Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
utweb_installer.exe
Resource
win10v2004-20231020-en
General
-
Target
utweb_installer.exe
-
Size
1.7MB
-
MD5
6d13def9f6985f3913bba85545487b21
-
SHA1
c76d2d85f397f7709a8f5f92829e55fa56f02d32
-
SHA256
185faf8d2eca57385d5318bc437739d282deddfe10f433a9b675edcd74d2e6c8
-
SHA512
e4d4561cfd3bf9a6b3fce32e7ff9c82e994e68e13bc660e311e4804cf6553045d5c9ff1f7aee6cf934ed5052903d4c5605185ad4012b5b75fec105986702ae83
-
SSDEEP
49152:JBuZrEU5ZJK6kOBnTl7t3/mYlDctgdpcj:fkL5yrUp7t3/mYlQtec
Malware Config
Signatures
-
Downloads MZ/PE file
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1511405631-3522522280-778892991-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\utweb = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent Web\\utweb.exe\" /MINIMIZED" utweb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 3 IoCs
pid Process 4808 utweb_installer.tmp 4696 utweb_installer.exe 648 utweb.exe -
Loads dropped DLL 16 IoCs
pid Process 4696 utweb_installer.exe 4696 utweb_installer.exe 4696 utweb_installer.exe 4696 utweb_installer.exe 4696 utweb_installer.exe 4696 utweb_installer.exe 4696 utweb_installer.exe 4696 utweb_installer.exe 4696 utweb_installer.exe 4696 utweb_installer.exe 648 utweb.exe 648 utweb.exe 648 utweb.exe 648 utweb.exe 648 utweb.exe 648 utweb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 utweb_installer.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ utweb_installer.tmp -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 39 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\uTorrent Web\\utweb.exe,0" utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Roaming\\uTorrent Web\\utweb.exe \"%1\" /SHELLASSOC" utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\shell\ = "open" utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\DefaultIcon utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Roaming\\uTorrent Web\\utweb.exe \"%1\" /SHELLASSOC" utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.torrent utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.torrent\ = "Torrent File" utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\shell\ = "open" utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.btwkey\OpenWithProgids utweb_installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\.btwkey\OpenWithProgids\BTWKey File = "0" utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\URL Protocol utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\Content Type\ = "application/x-magnet" utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.btwkey\ = "BTWKey File" utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\ = "Magnet URI" utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\Content Type = "application/x-magnet" utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\Content Type utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\uTorrent Web\\utweb.exe,0" utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\shell\open\command utweb_installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\.torrent\OpenWithProgids\Torrent File = "0" utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\shell utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\shell\open\command utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.btwkey utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\ = "BTWKey File" utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\shell utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\DefaultIcon utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\shell\ = "open" utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.torrent\OpenWithProgids utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\shell\open utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\shell\open utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Roaming\\uTorrent Web\\utweb.exe \"%1\" /SHELLASSOC" utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\DefaultIcon utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\uTorrent Web\\utweb.exe,0" utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File\shell\open\command utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\shell utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Magnet\shell\open utweb_installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Torrent File\ = "Torrent File" utweb_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BTWKey File utweb_installer.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431 utweb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431\Blob = 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 utweb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431\Blob = 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 utweb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 utweb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 utweb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 utweb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431\Blob = 040000000100000010000000ee2931bc327e9ae6e8b5f751b4347190030000000100000014000000503006091d97d4f5ae39f7cbe7927d7d652d34317e000000010000000800000000c001b39667d6011d0000000100000010000000e871723e266f38af5d49cda2a502669c14000000010000001400000055e481d11180bed889b908a331f9a1240916b9700b000000010000001e00000045006e0074007200750073007400200028003200300034003800290000006200000001000000200000006dc47172e01cbcb0bf62580d895fe2b8ac9ad4f873801e0c10b9c837d21eb1777f000000010000002c000000302a060a2b0601040182370a030406082b0601050507030506082b0601050507030606082b06010505070307530000000100000041000000303f3020060a6086480186fa6c0a010230123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f0000000100000014000000327fc447408de9bf596f83d4b2fa4b8e3e7097d819000000010000001000000091fad483f14848a8a69b18b805cdbb3a20000000010000002e0400003082042a30820312a00302010202043863def8300d06092a864886f70d01010505003081b431143012060355040a130b456e74727573742e6e65743140303e060355040b14377777772e656e74727573742e6e65742f4350535f3230343820696e636f72702e206279207265662e20286c696d697473206c6961622e2931253023060355040b131c286329203139393920456e74727573742e6e6574204c696d69746564313330310603550403132a456e74727573742e6e65742043657274696669636174696f6e20417574686f7269747920283230343829301e170d3939313232343137353035315a170d3239303732343134313531325a3081b431143012060355040a130b456e74727573742e6e65743140303e060355040b14377777772e656e74727573742e6e65742f4350535f3230343820696e636f72702e206279207265662e20286c696d697473206c6961622e2931253023060355040b131c286329203139393920456e74727573742e6e6574204c696d69746564313330310603550403132a456e74727573742e6e65742043657274696669636174696f6e20417574686f726974792028323034382930820122300d06092a864886f70d01010105000382010f003082010a0282010100ad4d4ba91286b2eaa320071516642a2b4bd1bf0b4a4d8eed8076a567b77840c07342c868c0db532bdd5eb8769835938b1a9d7c133a0e1f5bb71ecfe524141eb181a98d7db8cc6b4b03f1020cdcaba54024007f7494a19d0829b3880bf587779d55cde4c37ed76a64ab851486955b9732506f3dc8ba660ce3fcbdb849c176894919fdc0a8bd89a3672fc69fbc711960b82de92cc99076667b94e2af78d665535d3cd69cb2cf2903f92fa450b2d448ce0532558afdb2644c0ee4980775db7fdfb9085560853029f97b48a46986e3353f1e865d7a7a15bdef008e1522541700902693bc0e496891bff847d39d9542c10e4ddf6f26cfc3182162664370d6d5c007e10203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041455e481d11180bed889b908a331f9a1240916b970300d06092a864886f70d010105050003820101003b9b8f569b30e753997c7a79a74d97d7199590fb061fca337c46638f966624fa401b2127cae67273f24ffe3199fdc80c4c6853c680821398fab6adda5d3df1ce6ef6151194820cee3f95af11ab0fd72fde1f038f572c1ec9bb9a1a4495eb184fa61fcd7d57102f9b04095a84b56ed81d3ae1d69ed16c795e791c14c5e3d04c933b653ceddf3dbea6e5951ac3b519c3bd5e5bbbff23ef6819cb1293275c032d6f30d01eb61aacde5af7d1aaa827a6fe7981c479993357ba12b0a9e0426c93ca56defe6d840b088b7e8dead79821c6f3e73c792f5e9cd14c158de1ec2237cc9a430b97dc80908db3679b6f48081556cfbff12b7c5e9a76e95990c57c8335116551 utweb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431\Blob = 5c00000001000000040000000008000019000000010000001000000091fad483f14848a8a69b18b805cdbb3a0f0000000100000014000000327fc447408de9bf596f83d4b2fa4b8e3e7097d8090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b06010505070308530000000100000041000000303f3020060a6086480186fa6c0a010230123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c07f000000010000002c000000302a060a2b0601040182370a030406082b0601050507030506082b0601050507030606082b060105050703076200000001000000200000006dc47172e01cbcb0bf62580d895fe2b8ac9ad4f873801e0c10b9c837d21eb1770b000000010000001e00000045006e00740072007500730074002000280032003000340038002900000014000000010000001400000055e481d11180bed889b908a331f9a1240916b9701d0000000100000010000000e871723e266f38af5d49cda2a502669c7e000000010000000800000000c001b39667d601030000000100000014000000503006091d97d4f5ae39f7cbe7927d7d652d3431040000000100000010000000ee2931bc327e9ae6e8b5f751b434719020000000010000002e0400003082042a30820312a00302010202043863def8300d06092a864886f70d01010505003081b431143012060355040a130b456e74727573742e6e65743140303e060355040b14377777772e656e74727573742e6e65742f4350535f3230343820696e636f72702e206279207265662e20286c696d697473206c6961622e2931253023060355040b131c286329203139393920456e74727573742e6e6574204c696d69746564313330310603550403132a456e74727573742e6e65742043657274696669636174696f6e20417574686f7269747920283230343829301e170d3939313232343137353035315a170d3239303732343134313531325a3081b431143012060355040a130b456e74727573742e6e65743140303e060355040b14377777772e656e74727573742e6e65742f4350535f3230343820696e636f72702e206279207265662e20286c696d697473206c6961622e2931253023060355040b131c286329203139393920456e74727573742e6e6574204c696d69746564313330310603550403132a456e74727573742e6e65742043657274696669636174696f6e20417574686f726974792028323034382930820122300d06092a864886f70d01010105000382010f003082010a0282010100ad4d4ba91286b2eaa320071516642a2b4bd1bf0b4a4d8eed8076a567b77840c07342c868c0db532bdd5eb8769835938b1a9d7c133a0e1f5bb71ecfe524141eb181a98d7db8cc6b4b03f1020cdcaba54024007f7494a19d0829b3880bf587779d55cde4c37ed76a64ab851486955b9732506f3dc8ba660ce3fcbdb849c176894919fdc0a8bd89a3672fc69fbc711960b82de92cc99076667b94e2af78d665535d3cd69cb2cf2903f92fa450b2d448ce0532558afdb2644c0ee4980775db7fdfb9085560853029f97b48a46986e3353f1e865d7a7a15bdef008e1522541700902693bc0e496891bff847d39d9542c10e4ddf6f26cfc3182162664370d6d5c007e10203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041455e481d11180bed889b908a331f9a1240916b970300d06092a864886f70d010105050003820101003b9b8f569b30e753997c7a79a74d97d7199590fb061fca337c46638f966624fa401b2127cae67273f24ffe3199fdc80c4c6853c680821398fab6adda5d3df1ce6ef6151194820cee3f95af11ab0fd72fde1f038f572c1ec9bb9a1a4495eb184fa61fcd7d57102f9b04095a84b56ed81d3ae1d69ed16c795e791c14c5e3d04c933b653ceddf3dbea6e5951ac3b519c3bd5e5bbbff23ef6819cb1293275c032d6f30d01eb61aacde5af7d1aaa827a6fe7981c479993357ba12b0a9e0426c93ca56defe6d840b088b7e8dead79821c6f3e73c792f5e9cd14c158de1ec2237cc9a430b97dc80908db3679b6f48081556cfbff12b7c5e9a76e95990c57c8335116551 utweb.exe -
Script User-Agent 5 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 18 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 35 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 37 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 38 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 45 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4696 utweb_installer.exe 4696 utweb_installer.exe 4340 msedge.exe 4340 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 648 utweb.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 4808 utweb_installer.tmp 648 utweb.exe 648 utweb.exe 648 utweb.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 648 utweb.exe 648 utweb.exe 648 utweb.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 4808 5100 utweb_installer.exe 85 PID 5100 wrote to memory of 4808 5100 utweb_installer.exe 85 PID 5100 wrote to memory of 4808 5100 utweb_installer.exe 85 PID 4808 wrote to memory of 4696 4808 utweb_installer.tmp 93 PID 4808 wrote to memory of 4696 4808 utweb_installer.tmp 93 PID 4808 wrote to memory of 4696 4808 utweb_installer.tmp 93 PID 4808 wrote to memory of 648 4808 utweb_installer.tmp 98 PID 4808 wrote to memory of 648 4808 utweb_installer.tmp 98 PID 4808 wrote to memory of 648 4808 utweb_installer.tmp 98 PID 648 wrote to memory of 2676 648 utweb.exe 99 PID 648 wrote to memory of 2676 648 utweb.exe 99 PID 2676 wrote to memory of 2188 2676 msedge.exe 100 PID 2676 wrote to memory of 2188 2676 msedge.exe 100 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 3208 2676 msedge.exe 101 PID 2676 wrote to memory of 4340 2676 msedge.exe 102 PID 2676 wrote to memory of 4340 2676 msedge.exe 102 PID 2676 wrote to memory of 4912 2676 msedge.exe 103 PID 2676 wrote to memory of 4912 2676 msedge.exe 103 PID 2676 wrote to memory of 4912 2676 msedge.exe 103 PID 2676 wrote to memory of 4912 2676 msedge.exe 103 PID 2676 wrote to memory of 4912 2676 msedge.exe 103 PID 2676 wrote to memory of 4912 2676 msedge.exe 103 PID 2676 wrote to memory of 4912 2676 msedge.exe 103 PID 2676 wrote to memory of 4912 2676 msedge.exe 103 PID 2676 wrote to memory of 4912 2676 msedge.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\utweb_installer.exe"C:\Users\Admin\AppData\Local\Temp\utweb_installer.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\is-L6396.tmp\utweb_installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-L6396.tmp\utweb_installer.tmp" /SL5="$120044,861770,820736,C:\Users\Admin\AppData\Local\Temp\utweb_installer.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\is-BE6M8.tmp\utweb_installer.exe"C:\Users\Admin\AppData\Local\Temp\is-BE6M8.tmp\utweb_installer.exe" /S3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
-
C:\Users\Admin\AppData\Roaming\uTorrent Web\utweb.exe"C:\Users\Admin\AppData\Roaming\uTorrent Web\utweb.exe" /RUNONSTARTUP3⤵
- Adds Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://utweb.rainberrytv.com/gui/index.html?v=1.4.0.5714&firstrun=1&localauth=localapid92531a01394d539:4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd767646f8,0x7ffd76764708,0x7ffd767647185⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,513589205902831275,13427814217795755922,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:25⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,513589205902831275,13427814217795755922,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,513589205902831275,13427814217795755922,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:85⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,513589205902831275,13427814217795755922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:15⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,513589205902831275,13427814217795755922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:15⤵PID:4076
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52430f921ebfb431716d98779707a18a8
SHA1a4296a634347c0c30b3e101fdd2a10d5a87746ba
SHA25600f6f17a7fdfde9da965c8236df95a72c6698f36274a632908d22039a2a828d1
SHA5128ceaae534e5558b6ef3f0db80527d8d79a1aeb369d3bca85d7e92da4ac5c9cad83e604e5f566e957cbf027192b1308c61098f7b493d5232efbc4a15082737a55
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5e636aaa91dde161fb081c980530f21b0
SHA159ae1348fa5b0dd4862dc0ddfc574bf14a3e12f8
SHA2565a53496099352c10e89091be9b264d8fd46695c5e058dac44e024e3fbe567b47
SHA512dee27dc70461bbb5948e8551af2f9f95fb36610192a9413974bca12f26178f1e140023b41b142be228ac5c53cb1cf78e1ba0b6cc3bf5b258de0f90157fb673ca
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD53c8fe276536871b0a971c6f9cd872f08
SHA1478fc1aa26191d12c6d2c4a62bf39b9e0befc9db
SHA256586ae44f469b988a8eb41e5d517b1fbf332cf7a4005aabff40ea08c780edc62c
SHA5123beaf9fe0a94335c36cb9e8755a62c239fbab81d895372a4a36e84b02af51ea84b157085bfcffba2594e785cbf8bcd8f73f9669ec6f41480be88603fd5afbfdb
-
Filesize
5KB
MD5c1d9b1db9bd2a096a745ad6f61bfb904
SHA1d566eb1dcaf057dd726a62c65e2c87c64a700eba
SHA256f0a2441569f36f480c8879e7f83f296c7030af9a62762a5e593b41c90a15d410
SHA512c402315fed63b628999cbccf163a2873e806e45a3f633bcf429ef1e55cf9f8b0eec37566a486e331c0f7bf28aef6f7436f93b8997568b261d78784a63b150f18
-
Filesize
24KB
MD5eebb87276d4d8c8e86399953f1fd5d76
SHA12c1b7f15617dad6c5621c1a4dcd4f9e85b50c969
SHA25667b90d14705ba0d32de1a712d96cee5ff1ba058c11206bc892e11ae77f985bc8
SHA5129e48898e2dab7bf7b0b23242a2379d04bd717a76c8d2362b413cbae2d29ef2e50ae9cc5c4521a6092e53e12e64a2576bb13afff815574204e722d48cf041dccf
-
Filesize
10KB
MD5e3d32a1f5fdbfb3bbe67f7d506eee578
SHA15eb37ca7bb9a5c14031be1c0479eb22ab2f9c59b
SHA2566913cd112fe545d46add06fbe0b62eac330cba94db750c0ef2af66efe9ff12db
SHA51242423c2b19503788af88baf42ed9b4a3abcf28a24c301062aa7fdc59f3215a45666c731fc0a98a3087da90584915cb62c8e56d93e6457e717ac024fd5f6e708c
-
Filesize
193KB
MD57c87614f099c75a0bed6ab01555143dd
SHA107ab72dc4a1e53e2c62ecccc1221472854d78635
SHA25602335420cb5c2fa33eec48f32706d2353f8b609daaf337458f04a8f98d999a7c
SHA51229b7ce896332ed2a05235645adb963b77920a0a252561684ea9f1f925f69dbcee4685e1b30584c1034a15b7efc18b911902d1ecb41c523cf2552ff23e165bf43
-
Filesize
47KB
MD54cfff8dc30d353cd3d215fd3a5dbac24
SHA10f4f73f0dddc75f3506e026ef53c45c6fafbc87e
SHA2560c430e56d69435d8ab31cbb5916a73a47d11ef65b37d289ee7d11130adf25856
SHA5129d616f19c2496be6e89b855c41befc0235e3ce949d2b2ae7719c823f10be7fe0809bddfd93e28735b36271083dd802ae349b3ab7b60179b269d4a18c6cef4139
-
Filesize
17.3MB
MD5a9ad36bc9e96fbf8ff02c42b5d088647
SHA1b6bf8390c129b1c1f1e3e7da9f1065815cc5f0a9
SHA2564f7a0e7d9cc1ac5eae7fdb9563d9495f77e108dbe9be1eda23c1a1ecace78c3e
SHA5125db450e24ad430a73008ef3a86fda4d5e0b598d29f2f27d8f680a242db3b841f792dd8555bdcc9c8c9991e634dacd8af04013a787599e538336f6ad83027900d
-
Filesize
17.3MB
MD5a9ad36bc9e96fbf8ff02c42b5d088647
SHA1b6bf8390c129b1c1f1e3e7da9f1065815cc5f0a9
SHA2564f7a0e7d9cc1ac5eae7fdb9563d9495f77e108dbe9be1eda23c1a1ecace78c3e
SHA5125db450e24ad430a73008ef3a86fda4d5e0b598d29f2f27d8f680a242db3b841f792dd8555bdcc9c8c9991e634dacd8af04013a787599e538336f6ad83027900d
-
Filesize
17.3MB
MD5a9ad36bc9e96fbf8ff02c42b5d088647
SHA1b6bf8390c129b1c1f1e3e7da9f1065815cc5f0a9
SHA2564f7a0e7d9cc1ac5eae7fdb9563d9495f77e108dbe9be1eda23c1a1ecace78c3e
SHA5125db450e24ad430a73008ef3a86fda4d5e0b598d29f2f27d8f680a242db3b841f792dd8555bdcc9c8c9991e634dacd8af04013a787599e538336f6ad83027900d
-
Filesize
3.0MB
MD516f9a34d47bc57d679f1741599e3f4ff
SHA198460d332affe49b061780ace87b87a206e0eb23
SHA25636d9598054c09fb7463f70c5cf2de727c47aac90442be9c8cf89e1f2c66768d4
SHA5125e95be05fc0edc8a9104a44395cd724afee2a460be40cd1507e60974092d43412a9f8cc25bc069f847c3354ec991a2ff490e7781ea8c8a7c9a2785097925887e
-
Filesize
3KB
MD5b4faf654de4284a89eaf7d073e4e1e63
SHA18efcfd1ca648e942cbffd27af429784b7fcf514b
SHA256c0948b2ec36a69f82c08935fac4b212238b6792694f009b93b4bdb478c4f26e3
SHA512eef31e332be859cf2a64c928bf3b96442f36fe51f1a372c5628264a0d4b2fc7b3e670323c8fb5ffa72db995b8924da2555198e7de7b4f549d9e0f9e6dbb6b388
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
8KB
MD5f5bf81a102de52a4add21b8a367e54e0
SHA1cf1e76ffe4a3ecd4dad453112afd33624f16751c
SHA25653be5716ad80945cb99681d5dbda60492f5dfb206fbfdb776b769b3eeb18d2c2
SHA5126e280a75f706474ad31b2ce770fa34f54cb598528fac4477c466200a608b79c0f9b84011545595d9ba94331ad08e2f51bd42de91f92379db27686a28ba351256
-
Filesize
8KB
MD5f5bf81a102de52a4add21b8a367e54e0
SHA1cf1e76ffe4a3ecd4dad453112afd33624f16751c
SHA25653be5716ad80945cb99681d5dbda60492f5dfb206fbfdb776b769b3eeb18d2c2
SHA5126e280a75f706474ad31b2ce770fa34f54cb598528fac4477c466200a608b79c0f9b84011545595d9ba94331ad08e2f51bd42de91f92379db27686a28ba351256
-
Filesize
8KB
MD5f5bf81a102de52a4add21b8a367e54e0
SHA1cf1e76ffe4a3ecd4dad453112afd33624f16751c
SHA25653be5716ad80945cb99681d5dbda60492f5dfb206fbfdb776b769b3eeb18d2c2
SHA5126e280a75f706474ad31b2ce770fa34f54cb598528fac4477c466200a608b79c0f9b84011545595d9ba94331ad08e2f51bd42de91f92379db27686a28ba351256
-
Filesize
1.4MB
MD59d7585d920144436fd23b5397ad20abf
SHA1396b69f02b672b2df8b630e0690c440f17e7cd8e
SHA2568b527770e0580ee328f8c91aae05016b174d15e13f28befff5a6b6a6f4837084
SHA512c6fce0b220e319c8c91739159e9870302240e734b15c1721bb1357b6e62772b743d62f0a8b280aa285d8adde10e1fe24056ccfd1b05b9bf220e7f4f9434dd356
-
Filesize
1.4MB
MD59d7585d920144436fd23b5397ad20abf
SHA1396b69f02b672b2df8b630e0690c440f17e7cd8e
SHA2568b527770e0580ee328f8c91aae05016b174d15e13f28befff5a6b6a6f4837084
SHA512c6fce0b220e319c8c91739159e9870302240e734b15c1721bb1357b6e62772b743d62f0a8b280aa285d8adde10e1fe24056ccfd1b05b9bf220e7f4f9434dd356
-
Filesize
927KB
MD5c123211331c1f98b8a679ecbd5048997
SHA14b6807dcbbb0160b191cba08413c79ce557921ed
SHA2564e8d418e6b1345c05e08a4b88e78a84a97c9a8179ca851bd87c93836c2409f31
SHA5124232c5f759109cb71a5c5833cb3de2b641c71504f62132cced98f56f792c11d9d5a84ac96c91c8dec6b4d19021b9ba555976779957faa3a6c6438f0abc51a6e8
-
Filesize
927KB
MD5c123211331c1f98b8a679ecbd5048997
SHA14b6807dcbbb0160b191cba08413c79ce557921ed
SHA2564e8d418e6b1345c05e08a4b88e78a84a97c9a8179ca851bd87c93836c2409f31
SHA5124232c5f759109cb71a5c5833cb3de2b641c71504f62132cced98f56f792c11d9d5a84ac96c91c8dec6b4d19021b9ba555976779957faa3a6c6438f0abc51a6e8
-
Filesize
620KB
MD5e0cdb9bbfa7a22ef965d55161945176e
SHA11d0929e86b838f02025552cd4e0f6eb91f769d75
SHA25647a1c21d501b81a93088ae081da08e74d098ac82e0dbae7a909f39af5bd24815
SHA512813c9b18aa7e8d8794010cc40eda839db324079a87a784b9ab8a98c3f318e9c12d2d86eaa8bd4ec1e4ec6175a9e12efce243c0d0daa193b802ed0cc4739173f5
-
Filesize
620KB
MD5e0cdb9bbfa7a22ef965d55161945176e
SHA11d0929e86b838f02025552cd4e0f6eb91f769d75
SHA25647a1c21d501b81a93088ae081da08e74d098ac82e0dbae7a909f39af5bd24815
SHA512813c9b18aa7e8d8794010cc40eda839db324079a87a784b9ab8a98c3f318e9c12d2d86eaa8bd4ec1e4ec6175a9e12efce243c0d0daa193b802ed0cc4739173f5
-
Filesize
5.0MB
MD59c007b9613e66049b29fe4061ae92b64
SHA1fdd3add899f870e21adfc37f7875c3a5d74d8ddf
SHA2562b816a4b0067dfb42956a7f0c31529a14f8b5e9670719c33e9a7fdd964fa08f5
SHA51252287e1071ee283ae93b25da3c22f1fe032860226f0a3cc4c172426f39d922bd93a94df9d9cc0dc6999031d6d032518e9af6be0be3e6efc943b7043b40cfde75
-
Filesize
2.4MB
MD5cc316f02b1166ba92e53788ab269a639
SHA1f1ffc069ffd1abacd9b3378a2c40599b8a3d0f85
SHA256b8453da0de5aefb1b775486cec41011c4877ebd1ffa8089d89bce2ee8e3d5eb5
SHA5120a86400a472c4ae91a051dde9b260b630f81028aef144f6b6c37754801049958cef3545f903427b0ad1af8c380c8267d95dfd8144601c7c6fedc239ad4a397db
-
Filesize
2.4MB
MD5cc316f02b1166ba92e53788ab269a639
SHA1f1ffc069ffd1abacd9b3378a2c40599b8a3d0f85
SHA256b8453da0de5aefb1b775486cec41011c4877ebd1ffa8089d89bce2ee8e3d5eb5
SHA5120a86400a472c4ae91a051dde9b260b630f81028aef144f6b6c37754801049958cef3545f903427b0ad1af8c380c8267d95dfd8144601c7c6fedc239ad4a397db
-
Filesize
525KB
MD588228668dfd302da82a2ce585db55f38
SHA130092d8680c184726e45879f6c7340ecdf98b388
SHA2562129c263ad08f415ac40abce658e13327ab5911f59a21767dab56d3167083020
SHA5128b88a1cf14ef47c39c00568df9b421a45936c74989b428e668ec737438fe993f0c08f65a1f164d54594ea66b49e976c3991cc9a9bc2d56c0bce90e589e142bda
-
Filesize
525KB
MD588228668dfd302da82a2ce585db55f38
SHA130092d8680c184726e45879f6c7340ecdf98b388
SHA2562129c263ad08f415ac40abce658e13327ab5911f59a21767dab56d3167083020
SHA5128b88a1cf14ef47c39c00568df9b421a45936c74989b428e668ec737438fe993f0c08f65a1f164d54594ea66b49e976c3991cc9a9bc2d56c0bce90e589e142bda
-
Filesize
149KB
MD569ae94597b9412a9936aa43340ad1826
SHA167cdf694af7543186f1492897d69f5ab41cfe4d4
SHA25611771c928aff73893e72de8e01912dbbb8c5d8643f23601545457c96d5b8361f
SHA51234c7e20d67eb0c8076fb83fdc01628d7d532611a5e56c882085acf648eeb6199a5f4b54c6d848846c502f6c1089cf5eacddc0b7bce6667bd84369b2d338f6e93
-
Filesize
149KB
MD569ae94597b9412a9936aa43340ad1826
SHA167cdf694af7543186f1492897d69f5ab41cfe4d4
SHA25611771c928aff73893e72de8e01912dbbb8c5d8643f23601545457c96d5b8361f
SHA51234c7e20d67eb0c8076fb83fdc01628d7d532611a5e56c882085acf648eeb6199a5f4b54c6d848846c502f6c1089cf5eacddc0b7bce6667bd84369b2d338f6e93
-
Filesize
6.1MB
MD59d69c89d503302ea9b83dc0ca841a421
SHA14bddff916eaae96c449c34cfa1a94ebc74e106ef
SHA25658f2463c0885326ce24faf80a03edc676e171e676f22d325ffdd15f6c84039db
SHA512d6338e68081b00f93d018cef35f12fd47047d472f1899d556bc2ad1a656477dc8598b998674b1c83ab386e03d7eb3864481b984f335fb9c1301803862b18ca3e
-
Filesize
6.1MB
MD59d69c89d503302ea9b83dc0ca841a421
SHA14bddff916eaae96c449c34cfa1a94ebc74e106ef
SHA25658f2463c0885326ce24faf80a03edc676e171e676f22d325ffdd15f6c84039db
SHA512d6338e68081b00f93d018cef35f12fd47047d472f1899d556bc2ad1a656477dc8598b998674b1c83ab386e03d7eb3864481b984f335fb9c1301803862b18ca3e
-
Filesize
6.1MB
MD59d69c89d503302ea9b83dc0ca841a421
SHA14bddff916eaae96c449c34cfa1a94ebc74e106ef
SHA25658f2463c0885326ce24faf80a03edc676e171e676f22d325ffdd15f6c84039db
SHA512d6338e68081b00f93d018cef35f12fd47047d472f1899d556bc2ad1a656477dc8598b998674b1c83ab386e03d7eb3864481b984f335fb9c1301803862b18ca3e