a03cc6a86420a77744f33ace4b529a9
SHA13a985f475302aa768faa374afac762e4236b55ee
SHA256a53bc85ca52aa8b36e87a53c498f4cc30f52114b7fdef47a939b6823aefe1e36
SHA5122a452b1fa2ecd15abccca6aeee6f9e3c2f555f66c63b8e442a4b9d16694bdc065ddb6397a1657089107e21c6a077d2f75c405c6746f1e3e5e95323bd707d0ea3
-
Filesize
1.7MB
MD50af54dbbe9c4295030418a4ea45ca828
SHA17e465f21d35b58c359849de079196f4f6c54f918
SHA256ef2b26d6a231236836ef40b06174f75c2d90ab1577e0259d2996cab42f6a1ca1
SHA51290dc738a9d075e4b81fe13ac385857609a73d7953076671e64571c7f966c74b6e8a44563aa793f09182914be76cc07a9505f04909f5f431e1cf711ed8340eb16
-
Filesize
1.2MB
MD5eb72a62800ada738c1c35a7c9e633493
SHA16e465d9c1c85046f7c04339fb4e5bc8fc8ce2564
SHA25626473dea2315904ed378379e5d5780db805a0fc32c5fe06d3e91f396a9b5bdfe
SHA5120c0a92adb3b2140292f7ab5f70f725ee0ba181cd8a7e7d12cc1085525bdfb42bfe3c692f5f37e4d82fa1f22b606ef6ffb5f656c9d59b9c54469ec434b7d02752
-
Filesize
1.2MB
MD5c7b659b5fd0bf77074ffabc26ec6ac6e
SHA1ac0139f9c40dd7c909d62cce9d8dcaaa0d7f2510
SHA256cf28b3684838852417f6ab5e555ee316fb6a0076ffb3fdedf901aa7dfe5ce049
SHA5122969651b86692095f20df3892e5cac41e2c1a5d7c4a8760159cc69864573556be89d63ad5122e837b9595b263185ce4f1305953391c8f750ffb3cd7c67b5a8bc
-
Filesize
1.1MB
MD59f69ee7e143d01183134f349d55cdb02
SHA131a220b7e037497e7c192f2a46a07d03168424f0
SHA25613089f376a72ef929cfc16503d58234d6c1a3f9c57bbaecf9786d87af8b64962
SHA5127591dc53832fa12623fe5773f86fd6b4a8f1cb416610300be629d974475e149b211cedfb3cddf30aefe9de403c360730e4a6bca9d9f5930e81354d3edde70145
-
Filesize
1.4MB
MD51a23e4cf999006352a285e0658289906
SHA16cdfd098d6109ca14b677face3c85e60e1836ba0
SHA256b1db4eeff31615f7cedbdcdf9e8173d1f7d5bbf104ff01f4fd9bea8f19371b78
SHA5120a5176f48b9ce5d3bdd33afb267954cc76ea2d9d43a496df5f82bde1a835045b72c76a730881758a7f01bc85b9b5bce644d24cedbe2fefd3da0b801d0adee83a
-
Filesize
1.2MB
MD55608fe18a694d6b78e8bd1655580d118
SHA1dbe135f75c68a71ad1af9d84575bd3153c0e970a
SHA256f27157f552ea75999bd97c4eb7aafbc59261dfd1685e42f6a92ec8af8155811c
SHA512f21221cbef8782e488ad93098a63c58c3067a642920a8dbfab08301e364a13055eef2b293d386c76dafe649f3c35b0f7a0197cceb39a87bf8a6d24c36bf0ff86
-
Filesize
1.4MB
MD5bb7dc62aa8d350e61879e2162b25636f
SHA12bd8f9f39694626162e85c15574499fb3e6c0fc1
SHA2560a48d49a8345b1604825d76ed01778b67bb6593d31122f82959de4ab1f066633
SHA512f7f93fae41a3f8349ca28000eb4738d75ae84662ba2b7fc5950925dca481902b3389efbec7d9412fe0857eeefd9719db88ffe3ead7cab98db15ca4f07d171788
-
Filesize
1.8MB
MD51c8038f824c7fed1d2cfc0e796ec906b
SHA1e8b3bd6b7390003a08786a7689391435515e40a2
SHA25670ca031648a4a6d5991f0786e2ed88a4e96d6690ed26b9a95fc3aa85ae1573b9
SHA51221dda8ef695baf1f0c80b882b1ba110c1ff585d308b687ed93eeaa9a6193d3f836779b0326d48db5be8b87f179fc9689c02abee07fe31d85e3eb93735f96dc82
-
Filesize
1.4MB
MD5a5dc1d5954fdf30bffa125b6104a2e51
SHA18cc9ffd4a986d657fac3668294f4cd0753037989
SHA256e76b0e33eb7b0225c10bf3597e20f5ff7441e8fb9c2a4958bff109a8702e8c81
SHA51233989b08f4f15c74110fe29dbed53cb9ef1c7c99f9ecbb680119d1d1e81d683b156b0f7cc59e136023da613fbac5552f49f342402caf327dd2728390b9392899
-
Filesize
1.4MB
MD5849ddaa629826b12995833de76387efa
SHA1204e6ba8a9fa49c622bcd64f89f1cd5c54201659
SHA2567d4b64c909964909ef743a759535f3672e0016f3a5ce327d1fb9ee5db30830ef
SHA512c586569acef47b19c2a16a67dfa3f6681afd0079b018116391881aa8068f6076623d60fea50d5eee35cba9e3d42dbda80b46a9421f449ec6643b315c0f9542a9
-
Filesize
2.0MB
MD5a451cdf504a8f02c5b57ac8804876d25
SHA14cdec39bde59494876bd51cd540e9ec2e6a80653
SHA256b79c5cbbf4aa051a53f602545467577aa0c9e17c66aa3cc054442476e64537b4
SHA512decf84598af50c817981c46009edbb63fd06742ba72f2999b2739348f54fd7981919099a44b3a7446053b7c51698f1a843da5bf47652c76c33288cb18b6bd0db
-
Filesize
1.2MB
MD5c1bd078ba3263921d88554d278ac3334
SHA18066f11915dd33a33fc5015ca7cc1b6b4cb1a6ae
SHA2568ff890a63d316ea3f4e8eaef9ef99399aee3193997fd40fd47d4c567b3b227f8
SHA51252e0b97d945a14aaa5ad5660d9932c4e1093cd9bc4f455b8d3f8119a02bf22f14712bbe173c1aec153ad4f470a1955c9710f0e9a515a125b482ab8f15427a921
-
Filesize
1.2MB
MD5b852c0e4c3b421ebd7db194b7f59eb9b
SHA11a00f2226007da208ebc5659a2bdf6e52cc3c13e
SHA2561076d66dc3b9358f1e16398ca327e01ae87318face6d71f881a76edab2b18b16
SHA51269c30e79529cd669f08a84cd0496b265f2e412db218aa374cfe0375cffdb7d98ded8ea5d60f7310245f9c38c37f366f11b889fb2bf316a92c84e2e1d57a5d8a4
-
Filesize
1.1MB
MD563ec18f27ca79b71e613be46efaad547
SHA1d1cff5168fba07e19e800cb24762d1ef82ddf3c1
SHA2562127c6c5e6daafab08292fa975eddd56c59a9bbd0b06fc5deb08d6ad35d1762e
SHA512a9430e75a02cdef85856170d53b4986d9de99aa6d762aaa8f535fd319e3c010cd707694293eebdcd277c4b18ca3e2faf01fd47fb46b66b4288bcb536958f82b5
-
Filesize
1.3MB
MD54853ea84828f371fb70e9b87548271c7
SHA17fd17ad8c27dedad63d777989d4b44894a001ab6
SHA256ae2bed2b5b26a621a7c64407213e3107dbe9ea5b9a465b0c2908a2eca49da128
SHA512408fbcffb291a0c3397cf8337929849efdfe8b03abbe08df8e9a393efee8b456d92bf7f0a321245bf12065b421bb492331af9350528db8d028a9319e56ffb4da
-
Filesize
1.3MB
MD5498d3571a03065f2f1ae49b0e1e9f710
SHA19a5640806ea56be67de91a3c3f52aab73a710728
SHA2569aec91eb18aa1873bf10af3d81edc6bd3198812a72186fcb1b34424a6f55581b
SHA512dfc0caa9373ecaf216f30ee900371817f9fe13547887782926384cf563f2e58716840b70c0226f3cfa80d1f59a05d2a4a606d3228f9ccb3e7579d38bd657a89d
-
Filesize
2.1MB
MD5deda9f671b962137f600fd54d3bb985e
SHA1e94c9f0bc7c2ae6dc06104f54952882fa2238af2
SHA25631d2620276c308a0832941aa563040caec518eedb31ee847400610eb2d4a2eff
SHA512ab8715930931c253f43ec15b67469a1585909093ac2afb533d08fce6e416920ebc7ed9939b37cb2a614f071e60dccb9d44e686f9904a29f505fc3c94609a03da
-
Filesize
1.3MB
MD558b480711874df924727c7e63c1fa45b
SHA13dd47d40136d3c10806d6e3cad83e1b22da576fc
SHA256c0dcc186f3af7be698ffb412073f85064891c2226c01f1503c65bac7c462a68c
SHA512bf834b29f20adaf800ccbce48e392c4482cfbe906623d10da4973380dacaf870eaa19071cd0a752309c3f13c4500b614f71524af3a1be80269b37d3fe7cbca51
-
Filesize
1.4MB
MD583dc4bb8d1c044bc0e3efd2517ed6533
SHA18a70e02e3bf1c4b0f6d2dbc3031575611fbfdd53
SHA2562d9c6f6abf6f2523c6977af8c2168e04130be61729436bd3d5983d03de0f0ac6
SHA512d06fe71925ca5fb0959e0f7074cbe57b221a92b056901c94354c782102afb3ffb7bf731aeb0aef582f76497a378d21fd08ca0b71fa2c45f66eb1e99da3d7c685
-
Filesize
1.1MB
MD5e0b0d23f8723eb2646c29c6199a3206a
SHA1db191a9bb146ee18473a8d32a09396a9063f4660
SHA256b95f4e779b0d44737c8064b3cbab459f229f7191a49549be8d8a3dd3eeb4f88f
SHA5128d1c8d64b8e6bbee08532ac065079a11a9148138bb28509816fc07ecc574b1fa2a5500798877d059588770a651301e24df3cb8ea144ca85689940326991dbcde