Analysis
-
max time kernel
162s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2023 11:26
Static task
static1
General
-
Target
setup-X64.9.8.msi
-
Size
85.0MB
-
MD5
67fb4f3cb6b9642d6b78e10a554ac117
-
SHA1
fa962ad66a79a1be9968ed9a11d81a25b35efcf6
-
SHA256
245d9d08e4a9c76c432545aa5d78391fafa44ab7422367c4df81dab39a7482ef
-
SHA512
c85549154ab4f0ca4d7df6fc431ba43de3a2191065e948af801cd36d391599e0ada0192225e2ef47f96d9ef92163fdcaf856d752a5e87b447424097e55f3af72
-
SSDEEP
1572864:xCKa/mZuqQjEedsJ+XaawSQPPiDMHTuWvjkMv1CvrcokNArZC1JkQI7JrAjV:xCKZuqQAedskX1BQPPJ6WwwoKkomh7JE
Malware Config
Signatures
-
Processes:
reg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe -
Executes dropped EXE 3 IoCs
Processes:
dach.exeAliIM.exeTelegram.exepid process 4816 dach.exe 4292 AliIM.exe 1928 Telegram.exe -
Loads dropped DLL 9 IoCs
Processes:
MsiExec.exeMsiExec.exeAliIM.exepid process 2648 MsiExec.exe 2648 MsiExec.exe 2648 MsiExec.exe 2648 MsiExec.exe 2648 MsiExec.exe 2648 MsiExec.exe 1288 MsiExec.exe 1288 MsiExec.exe 4292 AliIM.exe -
Processes:
resource yara_rule behavioral1/memory/4816-223-0x0000000180000000-0x000000018003F000-memory.dmp upx behavioral1/memory/4816-221-0x0000000180000000-0x000000018003F000-memory.dmp upx behavioral1/memory/4816-225-0x0000000180000000-0x000000018003F000-memory.dmp upx behavioral1/memory/4816-224-0x0000000180000000-0x000000018003F000-memory.dmp upx behavioral1/memory/4816-226-0x0000000180000000-0x000000018003F000-memory.dmp upx behavioral1/memory/4816-238-0x0000000180000000-0x000000018003F000-memory.dmp upx behavioral1/memory/4816-254-0x0000000180000000-0x000000018003F000-memory.dmp upx -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
AliIM.exemsiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\N: AliIM.exe File opened (read-only) \??\O: AliIM.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\B: AliIM.exe File opened (read-only) \??\L: AliIM.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\P: AliIM.exe File opened (read-only) \??\S: AliIM.exe File opened (read-only) \??\X: AliIM.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\J: AliIM.exe File opened (read-only) \??\U: AliIM.exe File opened (read-only) \??\V: AliIM.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\E: AliIM.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: AliIM.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: AliIM.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: AliIM.exe File opened (read-only) \??\Y: AliIM.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: AliIM.exe File opened (read-only) \??\W: AliIM.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: AliIM.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: AliIM.exe File opened (read-only) \??\R: AliIM.exe File opened (read-only) \??\Q: AliIM.exe -
Drops file in System32 directory 6 IoCs
Processes:
dach.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7229E30BCFD0992128433D951137A421_F0BB2463DDCCB4B49DC9200CC9E498E9 dach.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7229E30BCFD0992128433D951137A421_F0BB2463DDCCB4B49DC9200CC9E498E9 dach.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7229E30BCFD0992128433D951137A421_76EBFC12D6FD7EE9DD82775C12CF3BD5 dach.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7229E30BCFD0992128433D951137A421_76EBFC12D6FD7EE9DD82775C12CF3BD5 dach.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_F7F9B7BDCC367A8E3539D28F7D4D4BA2 dach.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_F7F9B7BDCC367A8E3539D28F7D4D4BA2 dach.exe -
Drops file in Windows directory 10 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Windows\Installer\e58c09c.msi msiexec.exe File opened for modification C:\Windows\Installer\e58c09c.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIC196.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC6F7.tmp msiexec.exe File created C:\Windows\Installer\e58c09e.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIC262.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{64C771E6-49B2-43AB-9C7C-204A7AEEFF42} msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
mmc.exeexplorer.exedach.exemmc.exemmc.exemsiexec.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowCompColor = "1" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" dach.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@mmcbase.dll,-14008 = "Folder" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\MapNetDrvBtn = "0" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dach.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Settings mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden = "2" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" dach.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\RenderSoft TextCalc dach.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" dach.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" dach.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Recent File List mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideIcons = "0" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Filter = "0" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ dach.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Settings mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\ExplorerStartupTraceRecorded = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Settings mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mmc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellState = 240000003428000000000000000000000000000001000000130000000000000062000000 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\RenderSoft TextCalc\TextCalc\Recent File List dach.exe Key created \REGISTRY\USER\.DEFAULT\Software\RenderSoft TextCalc\TextCalc\Settings dach.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Recent File List mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" dach.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\AutoCheckSelect = "0" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\WebView = "1" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowTypeOverlay = "1" explorer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" dach.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowInfoTip = "1" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\SeparateProcess = "0" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowStatusBar = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\RenderSoft TextCalc\TextCalc dach.exe Key created \REGISTRY\USER\S-1-5-18_Classes\Local Settings dach.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\DontPrettyPath = "0" explorer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix dach.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\IconsOnly = "0" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mmc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Microsoft Management Console\Recent File List mmc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mmc.exe -
Modifies registry class 23 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\B0B06FDC9804AA44B87795745B93C68C\6E177C462B94BA34C9C702A4A7EEFF24 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\6E177C462B94BA34C9C702A4A7EEFF24 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\6E177C462B94BA34C9C702A4A7EEFF24\MainFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\PackageCode = "0756E16D524331240AA0349D5D1F18D0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\AuthorizedLUAApp = "0" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\B0B06FDC9804AA44B87795745B93C68C msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList\PackageName = "setup-X64.9.8.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\ProductName = "HIP-THH" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\Version = "16777216" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList\Media\1 = ";" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\Language = "2052" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6E177C462B94BA34C9C702A4A7EEFF24\SourceList\Media msiexec.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Telegram.exepid process 1928 Telegram.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msiexec.exeAliIM.exemsedge.exepid process 816 msiexec.exe 816 msiexec.exe 4292 AliIM.exe 4292 AliIM.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Telegram.exepid process 1928 Telegram.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
Processes:
mmc.exemmc.exepid process 4328 mmc.exe 2944 mmc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 2908 msiexec.exe Token: SeIncreaseQuotaPrivilege 2908 msiexec.exe Token: SeSecurityPrivilege 816 msiexec.exe Token: SeCreateTokenPrivilege 2908 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2908 msiexec.exe Token: SeLockMemoryPrivilege 2908 msiexec.exe Token: SeIncreaseQuotaPrivilege 2908 msiexec.exe Token: SeMachineAccountPrivilege 2908 msiexec.exe Token: SeTcbPrivilege 2908 msiexec.exe Token: SeSecurityPrivilege 2908 msiexec.exe Token: SeTakeOwnershipPrivilege 2908 msiexec.exe Token: SeLoadDriverPrivilege 2908 msiexec.exe Token: SeSystemProfilePrivilege 2908 msiexec.exe Token: SeSystemtimePrivilege 2908 msiexec.exe Token: SeProfSingleProcessPrivilege 2908 msiexec.exe Token: SeIncBasePriorityPrivilege 2908 msiexec.exe Token: SeCreatePagefilePrivilege 2908 msiexec.exe Token: SeCreatePermanentPrivilege 2908 msiexec.exe Token: SeBackupPrivilege 2908 msiexec.exe Token: SeRestorePrivilege 2908 msiexec.exe Token: SeShutdownPrivilege 2908 msiexec.exe Token: SeDebugPrivilege 2908 msiexec.exe Token: SeAuditPrivilege 2908 msiexec.exe Token: SeSystemEnvironmentPrivilege 2908 msiexec.exe Token: SeChangeNotifyPrivilege 2908 msiexec.exe Token: SeRemoteShutdownPrivilege 2908 msiexec.exe Token: SeUndockPrivilege 2908 msiexec.exe Token: SeSyncAgentPrivilege 2908 msiexec.exe Token: SeEnableDelegationPrivilege 2908 msiexec.exe Token: SeManageVolumePrivilege 2908 msiexec.exe Token: SeImpersonatePrivilege 2908 msiexec.exe Token: SeCreateGlobalPrivilege 2908 msiexec.exe Token: SeCreateTokenPrivilege 2908 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2908 msiexec.exe Token: SeLockMemoryPrivilege 2908 msiexec.exe Token: SeIncreaseQuotaPrivilege 2908 msiexec.exe Token: SeMachineAccountPrivilege 2908 msiexec.exe Token: SeTcbPrivilege 2908 msiexec.exe Token: SeSecurityPrivilege 2908 msiexec.exe Token: SeTakeOwnershipPrivilege 2908 msiexec.exe Token: SeLoadDriverPrivilege 2908 msiexec.exe Token: SeSystemProfilePrivilege 2908 msiexec.exe Token: SeSystemtimePrivilege 2908 msiexec.exe Token: SeProfSingleProcessPrivilege 2908 msiexec.exe Token: SeIncBasePriorityPrivilege 2908 msiexec.exe Token: SeCreatePagefilePrivilege 2908 msiexec.exe Token: SeCreatePermanentPrivilege 2908 msiexec.exe Token: SeBackupPrivilege 2908 msiexec.exe Token: SeRestorePrivilege 2908 msiexec.exe Token: SeShutdownPrivilege 2908 msiexec.exe Token: SeDebugPrivilege 2908 msiexec.exe Token: SeAuditPrivilege 2908 msiexec.exe Token: SeSystemEnvironmentPrivilege 2908 msiexec.exe Token: SeChangeNotifyPrivilege 2908 msiexec.exe Token: SeRemoteShutdownPrivilege 2908 msiexec.exe Token: SeUndockPrivilege 2908 msiexec.exe Token: SeSyncAgentPrivilege 2908 msiexec.exe Token: SeEnableDelegationPrivilege 2908 msiexec.exe Token: SeManageVolumePrivilege 2908 msiexec.exe Token: SeImpersonatePrivilege 2908 msiexec.exe Token: SeCreateGlobalPrivilege 2908 msiexec.exe Token: SeCreateTokenPrivilege 2908 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2908 msiexec.exe Token: SeLockMemoryPrivilege 2908 msiexec.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
msiexec.exeTelegram.exepid process 2908 msiexec.exe 2908 msiexec.exe 1928 Telegram.exe 1928 Telegram.exe 1928 Telegram.exe 1928 Telegram.exe 1928 Telegram.exe 1928 Telegram.exe 1928 Telegram.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
Telegram.exepid process 1928 Telegram.exe 1928 Telegram.exe 1928 Telegram.exe 1928 Telegram.exe 1928 Telegram.exe 1928 Telegram.exe 1928 Telegram.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
dach.exemmc.exemmc.exemmc.exeTelegram.exepid process 4816 dach.exe 4816 dach.exe 3340 mmc.exe 3340 mmc.exe 4328 mmc.exe 4328 mmc.exe 2944 mmc.exe 2944 mmc.exe 1928 Telegram.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msiexec.exemmc.exemmc.exedach.execmd.exemmc.exeexplorer.exeAliIM.exemsedge.exedescription pid process target process PID 816 wrote to memory of 2648 816 msiexec.exe MsiExec.exe PID 816 wrote to memory of 2648 816 msiexec.exe MsiExec.exe PID 816 wrote to memory of 2648 816 msiexec.exe MsiExec.exe PID 816 wrote to memory of 2280 816 msiexec.exe srtasks.exe PID 816 wrote to memory of 2280 816 msiexec.exe srtasks.exe PID 816 wrote to memory of 1288 816 msiexec.exe MsiExec.exe PID 816 wrote to memory of 1288 816 msiexec.exe MsiExec.exe PID 816 wrote to memory of 1288 816 msiexec.exe MsiExec.exe PID 816 wrote to memory of 4816 816 msiexec.exe dach.exe PID 816 wrote to memory of 4816 816 msiexec.exe dach.exe PID 3340 wrote to memory of 3856 3340 mmc.exe netsh.exe PID 3340 wrote to memory of 3856 3340 mmc.exe netsh.exe PID 4328 wrote to memory of 4428 4328 mmc.exe netsh.exe PID 4328 wrote to memory of 4428 4328 mmc.exe netsh.exe PID 4816 wrote to memory of 2108 4816 dach.exe cmd.exe PID 4816 wrote to memory of 2108 4816 dach.exe cmd.exe PID 2108 wrote to memory of 5064 2108 cmd.exe reg.exe PID 2108 wrote to memory of 5064 2108 cmd.exe reg.exe PID 2108 wrote to memory of 1208 2108 cmd.exe reg.exe PID 2108 wrote to memory of 1208 2108 cmd.exe reg.exe PID 2108 wrote to memory of 4216 2108 cmd.exe reg.exe PID 2108 wrote to memory of 4216 2108 cmd.exe reg.exe PID 4816 wrote to memory of 1156 4816 dach.exe cmd.exe PID 4816 wrote to memory of 1156 4816 dach.exe cmd.exe PID 2944 wrote to memory of 920 2944 mmc.exe explorer.exe PID 2944 wrote to memory of 920 2944 mmc.exe explorer.exe PID 2440 wrote to memory of 4292 2440 explorer.exe AliIM.exe PID 2440 wrote to memory of 4292 2440 explorer.exe AliIM.exe PID 2440 wrote to memory of 4292 2440 explorer.exe AliIM.exe PID 4292 wrote to memory of 1576 4292 AliIM.exe netsh.exe PID 4292 wrote to memory of 1576 4292 AliIM.exe netsh.exe PID 4292 wrote to memory of 1576 4292 AliIM.exe netsh.exe PID 4292 wrote to memory of 232 4292 AliIM.exe netsh.exe PID 4292 wrote to memory of 232 4292 AliIM.exe netsh.exe PID 4292 wrote to memory of 232 4292 AliIM.exe netsh.exe PID 3952 wrote to memory of 2084 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2084 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe PID 3952 wrote to memory of 2076 3952 msedge.exe msedge.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\setup-X64.9.8.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2908
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4934DD3F388E149EDC3606A67046D86E C2⤵
- Loads dropped DLL
PID:2648 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:2280
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6B113056A75750851BE41CD401888A352⤵
- Loads dropped DLL
PID:1288 -
C:\Users\Admin\AppData\Roaming\HIP-THH\tdata\emoji\dach.exe"C:\Users\Admin\AppData\Roaming\HIP-THH\tdata\emoji\dach.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Roaming\16xOd.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t reg_dword /d 0 /F4⤵
- UAC bypass
PID:5064 -
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t reg_dword /d 0 /F4⤵
- UAC bypass
PID:1208 -
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v PromptOnSecureDesktop /t reg_dword /d 0 /F4⤵
- UAC bypass
PID:4216 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /b C:\Users\Public\Pictures\JugZu\5N2Mr_z\n + C:\Users\Public\Pictures\JugZu\5N2Mr_z\m C:\Users\Public\Pictures\JugZu\5N2Mr_z\UpdateAssist.dll3⤵PID:1156
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2120
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set address 以太网 static 1.0.0.2 255.255.255.0 1.0.0.1 12⤵PID:3856
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: SetClipboardViewer
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set address \"WLAN\" static 1.0.0.3 255.255.255.0 1.0.0.1 12⤵PID:4428
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: SetClipboardViewer
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" /root, C:\Users\Public\Pictures\JugZu\5N2Mr_z\AliIM.exe2⤵
- Modifies data under HKEY_USERS
PID:920
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Public\Pictures\JugZu\5N2Mr_z\AliIM.exe"C:\Users\Public\Pictures\JugZu\5N2Mr_z\AliIM.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set address \"ÒÔÌ«Íø\" dhcp3⤵PID:1576
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set address \"WLAN\" dhcp3⤵PID:232
-
C:\Users\Admin\AppData\Roaming\HIP-THH\Telegram.exe"C:\Users\Admin\AppData\Roaming\HIP-THH\Telegram.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1928
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultf3ad1616hd622h46f4had0che0c84035a8b51⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffcb51346f8,0x7ffcb5134708,0x7ffcb51347182⤵PID:2084
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,1759085169704257108,16408001141882376908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,1759085169704257108,16408001141882376908,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵PID:2076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,1759085169704257108,16408001141882376908,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:3060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:860
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5e294d6a765a3f2abe86bdc06a55418b6
SHA16498201a4a17975b55948686141661e8ba95d660
SHA256e6a0503a3060b41a025a0c43f21ee6c8dc6d16da11dbe1cf5d002fc18e3b6727
SHA51292aa38919da8bcb13902b09dbdba6d2881b06fee64fa60dfa526662e445adb1bbd855284d589ae580660fc24a1246e3354bc3553280fad8ad395039b85bf811a
-
Filesize
152B
MD5b5f5369274e3bfbc449588bbb57bd383
SHA158bb46d57bd70c1c0bcbad619353cbe185f34c3b
SHA2564190bd2ec2c0c65a2b8b97782cd3ae1d6cead80242f3595f06ebc6648c3e3464
SHA51204a3816af6c5a335cde99d97019a3f68ade65eba70e4667c4d7dd78f78910481549f1dad23a46ccf9efa2e25c6e7a7c78c592b6ace951e1aab106ba06a10fcd6
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD59f94e700680b31e4306b242b22b4c2ea
SHA10a1256604de299e73210c46e64b4b4a50974b820
SHA25644d99b7f09510fe2315ebaaf019285b140fab514a13d39be273ae321b0f20605
SHA512a466366dc62d207316acdc2d820bf42f8b23c56e3616e23bef14ef331b4f1945e2512af20fc434d50adfab19b4e37c91428563c7903e09e9930630dc6095db16
-
Filesize
3KB
MD5c0a0b68bbcfaf52e1955685a3043e376
SHA1fb4f617efae64d78f3dc6c55709ad606feacbd90
SHA256adf24d4518da3e22a34bf1f5b43b95aa0a15e9724c064219525328f352962eeb
SHA512b3e6e0b6c29ddb1530f75e7ab12ccb7338cee4c7f3fe8f526f13285941170648ac8b74250c0757e409ff2dd04101a507954154809e8e5614ed3dc678de971682
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
392B
MD530d6eb22d6aeec10347239b17b023bf4
SHA1e2a6f86d66c699f6e0ff1ac4e140af4a2a4637d1
SHA256659df6b190a0b92fc34e3a4457b4a8d11a26a4caf55de64dfe79eb1276181f08
SHA512500872c3f2f3f801ec51717690873194675cb7f32cc4a862c09d90c18638d364d49b0e04c32323f52734e5c806e3503a63ac755c7019d762786a72840123df76
-
Filesize
126.7MB
MD5b207b753976baf91f4a1cfb6a195fd9d
SHA14c7a1cf450d6a96f6f9321a6407cd2d6dd50abb9
SHA25696fbe1f018b68dc7be9b901eace3e9de00f8b6939af49153b8ebd88d868404d8
SHA5125e8d9b3a4b78dbf495f14f0136cd891ee4f2fa6bcb4a051b73ba0f1acced17ac1abfceb94748cd10ba759c467be09b107ce1493679791715d05b65e13c5241f1
-
Filesize
126.7MB
MD5b207b753976baf91f4a1cfb6a195fd9d
SHA14c7a1cf450d6a96f6f9321a6407cd2d6dd50abb9
SHA25696fbe1f018b68dc7be9b901eace3e9de00f8b6939af49153b8ebd88d868404d8
SHA5125e8d9b3a4b78dbf495f14f0136cd891ee4f2fa6bcb4a051b73ba0f1acced17ac1abfceb94748cd10ba759c467be09b107ce1493679791715d05b65e13c5241f1
-
Filesize
140B
MD554291af0f142fa44542dd9b923c62599
SHA1e4003f0b6f4647ec0f9b5aee43fd194657b0c272
SHA256725450027a36383781222d1eb19461bebae3d01c0ac16ec86e082e0aaec69fc1
SHA512f772fe404af8da115ec6773c68ea1946d0b9917ccb1d50497b365f6d7ca8595fbf0ed52b901b68d4f161e76895789d71b6437a9259b66d519db266468807cc3d
-
Filesize
521KB
MD5f927b4fe63715ccb8b4801ecc2b0d455
SHA1613811df57a5b731dc2252d6fdd8549269efbe01
SHA2563b3236943b2c5f46ce0a483b1a1e303ae4bb270ef4fe6e44e2d61fa64f9a4f80
SHA51232fbd874d190031d198a827338f8a15abc4ce9ca05f3cc4ff83d3295823719e6e922009f1fddb7241ea9ab58ea6f312ee9cd913df496deb2390622784e87d8d7
-
Filesize
648KB
MD5a9d5fcb4edadcf53399f1c5f9ae5d9ae
SHA1210377216a6869a40655c75f47a392b4600f6f44
SHA256a917a5dcf7e329dfb760ece674de96a01ab5e2f51751de95d032c4bb5e2a1f0e
SHA5127a47a64e1dacc0b3c621b13d9d0cc60bf98d58d2a93add9beb87ce476cce296029f028feea1970bfacbbbaae6b143e24f8245ac32bfdf6cee65089b568bf6ec4
-
Filesize
648KB
MD528c7a651b3411fff0be43767457541f3
SHA164cc0c0474f72deb03459a47e91e6f1b5cc5a867
SHA2560f1d63de6e20766acc95159db99724d5babbabbb9adb1506dc1337163ec61338
SHA512bc3a5492c72293bf0dcfa1883e586e17dd16afce06817d466c6672e9ac6c04a1c74bddaedd0753b1ddfff20bd88ab36d055643369416725be95bfb7a72f37070
-
Filesize
648KB
MD58bae1c34285e15fae092ef5afb4bdb9a
SHA1ce7098ffafa1a0150de43e390f4489bd0a35bfd1
SHA25648d4c29de7c7e13c65856da6963a20f41f9001dab80bb72b68d61cab7fee1d33
SHA512927581328052659a0e65df5499b5e16624145ff61512255c64770194384d7ea5b469c3b1301e63146de7b5fc01bf6acf6e81e567806cdfed3a4b306b98e18ca4
-
Filesize
648KB
MD528dc94bc2f0fd3ce3a70f5207ec35bde
SHA196cd2a1b1237270b857b72ac0b4f90c7111d0099
SHA2560b2cb32c6eda76598f5ef427a7ef9309bf3d6c2cb206ca1e37f164636ff25bc3
SHA5128eea266f16f517bbb2908738c5d027375b3452bae4032f187094e56c6830c05487acfb781182e02aa9dbdcb9c0e8d58fb28b5d7f9aca9ed7000488cbe0029fe0
-
Filesize
648KB
MD5fa7909ed2d3e1d9a593ab5fa0d66958b
SHA18b1baf1bbf8ecb8d34fd155746f84e6887665dc6
SHA2568935d03aa7c5c253c92ebf8fac42aaac5f0aa04b531ad3196954e45ee2b3a389
SHA512d43a6b169a6e2c60e63e71e3aefd05f8e8c4b691672536943ed81dc342eff372aab51e8b25e6e17d4dabe9166f3520850bef8cc03604d003c0ec01b382691748
-
Filesize
648KB
MD57076344b06be17207948f79de741e3e7
SHA1338e2311f944087807be80dd2fb2e8584e9bdd65
SHA25643c24b430152745f6fb61fd27d2598489e21d60ae2f0e0c89bb264f484afe899
SHA5129a518ad991a3263117c122b7cff14e6191ee91a40c5daa75e77fd854edbe7dac2c46a4a80fe0d91d5fda1ebf9d4ef0091b3d543c8abb52900584e0f0bdabc9dd
-
Filesize
648KB
MD5677eaf4328bfa07263b0518d7a538c68
SHA12daabe657291c7088e45d09125c10247f52b81e6
SHA2569522b74b926f4c3989e962f815ff7f1cb93e26f68522457e4f2e3dede4a64aeb
SHA51287b5eb241f7f854ffc2b49d83b3c40be73693dd1a6c900d2d07c047f8e689d9fc44d6198a168372a4df53532d910d045c4141b321a5f2b33e36081399362fa4b
-
Filesize
1.1MB
MD5bb05e538eb0fd043124c1dbd7a54f6a0
SHA1c44c550a754d87880e3413cfa0cb3bcbe7523edb
SHA2560255d50c8fc8f036794a3cebdf2937a94821c6cf07caee1be90cf11fbf4f4c47
SHA512ff6a9b0862307ebe85d72a62eefc09054290995c373f3c5b248bb6f04a6246d68160f6227873bc11649b894cd011f263c0d258796dffa09afb31412d78a8be69
-
Filesize
1.1MB
MD5e0d699a63ecfb007d72bf4a158a1dea6
SHA115bae81866f8dc89d256bf6aa6fe29e6ae1099f2
SHA25689e572bbce672b25b93c9f95b4ae3e1295da308f79c7ed0342ad40e184b5a6e4
SHA512a397a0a64c5fe734e98ef911d929897f0fa6b4d272956d0c5eca170a7e226783b52f4eb7871bd73bbf6517a98c6ba5e93608b1f8d807b320ab97e8555719ae94
-
Filesize
1.1MB
MD5bb05e538eb0fd043124c1dbd7a54f6a0
SHA1c44c550a754d87880e3413cfa0cb3bcbe7523edb
SHA2560255d50c8fc8f036794a3cebdf2937a94821c6cf07caee1be90cf11fbf4f4c47
SHA512ff6a9b0862307ebe85d72a62eefc09054290995c373f3c5b248bb6f04a6246d68160f6227873bc11649b894cd011f263c0d258796dffa09afb31412d78a8be69
-
Filesize
1.1MB
MD592cf692ec1350a03271cf7241d696852
SHA17af420c4564b67485bb6ea043a242f366fedef12
SHA256ebd8b64b606c941b14c0b2a20d308672ecb0bae4e7bab5bf3180c820276f1355
SHA512f3955b98ecef489e35274f7eef8d37c0650c078e651ac167c3ced8b0109536e0b3479cbe65d5c4b71aba0b0a8cccd531e6448740f638729159c70455d104a851
-
Filesize
1.1MB
MD5cf672c2191ad9aabd4c380a95bf426e0
SHA1e0c8d175e98483242f61efcb9885a8369051a9e8
SHA25688e08b41b3470b4c1438f95d8e72164c5d8d9471f956d4545489e4f3ebd683d2
SHA512ec68dd9a0d7292d9a570500d3e119db2056869814f0195f2d0b69d043a50a6031a0b122c016229a92015d2b3f34cba8f9939888fb469f1f73592f004d59af351
-
Filesize
1.1MB
MD5eeea43d3974ad7c693bc76ecd2f687da
SHA1939720d7aaf86ca815d75f08bea4cdb5d588f4bd
SHA25664caf40aea1b4605b064f7aea7bce2eb745ec6ff1bea5621fc8d0e401e804f4f
SHA51215a2396e3b06253add6b9e117540e65a63a1acc6c48b6a52c1f9b8929aacba3addb8e11bb879b3b7d8a75278c626886877cbe0ae4ae0ba498e1b4c2c76ba4618
-
Filesize
1.1MB
MD530692e87e6b0f97e6277ede297df9e84
SHA19184fe68950608bf81e706bb93f8f5b6dec26030
SHA256b9e6942fcb22fd19400980b3fe0ce66cb1b90cae0f0a3d9e263f84265c6cb371
SHA51207c7bd39596ca10ad8e3496eed24ed6b843a1dad3ef758c0a2a12993207b281e218f88dd71a8b73e7b78fd1c0c0686864a8cb79f5f1181e5bab41d5edf927b59
-
Filesize
1.1MB
MD545da064a83b06d0619b45025a0607c79
SHA13cd0336619073a14ef2daef249a600ca1784af54
SHA2569247ad81f3ce766c45a6393fc0aec29b60f351e629f6a19f7fc040241a34b07f
SHA5120626c8625cbe2ea74d96e615db5b96eb72859e2b3eb26df6f381bb25f81ac5b1379ed690475b45eeef283c22ecb0ad95cfe39c0bc631676c669def06df523a0f
-
Filesize
26.4MB
MD5906cdf7e8b06d10615d27eaf2a4efb53
SHA11e1878a8120a97e07c0518d5f749fe223b695790
SHA256df71c77e4703460b138fb417b13c2e839420839a201ca656d5c427ff3aadae8d
SHA5123e4776c8a841a7a2de0a0e3a76af439e99287ee40dfe62cbbd3abd40440a8778095660438ca1eb8c01bb48dc9400cba5acab8872b0f16db6ec964e354c82c1ef
-
Filesize
26.4MB
MD5906cdf7e8b06d10615d27eaf2a4efb53
SHA11e1878a8120a97e07c0518d5f749fe223b695790
SHA256df71c77e4703460b138fb417b13c2e839420839a201ca656d5c427ff3aadae8d
SHA5123e4776c8a841a7a2de0a0e3a76af439e99287ee40dfe62cbbd3abd40440a8778095660438ca1eb8c01bb48dc9400cba5acab8872b0f16db6ec964e354c82c1ef
-
Filesize
1KB
MD544172c590a8ca9599229aa0c38baba53
SHA1fb599d9422bd8c01b56474c7dc5b1fb6c01d88a4
SHA2562f7d3c137ca7f6adddc12c601484f05b001889ff1a56812efcb2f0daf742b83f
SHA512450279af0a36da24dc0ab231ce52fdae7c0fd434ed621864fde9db3dbb83c1aaa47ff8cf5cedd7980b1989be01ca4c7429e82543826be1d51b8404be0a52d409
-
Filesize
404B
MD5874b930b4c2fddc8043f59113c044a14
SHA175b14a96fe1194f27913a096e484283b172b1749
SHA256f4f666f4b831e84710983b0e9e905e87342b669f61109fd693688d89c12309d8
SHA512f4b0337fba5c5f4d7e7a02aa5d4538334edd38f5df179e4f1701fa2f1c4d3d856a074fa55ea724c4e2a6c5a1ac1dbfc7e9966c814475c7cd2c65cd44fca14621
-
Filesize
2KB
MD5cc850fd9abce3912c944d77d8955ebc9
SHA171e699b4b680aad0bc339a6511afc75ebb898064
SHA256e98e0cc330528886e469d795e74a240693968d6a88f3de214878d8f5b08d4bad
SHA512a8d5aad5fe365d9ea261636956952f705353833456a6cf9dbb4b88d87bbdb2fd52823dad9e77932af8615f2a3e7a1c1c1bacdb5cb00e65affb2644ee3f2def80
-
Filesize
8B
MD502fcd3a4e0f4bef1016affcce43facfe
SHA17aabd850de5437a3c468eee9c04bed4beb775279
SHA256af85e9ba6adee8fc04b413d9e865e49268e9b5f6f61557ab17d0c8c1294e1666
SHA5120d69295f1f9585bac640cb6b2277e6d820778e71f35df80296298799365fff73ede43c7e1b6bb07da7c22d73541b5de3f5ea087b83a64fd08792d4368cbd7bb1
-
Filesize
473KB
MD5ed17abee766074018926ff48e0ce7a3d
SHA1d6d3172176302db9ee6225ea06dc1667a814327b
SHA256a8325bd88171952dfb45b16d8bf541e4fbe5d0e546c4e6f6d8aca32b96756dc8
SHA5127dba4925e7aa66b172c76e294938385db09edaf652b751ca3464b03b6203387c07c13c93eafaa9707ec8ad03cc586b1d67abbc731ff6792d422f49a18c30ca86
-
Filesize
473KB
MD5ed17abee766074018926ff48e0ce7a3d
SHA1d6d3172176302db9ee6225ea06dc1667a814327b
SHA256a8325bd88171952dfb45b16d8bf541e4fbe5d0e546c4e6f6d8aca32b96756dc8
SHA5127dba4925e7aa66b172c76e294938385db09edaf652b751ca3464b03b6203387c07c13c93eafaa9707ec8ad03cc586b1d67abbc731ff6792d422f49a18c30ca86
-
Filesize
215KB
MD50ba0713397a453abccfdd0542a8a8c1d
SHA138825f7a4f8997998620d695beb80f7aa9748e6a
SHA2566e0aaf4d72409c28d8ae7bd0b669615cd5bc7d1b3631e024dc04db57f02b16b3
SHA512f550cdd6f9dfb4763c8677d3ba807137c7ff7865484817321d5c28d8a1b8177fb3d2016662c27e04cb27df935bb963c51e374888dd8046a8f19bdebd9421a5a8
-
Filesize
200KB
MD55ec1b36846a321c57a5cb34ec5f97343
SHA16735696ac66aaa9c8114292e446430e04a46bbec
SHA2560fe3afdabf546e2ca41b2d3338b8d37153eb55afcc2cba4212e94038051aa7b2
SHA5121c7e1d3cacfb7b4a4e54a6bcefa136f097cce4b1f9faf25e32c27e97361dedcea31b25796958491372f2d7e692fcca444c320298b3458785ac96dd6fe4cb243f
-
Filesize
200KB
MD55ec1b36846a321c57a5cb34ec5f97343
SHA16735696ac66aaa9c8114292e446430e04a46bbec
SHA2560fe3afdabf546e2ca41b2d3338b8d37153eb55afcc2cba4212e94038051aa7b2
SHA5121c7e1d3cacfb7b4a4e54a6bcefa136f097cce4b1f9faf25e32c27e97361dedcea31b25796958491372f2d7e692fcca444c320298b3458785ac96dd6fe4cb243f
-
Filesize
159KB
MD5f29cb130d1025dc8b3f624a0ebf3b59b
SHA157b74398f4e91254b6eee9a9cc10d95c47abaaf8
SHA2568fdfb8dff1877580d123430eb0b4aac90a4620f5a0416620331ae756ef250bcb
SHA5127baf9566916f18db6704ff08ed5fb80802514d6a917272f7ad963510af771d38e285aadb634bfeb2bd235e88b24634d6ee07c962a948897376ad2581d7903d4f
-
Filesize
100KB
MD52f6048c01352d767c0117978ec38aca3
SHA18600cf7582fc6fb7377127c117ec01e0a363ef70
SHA256a9eaa2d5ee75cb5fee0b9f872562fb2b09d240ec720bcfbed2902d441daf6481
SHA51296b7a4ee299a3608338a8fd9707a5f88cc0361fb8599fe84ca7846a241c59385eaa45b6148649013f3e471fadbe0b1e9a60470c62e670129e814a9093d9bc0b9
-
Filesize
100KB
MD571ef87f1d534fd662919df5c3fd47385
SHA1a1760e64db4f2917968c2d7f17c245eb771e39ba
SHA25646c28186ed6451c3df81cd4cefaea358a0acda64a1da2fb01b3e487fb04d4b03
SHA5128902b66f0818cafd5f573c662ad9e61d168a5bd9d06a7a1f9bf4adada0f5f65dcf214492b75325c81405c21c403203b5bb023dba0970f7e3a2498a511c081886
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
85.0MB
MD567fb4f3cb6b9642d6b78e10a554ac117
SHA1fa962ad66a79a1be9968ed9a11d81a25b35efcf6
SHA256245d9d08e4a9c76c432545aa5d78391fafa44ab7422367c4df81dab39a7482ef
SHA512c85549154ab4f0ca4d7df6fc431ba43de3a2191065e948af801cd36d391599e0ada0192225e2ef47f96d9ef92163fdcaf856d752a5e87b447424097e55f3af72
-
Filesize
23.0MB
MD5ad74f3c587b876d73650b656382ac02c
SHA1f19b3c92f158d67fc2817f337ae3a04e04147afa
SHA25637c02ffd948d9d589b686fe2b776c725c33039b8128d69ba952e35d926b81df9
SHA51218b7f56520528c41fa92d5e94bb8c6bd296439dfd3bb7249dc531533c05edaf4fccdb4c2b196a2d9d181b2651da3f4710d8d829976ff00f5ba811f785b64d574
-
\??\Volume{1f21c27e-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{c5e85314-6229-4b9a-9a3b-a6af672cbe08}_OnDiskSnapshotProp
Filesize5KB
MD5574e2cf713f56153103e2caf5f9ce3b9
SHA1281787e4170ff04effc1414f8c76ea90c30e374e
SHA25647d2588408d1be52e4c75b6623b8fd272dc55df519e0fdeea819f2143026e8c9
SHA51250e437d5fd4fc334684093f0e7e25a9764e3f18dc6f83db04e7f10d86b0d81a1c953d6d57882675ae003a84a2689267b0f80bb36cbcd8371a4de091fc299b786
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e