Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 03:24
Static task
static1
Behavioral task
behavioral1
Sample
cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe
Resource
win10v2004-20220812-en
General
-
Target
cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe
-
Size
687KB
-
MD5
55518a860fc98bc805c6e295c21b07cb
-
SHA1
d019b7c7f1862641fd75ca0e22129eedabb58389
-
SHA256
cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a
-
SHA512
bb7c86ad66075bf494b7665e70856131cb229fa77b0de1bf99079f6f81084b01ee0fb293fd7f210dff4c2f7300a36cf76ad0b52ce3c5811ad5ce52105fb139bd
-
SSDEEP
12288:dZjMLf11MmPQeRXEHYYS3gA0FJO1t3r6QcGuA:dafIiy4NwdLpQr
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 1996 baidu.exe 1976 遨游下载.exe 1316 酷我下载.exe 1696 kuwo.exe 1360 curl.exe 640 KwBindApp.exe 1392 duPlugab.exe 1064 KwGameLiteSetup.exe 624 KwLiveSetup.exe 1592 curl.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 1584 netsh.exe 940 netsh.exe -
resource yara_rule behavioral1/files/0x000a000000012752-56.dat upx behavioral1/files/0x00080000000133a7-58.dat upx behavioral1/files/0x00070000000133ab-60.dat upx behavioral1/memory/1996-69-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1976-72-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1316-73-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1976-74-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1996-80-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1316-81-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x00070000000133ab-85.dat upx behavioral1/memory/1996-86-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1316-108-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Loads dropped DLL 49 IoCs
pid Process 1696 kuwo.exe 1696 kuwo.exe 1696 kuwo.exe 1696 kuwo.exe 1696 kuwo.exe 1360 curl.exe 1360 curl.exe 1696 kuwo.exe 1696 kuwo.exe 1696 kuwo.exe 640 KwBindApp.exe 640 KwBindApp.exe 640 KwBindApp.exe 1392 duPlugab.exe 1392 duPlugab.exe 1392 duPlugab.exe 1392 duPlugab.exe 1392 duPlugab.exe 1392 duPlugab.exe 1392 duPlugab.exe 1392 duPlugab.exe 1392 duPlugab.exe 1696 kuwo.exe 1696 kuwo.exe 1696 kuwo.exe 1696 kuwo.exe 1696 kuwo.exe 1696 kuwo.exe 1696 kuwo.exe 1696 kuwo.exe 1696 kuwo.exe 1064 KwGameLiteSetup.exe 1064 KwGameLiteSetup.exe 1064 KwGameLiteSetup.exe 1696 kuwo.exe 624 KwLiveSetup.exe 624 KwLiveSetup.exe 624 KwLiveSetup.exe 1064 KwGameLiteSetup.exe 1064 KwGameLiteSetup.exe 624 KwLiveSetup.exe 1064 KwGameLiteSetup.exe 624 KwLiveSetup.exe 624 KwLiveSetup.exe 1696 kuwo.exe 1696 kuwo.exe 1696 kuwo.exe 1592 curl.exe 1592 curl.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kwmusic = "\"C:\\Program Files (x86)\\kuwo\\kuwomusic\\9.0.8.0_LS0\\Kwmusic.exe\" /autorun" kuwo.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\css\iconfont.css kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\02.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\cdpack\second\cdIcon_mid.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\comment\face\emoji_42.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\i_play.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\static\content_newDaySingle.css kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\static\content_rankList.js kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\KwAppTreasrue.dll kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\comment\face\emoji_61.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\icon_share.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\js\pinyin.js kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\KwWebKitDll.dll kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Skin\base\createlistdlg.xml kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\play_radio\new\icon_arrow.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\KwDPGame.exe kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\static\content_album.css kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\static\content_classify.css kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Gbradio\DuiLib.dll kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\KWMUSIC\Conf\user\config.ini kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\content_classify.html kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\content_newDaySingle.html kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\css\upquality.css kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\singleComment.html kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\libcef.dll kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Gbradio\skin\base\icon_hot_s.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Skin\base\cursor\hand-close.cur kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Skin\serverskin\5005\conf.ini kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\res\DeskLyric\DL_COLOR_nomal.jpg kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\res\icons\ac3.ico kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\nodata\no-download-grey.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\play_radio\right.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\natives_blob.bin kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\css\content_rcm.css kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\plugin\msvcr120.dll kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Skin\songwallpaper\1404976371588.jpg kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\plugin\out_kw_ds.dll kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\comment\face\emoji_106.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\singleComment\default.jpg kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\static\uploadSong.css kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\static\whole_rankList.js kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Skin\serverskin\5002\bk.jpg kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Skin\base\DeskLyricUnlock.xml kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Skin\base\DownloadSingleSong.xml kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\channel_search.html kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\openpng8.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Gbradio\skin\base\pic_selectbg.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\cdpack\second\cdplay_pause.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\def620.jpg kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\plugin\avutil-lav-55.dll kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Gbradio\skin\base\pic_bottombg.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Skin\compskin\skin.xml kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Skin\serverskin\5006\netsongbk.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Skin\songwallpaper\songwallpaper-local.ini kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\comment\face\emoji_36.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\headseteffects\down.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\js\channel_search.js kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\dns2.dll kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\js\download.js kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Skin\base\desktopTip.xml kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\img\cdpack\second\more.jpg kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Skin\base\UserFeedbackDlg.xml kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\KwMusic.exe kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\Gbradio\skin\base\icon_unfold.png kuwo.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\html\webdata\netsong\channel_classify.html kuwo.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\WINDOWS\dy.ico cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe File opened for modification C:\Windows\My.ini baidu.exe File created C:\Windows\KwYlx.dat kuwo.exe File created C:\WINDOWS\tb.ico cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe File opened for modification C:\WINDOWS\tb.ico cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe File created C:\WINDOWS\dy.ico cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Styles kuwo.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Styles\MaxScriptStatements = "4294967295" kuwo.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_MP1\shell\openkw\command\ = "\"C:\\Program Files (x86)\\kuwo\\kuwomusic\\9.0.8.0_LS0\\bin\\KwMusic.exe\" \"%1\"" kuwo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_MP2\shell\openkw kuwo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.WAV\kwbak kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.AAC\kwbak = "VLC.aac" kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.DFF\kwbak kuwo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_M4A\shell\openkw\command\ = "\"C:\\Program Files (x86)\\kuwo\\kuwomusic\\9.0.8.0_LS0\\bin\\KwMusic.exe\" \"%1\"" kuwo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_TTA\\shell\\openkw\\command kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_dks\shell\open kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Classes\kuwo\DefaultIcon\ = "C:\\Program Files (x86)\\kuwo\\kuwomusic\\9.0.8.0_LS0\\bin\\KwMusic.exe,0" kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_KWM\\shell\\open\\command kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.KWM\ = "kwfile_KWM" kuwo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_MP3\\shell\\openkw\\command kuwo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_CDA\shell\playlist\command\ = "\"C:\\Program Files (x86)\\kuwo\\kuwomusic\\9.0.8.0_LS0\\bin\\KwMusic.exe\" \\list \"%1\"" kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_lrcx\shell\open\command kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_wma\DefaultIcon kuwo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.MP2\kwbak kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_DSF\\shell\\open\\command kuwo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.lrc\kwbak kuwo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_MP2\\shell\\openkw\\command kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_CDA\shell\open\command kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_OGG\\DefaultIcon kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.OGG\ = "kwfile_OGG" kuwo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_WAV\shell\playlist\ = "加入 酷我音乐 播放列表" kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mp3\OpenWithList\KwMusic.exe\ kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.OPUS\ = "kwfile_OPUS" kuwo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.MP3\kwbak kuwo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_MP3\shell\openkw\ = "用 酷我音乐 播放" kuwo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_ape\shell kuwo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_OGG\shell\openkw\ = "用 酷我音乐 播放" kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wma\\OpenWithList\\KwMusic.exe kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shell\kwopen\command\ = "\"C:\\Program Files (x86)\\kuwo\\kuwomusic\\9.0.8.0_LS0\\bin\\KwMusic.exe\" \\dir \"%1\"" kuwo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_DFF\\shell\\openkw\\command kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.TTA\kwbak = "VLC.tta" kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_FLAC\DefaultIcon kuwo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.OGG\kwbak kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_lrcx\shell\open\command\ = "\"C:\\Program Files (x86)\\kuwo\\kuwomusic\\9.0.8.0_LS0\\bin\\KwMusic.exe\" \"%1\"" kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_dks\DefaultIcon kuwo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_M4A\shell\openkw kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_WAV\\DefaultIcon kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C190FFCA-1E3C-4C52-AAFF-01AD4CF394E0}\System.ItemAuthors = "好音质 用酷我" kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_OPUS\shell kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_ape\shell kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CUE kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_FLAC\\DefaultIcon kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_M4A\shell kuwo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.wma\kwbak kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_MP1 kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_CUE\shell kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_AAC\\DefaultIcon kuwo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.dks kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_DFF kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.MP1\kwbak = "VLC.mp1" kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_CUE\DefaultIcon kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_OGG\\shell\\open\\command kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_WAV\shell\open\command kuwo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_wma\shell\openkw kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_MP1\DefaultIcon\ = "C:\\Program Files (x86)\\kuwo\\kuwomusic\\9.0.8.0_LS0\\bin\\res\\icons\\MP1.ico" kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_MP2\DefaultIcon\ = "C:\\Program Files (x86)\\kuwo\\kuwomusic\\9.0.8.0_LS0\\bin\\res\\icons\\MP2.ico" kuwo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_MP2 kuwo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_M4A\\shell\\openkw kuwo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_OGG\\shell\\playlist\\command kuwo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.dks\ = "kwfile_dks" kuwo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\kwfile_DSF\shell\playlist\command\ = "\"C:\\Program Files (x86)\\kuwo\\kuwomusic\\9.0.8.0_LS0\\bin\\KwMusic.exe\" \\list \"%1\"" kuwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_DFF\shell\open\command kuwo.exe -
Runs .reg file with regedit 1 IoCs
pid Process 640 regedit.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1696 kuwo.exe 640 KwBindApp.exe 1696 kuwo.exe 1696 kuwo.exe 1696 kuwo.exe 1064 KwGameLiteSetup.exe 624 KwLiveSetup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1696 kuwo.exe Token: SeBackupPrivilege 1696 kuwo.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1316 酷我下载.exe 1976 遨游下载.exe 1996 baidu.exe 1644 AcroRd32.exe 1644 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1996 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 26 PID 1160 wrote to memory of 1996 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 26 PID 1160 wrote to memory of 1996 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 26 PID 1160 wrote to memory of 1996 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 26 PID 1160 wrote to memory of 1976 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 27 PID 1160 wrote to memory of 1976 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 27 PID 1160 wrote to memory of 1976 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 27 PID 1160 wrote to memory of 1976 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 27 PID 1160 wrote to memory of 1316 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 28 PID 1160 wrote to memory of 1316 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 28 PID 1160 wrote to memory of 1316 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 28 PID 1160 wrote to memory of 1316 1160 cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe 28 PID 1996 wrote to memory of 916 1996 baidu.exe 30 PID 1996 wrote to memory of 916 1996 baidu.exe 30 PID 1996 wrote to memory of 916 1996 baidu.exe 30 PID 1996 wrote to memory of 916 1996 baidu.exe 30 PID 916 wrote to memory of 640 916 cmd.exe 33 PID 916 wrote to memory of 640 916 cmd.exe 33 PID 916 wrote to memory of 640 916 cmd.exe 33 PID 916 wrote to memory of 640 916 cmd.exe 33 PID 1996 wrote to memory of 288 1996 baidu.exe 35 PID 1996 wrote to memory of 288 1996 baidu.exe 35 PID 1996 wrote to memory of 288 1996 baidu.exe 35 PID 1996 wrote to memory of 288 1996 baidu.exe 35 PID 1996 wrote to memory of 288 1996 baidu.exe 35 PID 1996 wrote to memory of 288 1996 baidu.exe 35 PID 1996 wrote to memory of 288 1996 baidu.exe 35 PID 288 wrote to memory of 1644 288 rundll32.exe 37 PID 288 wrote to memory of 1644 288 rundll32.exe 37 PID 288 wrote to memory of 1644 288 rundll32.exe 37 PID 288 wrote to memory of 1644 288 rundll32.exe 37 PID 1316 wrote to memory of 1696 1316 酷我下载.exe 39 PID 1316 wrote to memory of 1696 1316 酷我下载.exe 39 PID 1316 wrote to memory of 1696 1316 酷我下载.exe 39 PID 1316 wrote to memory of 1696 1316 酷我下载.exe 39 PID 1316 wrote to memory of 1696 1316 酷我下载.exe 39 PID 1316 wrote to memory of 1696 1316 酷我下载.exe 39 PID 1316 wrote to memory of 1696 1316 酷我下载.exe 39 PID 1696 wrote to memory of 1360 1696 kuwo.exe 40 PID 1696 wrote to memory of 1360 1696 kuwo.exe 40 PID 1696 wrote to memory of 1360 1696 kuwo.exe 40 PID 1696 wrote to memory of 1360 1696 kuwo.exe 40 PID 1696 wrote to memory of 1360 1696 kuwo.exe 40 PID 1696 wrote to memory of 1360 1696 kuwo.exe 40 PID 1696 wrote to memory of 1360 1696 kuwo.exe 40 PID 1696 wrote to memory of 640 1696 kuwo.exe 42 PID 1696 wrote to memory of 640 1696 kuwo.exe 42 PID 1696 wrote to memory of 640 1696 kuwo.exe 42 PID 1696 wrote to memory of 640 1696 kuwo.exe 42 PID 1696 wrote to memory of 640 1696 kuwo.exe 42 PID 1696 wrote to memory of 640 1696 kuwo.exe 42 PID 1696 wrote to memory of 640 1696 kuwo.exe 42 PID 640 wrote to memory of 1392 640 KwBindApp.exe 43 PID 640 wrote to memory of 1392 640 KwBindApp.exe 43 PID 640 wrote to memory of 1392 640 KwBindApp.exe 43 PID 640 wrote to memory of 1392 640 KwBindApp.exe 43 PID 640 wrote to memory of 1392 640 KwBindApp.exe 43 PID 640 wrote to memory of 1392 640 KwBindApp.exe 43 PID 640 wrote to memory of 1392 640 KwBindApp.exe 43 PID 1696 wrote to memory of 1584 1696 kuwo.exe 44 PID 1696 wrote to memory of 1584 1696 kuwo.exe 44 PID 1696 wrote to memory of 1584 1696 kuwo.exe 44 PID 1696 wrote to memory of 1584 1696 kuwo.exe 44 PID 1696 wrote to memory of 1584 1696 kuwo.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe"C:\Users\Admin\AppData\Local\Temp\cab3c86eb20e3d67da897032e3415576e59af7f95b570a554ad44a5d8160930a.exe"1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\baidu.exeC:\baidu.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\cmd.execmd.exe /c regedit /s "C:\Program Files\Common Files\tk.reg"3⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\regedit.exeregedit /s "C:\Program Files\Common Files\tk.reg"4⤵
- Runs .reg file with regedit
PID:640
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\program files\winrar\lnxgsorqq.tk3⤵
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Program Files\WinRAR\lnxgsorqq.tk"4⤵
- Suspicious use of SetWindowsHookEx
PID:1644
-
-
-
-
C:\遨游下载.exeC:\遨游下载.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1976
-
-
C:\酷我下载.exeC:\酷我下载.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\kuwo.exeC:\kuwo.exe /S3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\curl.exe"C:\Users\Admin\AppData\Local\Temp\curl.exe" -d MiUwOTxTUkM6TVVTSUNfOS4wLjguMF9MUzB8QUNUOklOU1RBTExfSU5GT3xUWVBFOlN0YXJ0U2V0dXB8VENvdW50OjcxNzM5NTV8e2t1d28uZXhlfXxVOnxNQUM6N0U0Q0RBNjZEMkRDPg== http://log.kuwo.cn/music.yl -o C:\Users\Admin\AppData\Local\Temp\kuwomsglog.txt4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\KwBindApp.exe"C:\Users\Admin\AppData\Local\Temp\KwBindApp.exe" /DownCfg /Ver=MUSIC_9.0.8.0_LS0 /Src=kuwo.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\KWMUSIC\duPlugab.exe"C:\Users\Admin\AppData\Local\Temp\KWMUSIC\duPlugab.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1392
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\KwMusic.exe" 酷我音乐 ENABLE4⤵
- Modifies Windows Firewall
PID:1584
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\Program Files (x86)\kuwo\kuwomusic\9.0.8.0_LS0\bin\KwService.exe" 酷我核心服务 ENABLE4⤵
- Modifies Windows Firewall
PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\KWMUSIC\KwGameLiteSetup.exe"C:\Users\Admin\AppData\Local\Temp\KWMUSIC\KwGameLiteSetup.exe" "/D=C:\Program Files (x86)\kuwo\kuwomusic\KwGameLite"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\KWMUSIC\KwLiveSetup.exe"C:\Users\Admin\AppData\Local\Temp\KWMUSIC\KwLiveSetup.exe" "/D=C:\Program Files (x86)\kuwo\kuwomusic\KwLive"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
C:\Users\Admin\AppData\Local\Temp\curl.exe"C:\Users\Admin\AppData\Local\Temp\curl.exe" -d MiUwOTxTUkM6TVVTSUNfOS4wLjguMF9MUzB8QUNUOklOU1RBTExfSU5GT3xTdWM6MXxEaXNwbGF5Q29tcGxldGVQYWdlOjB8SGFzU2hvd0NoZWNrOjB8SGFzVW5DaGVjazowfEhhc1N0YXJ0TXVzaWNCb3g6MHxFeGNwdGlvbkFib3J0OjAuMnxTS0lQVFlQRTowfEF1dG9SdW46MXxTdGFnZTo5M3xJbnN0YWxsVGljazo3MjQyMzE1fEV4aXRUeXBlOjF8VVVJRDoxNkI5M0MxMjI5RTU0QzMwQjlEQjhFQjJFRjZBQjBFNUpJa09JaG5VZkFHSTdiK0UzbE9KMDB4ODZGYmk3UkU5fFRDb3VudDo3MjQ5MjU3fHtrdXdvLmV4ZX18VTp8TUFDOjdFNENEQTY2RDJEQz4= http://log.kuwo.cn/music.yl -o C:\Users\Admin\AppData\Local\Temp\kuwomsglog.txt4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1592
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD59df8e3ebf49c0f5000796026d2116482
SHA102912f1f669c06f21ea28e115a35fbc56ba9c574
SHA256bb2404c46309b94011d995042f5dcf3a94d68b00f860790e33c547eb61685ee1
SHA51214a02a7c3cb831cf08b532031ad35547a6176b3f552d6aa26566d7b24913569b43eb7b3cf53143aadef4fa372dca19a149c0977bca25f872d9d802151dc53f03
-
Filesize
65B
MD50b85d41824c95f1f9f6e7d156bda45c3
SHA1e125b3da52d5ffcc5b8645040d3901f29fb2ecb3
SHA2561b111004473dba2fdda9abb64c3ede24ab0b7c7d38f81f893819038a18731343
SHA512f7e28fcc262e2181f20eb4a100c0d9bc8e6623c96a611383523c514aef2afda477b5d366a3760ae99d952fc42ef557578df6b2acfcda7b83ba438319de1ca0b0
-
Filesize
332KB
MD5bb58575b85d019341a8c71e0c576bb90
SHA162bec7aa600b52b85649c22bbfc629739fd3ad7a
SHA25645ba3c46dbbbb1a271e4e2f02e88d82194caa5da6ca75ca90ef48d45dbdfc9ef
SHA512c4170b852e4b75c26cc959d490bd2dc5b12bb9fe13f3dc579def153d50c043bde43a2fe8f6948c3fb34bf38321c44ae2e75db1a242d83ee1defff9a6150b7afe
-
Filesize
332KB
MD5bb58575b85d019341a8c71e0c576bb90
SHA162bec7aa600b52b85649c22bbfc629739fd3ad7a
SHA25645ba3c46dbbbb1a271e4e2f02e88d82194caa5da6ca75ca90ef48d45dbdfc9ef
SHA512c4170b852e4b75c26cc959d490bd2dc5b12bb9fe13f3dc579def153d50c043bde43a2fe8f6948c3fb34bf38321c44ae2e75db1a242d83ee1defff9a6150b7afe
-
Filesize
367KB
MD5d4776c853608c70e865e0c6e16f06d72
SHA108b3ff4b96c4cca46ab3cdbfc7920c0a5b9e1617
SHA256840289ab6310ebfe84533293849d595fd99bc05660efbeedb0698db4f3a65b7d
SHA51230a43dbf7deb78932cba516ae60f1eb6aaceb1ad5d10319900bcac41f51409b1d0311240607644ad630a0f304fbdff6889e168959550f344b31fa72ae5a7deac
-
Filesize
367KB
MD5d4776c853608c70e865e0c6e16f06d72
SHA108b3ff4b96c4cca46ab3cdbfc7920c0a5b9e1617
SHA256840289ab6310ebfe84533293849d595fd99bc05660efbeedb0698db4f3a65b7d
SHA51230a43dbf7deb78932cba516ae60f1eb6aaceb1ad5d10319900bcac41f51409b1d0311240607644ad630a0f304fbdff6889e168959550f344b31fa72ae5a7deac
-
Filesize
195KB
MD5611cdc13cbd2825369d83a37d6a1b93e
SHA1fe7621cb14de992e4375098f498f79abf637e3a6
SHA256ccb7aa3689ca9267d2a03f228735eb14c0872e8ca9cbb832d2746d95bb7cb957
SHA51278375437608c95e419250f2a8372aefe4cc198398f306a1a21b70aaf7d0eab9e2e685d4585de1eb74960c75499ffd3247b812575e6fb224e9aad2ed4d4fd7bf3
-
Filesize
195KB
MD5611cdc13cbd2825369d83a37d6a1b93e
SHA1fe7621cb14de992e4375098f498f79abf637e3a6
SHA256ccb7aa3689ca9267d2a03f228735eb14c0872e8ca9cbb832d2746d95bb7cb957
SHA51278375437608c95e419250f2a8372aefe4cc198398f306a1a21b70aaf7d0eab9e2e685d4585de1eb74960c75499ffd3247b812575e6fb224e9aad2ed4d4fd7bf3
-
Filesize
704KB
MD5882b69f2a4e253a212fcd18283fdfba1
SHA1753f12859538cbd0fb957bcc11d8d5207afa21a9
SHA2564afec43ba8c8bba79506a767752567d6f96862fa46ddc4c3dc3d7a55c5abef30
SHA512f863ebc854ad8f7f71925119806c45253cbfc4dd369a523126800be3f8639498eb17bf0447f65352dd9dde6cbaa1236ea6158d5afab55cd2f79dcbb46d2c21bd
-
Filesize
704KB
MD5882b69f2a4e253a212fcd18283fdfba1
SHA1753f12859538cbd0fb957bcc11d8d5207afa21a9
SHA2564afec43ba8c8bba79506a767752567d6f96862fa46ddc4c3dc3d7a55c5abef30
SHA512f863ebc854ad8f7f71925119806c45253cbfc4dd369a523126800be3f8639498eb17bf0447f65352dd9dde6cbaa1236ea6158d5afab55cd2f79dcbb46d2c21bd
-
Filesize
659KB
MD56b535f795bf0325178a4df17ce4ad09c
SHA166b9bcd039653ca654d779ebf40109ae4cd1d818
SHA256264d69e8a7ca1afcdf4179429d74a9098187c3f8a5e06080d2758682313a42b4
SHA512e3b0323570ef1faf4284e8199f0b0f9f2de8d49bcca63bc15890254221e0dccfc327d9ebb754b4c98d5e51771c732589f5ad43c7d09b11d8e8848317c2793f0b
-
Filesize
659KB
MD56b535f795bf0325178a4df17ce4ad09c
SHA166b9bcd039653ca654d779ebf40109ae4cd1d818
SHA256264d69e8a7ca1afcdf4179429d74a9098187c3f8a5e06080d2758682313a42b4
SHA512e3b0323570ef1faf4284e8199f0b0f9f2de8d49bcca63bc15890254221e0dccfc327d9ebb754b4c98d5e51771c732589f5ad43c7d09b11d8e8848317c2793f0b
-
Filesize
44KB
MD5bd03e090a9121c50b4080a7b86effbc7
SHA11497ee530c53cb9c055fb013b5c11a5e9203e112
SHA2564c1db3ae2de0f74b8fb1af1b493af1c4a78779330b14e1f27df2aad6e407b199
SHA512704ce7f3f6be8876d032cbf6986c5764ecaa66481b8a0ce49e89ad7ebd035ca72dbf6b9c16667edbb2a8122b33021409dc496c3a99b9588cc17fb9cf86718ab8
-
Filesize
44.7MB
MD570bfe4758f83f8e77849eaf06aab57e6
SHA1f5c5d93fca37474abb931a81b99e3d15ed20b9a0
SHA25626d4204cdab28580e2de82d9ce3fb5ee92d6694967005ef1d040c7cc8cf249ff
SHA512fbae42b97404e6ea1aba6533bfd5eabeac7a84924c4b2d98e11c13d378cfa90063f12219c6c7a6f3b5d5505a869827cdac53f49a77dd4f7530f4fb43ceacf506
-
Filesize
44.7MB
MD570bfe4758f83f8e77849eaf06aab57e6
SHA1f5c5d93fca37474abb931a81b99e3d15ed20b9a0
SHA25626d4204cdab28580e2de82d9ce3fb5ee92d6694967005ef1d040c7cc8cf249ff
SHA512fbae42b97404e6ea1aba6533bfd5eabeac7a84924c4b2d98e11c13d378cfa90063f12219c6c7a6f3b5d5505a869827cdac53f49a77dd4f7530f4fb43ceacf506
-
Filesize
6KB
MD5fafe0ba6bf117f0233219dad1cb8d95c
SHA102e7810788ea56ddee13c53eba6cd3dec1b3735d
SHA256340fde09372e9d1df55363ebac8ff8a6152a0fc6bcfabad49b5281db98e74a70
SHA512d3aa0adb7933b782a02ff15c879dca4d6afe7a53805d9ac5e760f266850ff239d1af107b441721b2daeb1b9708ca127a0c8d3ce8f81df43a10008a941b72bcb8
-
Filesize
6KB
MD5abdc11d0bbe3c10554bd8f245cd06cea
SHA1d4154fc99c3e2928b6462984fbbe6e635702cbd0
SHA25619dbe0d9f59c5b838076110befbddb7ed7ef870927e66d96bbdb6020ad845ac8
SHA5123873d87bd76c197f1a0e5b29a1e6629256231a028fc9550f8d197cba8310d794a2f7abcb66f7f96dffd2d854632a4a306ec7e9cb375ea41ed8378dd6abdb014c
-
Filesize
6KB
MD5abdc11d0bbe3c10554bd8f245cd06cea
SHA1d4154fc99c3e2928b6462984fbbe6e635702cbd0
SHA25619dbe0d9f59c5b838076110befbddb7ed7ef870927e66d96bbdb6020ad845ac8
SHA5123873d87bd76c197f1a0e5b29a1e6629256231a028fc9550f8d197cba8310d794a2f7abcb66f7f96dffd2d854632a4a306ec7e9cb375ea41ed8378dd6abdb014c
-
Filesize
209KB
MD56d76c4878dd76c4f2fc6784e9abd6062
SHA18115c459d0d5cde8d77a959717cb11f2df993f2b
SHA256e738eb3ab7a45affb03d30bd5b2eb674e024329bde0875b607038785ac8a5f62
SHA5129e9a2575f3069217c3e6e7ecc165b9ae9023f8ab841af22603deed7eca82f27394625b7117e9c75e8cc3af9631d6155091bbe6a1a9d82695dfe95872362afe60
-
Filesize
112KB
MD5401fdd0e92000d6eab8a9213b93ab8da
SHA155698e86f489c956b68dc3f11f72375be5d147a2
SHA2569190909ab8b05c4ef991491b8e5d893fc752452e8ceb06a8741c8e028a880242
SHA512befaa1c827b027e38c5a4dac2b6be65e6a23c62eb19d27891df68c614488d768f678fd181820fb9696da8b7bc33766ee3617cbe7ef70b82e9e93639fb9849007
-
Filesize
447KB
MD5d3016fb447b1ae583a8c082ef51a790e
SHA17d12e398bc7c8e754d2dd1c6a7c9d3ecbe703da2
SHA256fef67133de2868d11ef009dd2202726fcd57fe6c96b0db2a02d06518ad0aa2d3
SHA512079c01555e8ace2201626c8598fd2a555aa55e28607bc999a0f88c507a717b9afa1854afa38644460d56cdd90db1078622bff7f0d4b0f070f799ffbb863d9ede
-
Filesize
447KB
MD5d3016fb447b1ae583a8c082ef51a790e
SHA17d12e398bc7c8e754d2dd1c6a7c9d3ecbe703da2
SHA256fef67133de2868d11ef009dd2202726fcd57fe6c96b0db2a02d06518ad0aa2d3
SHA512079c01555e8ace2201626c8598fd2a555aa55e28607bc999a0f88c507a717b9afa1854afa38644460d56cdd90db1078622bff7f0d4b0f070f799ffbb863d9ede
-
Filesize
447KB
MD5d3016fb447b1ae583a8c082ef51a790e
SHA17d12e398bc7c8e754d2dd1c6a7c9d3ecbe703da2
SHA256fef67133de2868d11ef009dd2202726fcd57fe6c96b0db2a02d06518ad0aa2d3
SHA512079c01555e8ace2201626c8598fd2a555aa55e28607bc999a0f88c507a717b9afa1854afa38644460d56cdd90db1078622bff7f0d4b0f070f799ffbb863d9ede
-
Filesize
447KB
MD5d3016fb447b1ae583a8c082ef51a790e
SHA17d12e398bc7c8e754d2dd1c6a7c9d3ecbe703da2
SHA256fef67133de2868d11ef009dd2202726fcd57fe6c96b0db2a02d06518ad0aa2d3
SHA512079c01555e8ace2201626c8598fd2a555aa55e28607bc999a0f88c507a717b9afa1854afa38644460d56cdd90db1078622bff7f0d4b0f070f799ffbb863d9ede
-
Filesize
447KB
MD5d3016fb447b1ae583a8c082ef51a790e
SHA17d12e398bc7c8e754d2dd1c6a7c9d3ecbe703da2
SHA256fef67133de2868d11ef009dd2202726fcd57fe6c96b0db2a02d06518ad0aa2d3
SHA512079c01555e8ace2201626c8598fd2a555aa55e28607bc999a0f88c507a717b9afa1854afa38644460d56cdd90db1078622bff7f0d4b0f070f799ffbb863d9ede
-
Filesize
332KB
MD5bb58575b85d019341a8c71e0c576bb90
SHA162bec7aa600b52b85649c22bbfc629739fd3ad7a
SHA25645ba3c46dbbbb1a271e4e2f02e88d82194caa5da6ca75ca90ef48d45dbdfc9ef
SHA512c4170b852e4b75c26cc959d490bd2dc5b12bb9fe13f3dc579def153d50c043bde43a2fe8f6948c3fb34bf38321c44ae2e75db1a242d83ee1defff9a6150b7afe
-
Filesize
332KB
MD5bb58575b85d019341a8c71e0c576bb90
SHA162bec7aa600b52b85649c22bbfc629739fd3ad7a
SHA25645ba3c46dbbbb1a271e4e2f02e88d82194caa5da6ca75ca90ef48d45dbdfc9ef
SHA512c4170b852e4b75c26cc959d490bd2dc5b12bb9fe13f3dc579def153d50c043bde43a2fe8f6948c3fb34bf38321c44ae2e75db1a242d83ee1defff9a6150b7afe
-
Filesize
332KB
MD5bb58575b85d019341a8c71e0c576bb90
SHA162bec7aa600b52b85649c22bbfc629739fd3ad7a
SHA25645ba3c46dbbbb1a271e4e2f02e88d82194caa5da6ca75ca90ef48d45dbdfc9ef
SHA512c4170b852e4b75c26cc959d490bd2dc5b12bb9fe13f3dc579def153d50c043bde43a2fe8f6948c3fb34bf38321c44ae2e75db1a242d83ee1defff9a6150b7afe
-
Filesize
332KB
MD5bb58575b85d019341a8c71e0c576bb90
SHA162bec7aa600b52b85649c22bbfc629739fd3ad7a
SHA25645ba3c46dbbbb1a271e4e2f02e88d82194caa5da6ca75ca90ef48d45dbdfc9ef
SHA512c4170b852e4b75c26cc959d490bd2dc5b12bb9fe13f3dc579def153d50c043bde43a2fe8f6948c3fb34bf38321c44ae2e75db1a242d83ee1defff9a6150b7afe
-
Filesize
367KB
MD5d4776c853608c70e865e0c6e16f06d72
SHA108b3ff4b96c4cca46ab3cdbfc7920c0a5b9e1617
SHA256840289ab6310ebfe84533293849d595fd99bc05660efbeedb0698db4f3a65b7d
SHA51230a43dbf7deb78932cba516ae60f1eb6aaceb1ad5d10319900bcac41f51409b1d0311240607644ad630a0f304fbdff6889e168959550f344b31fa72ae5a7deac
-
Filesize
367KB
MD5d4776c853608c70e865e0c6e16f06d72
SHA108b3ff4b96c4cca46ab3cdbfc7920c0a5b9e1617
SHA256840289ab6310ebfe84533293849d595fd99bc05660efbeedb0698db4f3a65b7d
SHA51230a43dbf7deb78932cba516ae60f1eb6aaceb1ad5d10319900bcac41f51409b1d0311240607644ad630a0f304fbdff6889e168959550f344b31fa72ae5a7deac
-
Filesize
367KB
MD5d4776c853608c70e865e0c6e16f06d72
SHA108b3ff4b96c4cca46ab3cdbfc7920c0a5b9e1617
SHA256840289ab6310ebfe84533293849d595fd99bc05660efbeedb0698db4f3a65b7d
SHA51230a43dbf7deb78932cba516ae60f1eb6aaceb1ad5d10319900bcac41f51409b1d0311240607644ad630a0f304fbdff6889e168959550f344b31fa72ae5a7deac
-
Filesize
367KB
MD5d4776c853608c70e865e0c6e16f06d72
SHA108b3ff4b96c4cca46ab3cdbfc7920c0a5b9e1617
SHA256840289ab6310ebfe84533293849d595fd99bc05660efbeedb0698db4f3a65b7d
SHA51230a43dbf7deb78932cba516ae60f1eb6aaceb1ad5d10319900bcac41f51409b1d0311240607644ad630a0f304fbdff6889e168959550f344b31fa72ae5a7deac
-
Filesize
195KB
MD5611cdc13cbd2825369d83a37d6a1b93e
SHA1fe7621cb14de992e4375098f498f79abf637e3a6
SHA256ccb7aa3689ca9267d2a03f228735eb14c0872e8ca9cbb832d2746d95bb7cb957
SHA51278375437608c95e419250f2a8372aefe4cc198398f306a1a21b70aaf7d0eab9e2e685d4585de1eb74960c75499ffd3247b812575e6fb224e9aad2ed4d4fd7bf3
-
Filesize
195KB
MD5611cdc13cbd2825369d83a37d6a1b93e
SHA1fe7621cb14de992e4375098f498f79abf637e3a6
SHA256ccb7aa3689ca9267d2a03f228735eb14c0872e8ca9cbb832d2746d95bb7cb957
SHA51278375437608c95e419250f2a8372aefe4cc198398f306a1a21b70aaf7d0eab9e2e685d4585de1eb74960c75499ffd3247b812575e6fb224e9aad2ed4d4fd7bf3
-
Filesize
195KB
MD5611cdc13cbd2825369d83a37d6a1b93e
SHA1fe7621cb14de992e4375098f498f79abf637e3a6
SHA256ccb7aa3689ca9267d2a03f228735eb14c0872e8ca9cbb832d2746d95bb7cb957
SHA51278375437608c95e419250f2a8372aefe4cc198398f306a1a21b70aaf7d0eab9e2e685d4585de1eb74960c75499ffd3247b812575e6fb224e9aad2ed4d4fd7bf3
-
Filesize
704KB
MD5882b69f2a4e253a212fcd18283fdfba1
SHA1753f12859538cbd0fb957bcc11d8d5207afa21a9
SHA2564afec43ba8c8bba79506a767752567d6f96862fa46ddc4c3dc3d7a55c5abef30
SHA512f863ebc854ad8f7f71925119806c45253cbfc4dd369a523126800be3f8639498eb17bf0447f65352dd9dde6cbaa1236ea6158d5afab55cd2f79dcbb46d2c21bd
-
Filesize
704KB
MD5882b69f2a4e253a212fcd18283fdfba1
SHA1753f12859538cbd0fb957bcc11d8d5207afa21a9
SHA2564afec43ba8c8bba79506a767752567d6f96862fa46ddc4c3dc3d7a55c5abef30
SHA512f863ebc854ad8f7f71925119806c45253cbfc4dd369a523126800be3f8639498eb17bf0447f65352dd9dde6cbaa1236ea6158d5afab55cd2f79dcbb46d2c21bd
-
Filesize
704KB
MD5882b69f2a4e253a212fcd18283fdfba1
SHA1753f12859538cbd0fb957bcc11d8d5207afa21a9
SHA2564afec43ba8c8bba79506a767752567d6f96862fa46ddc4c3dc3d7a55c5abef30
SHA512f863ebc854ad8f7f71925119806c45253cbfc4dd369a523126800be3f8639498eb17bf0447f65352dd9dde6cbaa1236ea6158d5afab55cd2f79dcbb46d2c21bd
-
Filesize
659KB
MD56b535f795bf0325178a4df17ce4ad09c
SHA166b9bcd039653ca654d779ebf40109ae4cd1d818
SHA256264d69e8a7ca1afcdf4179429d74a9098187c3f8a5e06080d2758682313a42b4
SHA512e3b0323570ef1faf4284e8199f0b0f9f2de8d49bcca63bc15890254221e0dccfc327d9ebb754b4c98d5e51771c732589f5ad43c7d09b11d8e8848317c2793f0b
-
Filesize
659KB
MD56b535f795bf0325178a4df17ce4ad09c
SHA166b9bcd039653ca654d779ebf40109ae4cd1d818
SHA256264d69e8a7ca1afcdf4179429d74a9098187c3f8a5e06080d2758682313a42b4
SHA512e3b0323570ef1faf4284e8199f0b0f9f2de8d49bcca63bc15890254221e0dccfc327d9ebb754b4c98d5e51771c732589f5ad43c7d09b11d8e8848317c2793f0b
-
Filesize
659KB
MD56b535f795bf0325178a4df17ce4ad09c
SHA166b9bcd039653ca654d779ebf40109ae4cd1d818
SHA256264d69e8a7ca1afcdf4179429d74a9098187c3f8a5e06080d2758682313a42b4
SHA512e3b0323570ef1faf4284e8199f0b0f9f2de8d49bcca63bc15890254221e0dccfc327d9ebb754b4c98d5e51771c732589f5ad43c7d09b11d8e8848317c2793f0b
-
Filesize
1.4MB
MD5baed433a6af6c7b05a9cdea0c06583d5
SHA1dcc9b28ed9c055372498618cad5ecc55a153f73d
SHA2566febe58db93df446a26fd645593ab7a2a6f6e88e9a88758fc234c2b70f096b31
SHA5123522fe2499d9817c09529571c1a0e681e974e471a3ce707eced07a1a404a3f48a6a4a98b3e41cff77c68e4034de917b1f6538ff80181e61de9c5ecb8b546f4c2
-
Filesize
298KB
MD582f572276aff5f06f55240323ad8d267
SHA10eeef4b8aa4787a3912522187855c8c0743bbca5
SHA2565f901e526effe89e783eb4acfdec0f485a465a98b9069d0b13ffd5e2ed73adfe
SHA512b29a1faa150dbe70b2cffccb233d25548c812a2f773e031b76d9de314bc33ad4dad69b821f315535dc0afdcf0e6e5749d6487ff9eecac927999b93906ec15c0b
-
Filesize
298KB
MD582f572276aff5f06f55240323ad8d267
SHA10eeef4b8aa4787a3912522187855c8c0743bbca5
SHA2565f901e526effe89e783eb4acfdec0f485a465a98b9069d0b13ffd5e2ed73adfe
SHA512b29a1faa150dbe70b2cffccb233d25548c812a2f773e031b76d9de314bc33ad4dad69b821f315535dc0afdcf0e6e5749d6487ff9eecac927999b93906ec15c0b
-
Filesize
298KB
MD582f572276aff5f06f55240323ad8d267
SHA10eeef4b8aa4787a3912522187855c8c0743bbca5
SHA2565f901e526effe89e783eb4acfdec0f485a465a98b9069d0b13ffd5e2ed73adfe
SHA512b29a1faa150dbe70b2cffccb233d25548c812a2f773e031b76d9de314bc33ad4dad69b821f315535dc0afdcf0e6e5749d6487ff9eecac927999b93906ec15c0b
-
Filesize
298KB
MD582f572276aff5f06f55240323ad8d267
SHA10eeef4b8aa4787a3912522187855c8c0743bbca5
SHA2565f901e526effe89e783eb4acfdec0f485a465a98b9069d0b13ffd5e2ed73adfe
SHA512b29a1faa150dbe70b2cffccb233d25548c812a2f773e031b76d9de314bc33ad4dad69b821f315535dc0afdcf0e6e5749d6487ff9eecac927999b93906ec15c0b
-
Filesize
298KB
MD582f572276aff5f06f55240323ad8d267
SHA10eeef4b8aa4787a3912522187855c8c0743bbca5
SHA2565f901e526effe89e783eb4acfdec0f485a465a98b9069d0b13ffd5e2ed73adfe
SHA512b29a1faa150dbe70b2cffccb233d25548c812a2f773e031b76d9de314bc33ad4dad69b821f315535dc0afdcf0e6e5749d6487ff9eecac927999b93906ec15c0b
-
Filesize
298KB
MD582f572276aff5f06f55240323ad8d267
SHA10eeef4b8aa4787a3912522187855c8c0743bbca5
SHA2565f901e526effe89e783eb4acfdec0f485a465a98b9069d0b13ffd5e2ed73adfe
SHA512b29a1faa150dbe70b2cffccb233d25548c812a2f773e031b76d9de314bc33ad4dad69b821f315535dc0afdcf0e6e5749d6487ff9eecac927999b93906ec15c0b
-
Filesize
419KB
MD506029e624f1d222e59ac641b2ce426b6
SHA16ba2875bee2eae79c0e1eaa8aa236038c8db6044
SHA25609fb37e917faea5c966bc3418d1d7e46e3d0b9912cadd56486ba5bb5ac0f7b10
SHA512516c04cfc31204879a0c938961208416ddd4ca7204606d630abe860c81422aa1316e45e29669ba01a7506af3f05284395c7c46524f2e73f36d3b4274203de70b
-
Filesize
157KB
MD5a807ee958f2ef0f5aed5c97c7df56f90
SHA161c69bf8f0481ed2fea0506533a84584ee8053dc
SHA2568643d35c7023f766fffaf472d6407610fa541fef9af6936051274e764bd835d4
SHA5124d103a6eaba17ac974f8150e84fa5ffcdd8559ba82916f8df779394ef2357f7185fa9291a3ec607c0bb963ab848d2d29d0ee9fa2ffa41908047ee9fc7d6ed8ba
-
Filesize
11KB
MD57df8fb4196186f28cb308f9952d7ef64
SHA1f20a7259ad233ac3795b6e6537de658209a8fd40
SHA25672253837028abed272e5d50a3a6771933e9dd1aad73e90b8db4538aa9c786cbf
SHA5123f373d69664ce015ceab16c12ba4c806c3489b89ae9db282551ec2452acd2ced1d70ddd4de0ef8c56d62a715624c9d2ceddc968adf07e905f2e4c81c2850ae4b
-
Filesize
210KB
MD50079676384f6c5dddd91135e13320ad4
SHA1e2b460539d3b09cb87300306442586733d6c0f5c
SHA2568de23ffb1a441f73f5c9e88f6b171277a58556d5f20cd7797cada56a94d7f749
SHA512902d36eb854c475b320dc9bb3c8a603c049be6fe33455dafe00fd8d710220f0f02231673548c4d168cd7fbf977f7775336f48eadcf9816eb651c84a46d98423f
-
Filesize
11KB
MD57df8fb4196186f28cb308f9952d7ef64
SHA1f20a7259ad233ac3795b6e6537de658209a8fd40
SHA25672253837028abed272e5d50a3a6771933e9dd1aad73e90b8db4538aa9c786cbf
SHA5123f373d69664ce015ceab16c12ba4c806c3489b89ae9db282551ec2452acd2ced1d70ddd4de0ef8c56d62a715624c9d2ceddc968adf07e905f2e4c81c2850ae4b
-
Filesize
284KB
MD504ba865dc2b42c710ac01f266297070e
SHA13dd5c7e7696ef0a0b909858237f510c9a3819df9
SHA25665680affa85e1361add8dfcce37475a80ceec6557312b7e00d89214dafa79b60
SHA5129d8bae8d3ebe5dfd1c1a5dfccbeb84b03df98c08228fef9a60a458aa22b3c7c7be6edf458a1aeecdd3b78605369353a3294807dc4524eaeb6c50f33fe9fdf781
-
Filesize
11KB
MD57df8fb4196186f28cb308f9952d7ef64
SHA1f20a7259ad233ac3795b6e6537de658209a8fd40
SHA25672253837028abed272e5d50a3a6771933e9dd1aad73e90b8db4538aa9c786cbf
SHA5123f373d69664ce015ceab16c12ba4c806c3489b89ae9db282551ec2452acd2ced1d70ddd4de0ef8c56d62a715624c9d2ceddc968adf07e905f2e4c81c2850ae4b
-
Filesize
210KB
MD50079676384f6c5dddd91135e13320ad4
SHA1e2b460539d3b09cb87300306442586733d6c0f5c
SHA2568de23ffb1a441f73f5c9e88f6b171277a58556d5f20cd7797cada56a94d7f749
SHA512902d36eb854c475b320dc9bb3c8a603c049be6fe33455dafe00fd8d710220f0f02231673548c4d168cd7fbf977f7775336f48eadcf9816eb651c84a46d98423f
-
Filesize
210KB
MD50079676384f6c5dddd91135e13320ad4
SHA1e2b460539d3b09cb87300306442586733d6c0f5c
SHA2568de23ffb1a441f73f5c9e88f6b171277a58556d5f20cd7797cada56a94d7f749
SHA512902d36eb854c475b320dc9bb3c8a603c049be6fe33455dafe00fd8d710220f0f02231673548c4d168cd7fbf977f7775336f48eadcf9816eb651c84a46d98423f
-
Filesize
210KB
MD50079676384f6c5dddd91135e13320ad4
SHA1e2b460539d3b09cb87300306442586733d6c0f5c
SHA2568de23ffb1a441f73f5c9e88f6b171277a58556d5f20cd7797cada56a94d7f749
SHA512902d36eb854c475b320dc9bb3c8a603c049be6fe33455dafe00fd8d710220f0f02231673548c4d168cd7fbf977f7775336f48eadcf9816eb651c84a46d98423f
-
Filesize
210KB
MD50079676384f6c5dddd91135e13320ad4
SHA1e2b460539d3b09cb87300306442586733d6c0f5c
SHA2568de23ffb1a441f73f5c9e88f6b171277a58556d5f20cd7797cada56a94d7f749
SHA512902d36eb854c475b320dc9bb3c8a603c049be6fe33455dafe00fd8d710220f0f02231673548c4d168cd7fbf977f7775336f48eadcf9816eb651c84a46d98423f
-
Filesize
55KB
MD543fa0a6cde7f17e914b5087e133cbaa9
SHA11bb3e4cc98e3b65722d21425d0358e2fe93b20e9
SHA25646e26dc2255603778fd046493fae73130963c7fb365ca222105e8ea0328c485f
SHA512b2e7921e18f12703df2e08ae6edb16823ea74278980b91019272c12c516498bb6db1e0d2b422f3af2aa3d492396423cc84fe8bf43b229e4745ca4592a149f1b8
-
Filesize
55KB
MD543fa0a6cde7f17e914b5087e133cbaa9
SHA11bb3e4cc98e3b65722d21425d0358e2fe93b20e9
SHA25646e26dc2255603778fd046493fae73130963c7fb365ca222105e8ea0328c485f
SHA512b2e7921e18f12703df2e08ae6edb16823ea74278980b91019272c12c516498bb6db1e0d2b422f3af2aa3d492396423cc84fe8bf43b229e4745ca4592a149f1b8
-
Filesize
55KB
MD543fa0a6cde7f17e914b5087e133cbaa9
SHA11bb3e4cc98e3b65722d21425d0358e2fe93b20e9
SHA25646e26dc2255603778fd046493fae73130963c7fb365ca222105e8ea0328c485f
SHA512b2e7921e18f12703df2e08ae6edb16823ea74278980b91019272c12c516498bb6db1e0d2b422f3af2aa3d492396423cc84fe8bf43b229e4745ca4592a149f1b8