Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Malware-da...00.exe
windows7-x64
Malware-da...00.exe
windows10-2004-x64
Malware-da...ws.exe
windows7-x64
6Malware-da...ws.exe
windows10-2004-x64
6Malware-da...as.exe
windows7-x64
1Malware-da...as.exe
windows10-2004-x64
1Malware-da...ck.exe
windows7-x64
1Malware-da...ck.exe
windows10-2004-x64
1Malware-da...V2.exe
windows7-x64
10Malware-da...V2.exe
windows10-2004-x64
10Malware-da...er.exe
windows7-x64
1Malware-da...er.exe
windows10-2004-x64
1Malware-da...ICENSE
windows7-x64
1Malware-da...ICENSE
windows10-2004-x64
1Malware-da...an.exe
windows7-x64
1Malware-da...an.exe
windows10-2004-x64
1Malware-da...up.exe
windows7-x64
1Malware-da...up.exe
windows10-2004-x64
1Malware-da...nt.exe
windows7-x64
Malware-da...nt.exe
windows10-2004-x64
Malware-da...DME.md
windows7-x64
3Malware-da...DME.md
windows10-2004-x64
3Malware-da...ye.exe
windows7-x64
Malware-da...ye.exe
windows10-2004-x64
Malware-da...ry.exe
windows7-x64
10Malware-da...ry.exe
windows10-2004-x64
10Malware-da...op.exe
windows7-x64
7Malware-da...op.exe
windows10-2004-x64
7Resubmissions
27/05/2024, 22:11
240527-14ae9ada43 1027/05/2024, 21:15
240527-z3zhbabd59 1013/02/2024, 12:11
240213-pcwzdshd2w 1013/02/2024, 12:08
240213-pa6qtahc7y 1018/12/2023, 08:13
231218-j4g2nabaf5 1005/12/2023, 08:54
231205-kt32taae27 1005/12/2023, 07:41
231205-jjdthahh6w 1005/12/2023, 07:38
231205-jgmcvshh5x 1026/11/2023, 09:39
231126-lmxf5agd87 10Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/12/2023, 08:13
Behavioral task
behavioral1
Sample
Malware-database-main/000.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Malware-database-main/000.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Malware-database-main/ChilledWindows.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Malware-database-main/ChilledWindows.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Malware-database-main/Christmas.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Malware-database-main/Christmas.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Malware-database-main/CookieClickerHack.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Malware-database-main/CookieClickerHack.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Malware-database-main/Electron V2.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Malware-database-main/Electron V2.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Malware-database-main/Flasher.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Malware-database-main/Flasher.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Malware-database-main/LICENSE
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
Malware-database-main/LICENSE
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Malware-database-main/MEMZ Trojan.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Malware-database-main/MEMZ Trojan.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Malware-database-main/Popup.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Malware-database-main/Popup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Malware-database-main/PowerPoint.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
Malware-database-main/PowerPoint.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
Malware-database-main/README.md
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
Malware-database-main/README.md
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
Malware-database-main/RedEye.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
Malware-database-main/RedEye.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
Malware-database-main/WannaCry.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
Malware-database-main/WannaCry.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
Malware-database-main/butterflyondesktop.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
Malware-database-main/butterflyondesktop.exe
Resource
win10v2004-20231215-en
General
-
Target
Malware-database-main/butterflyondesktop.exe
-
Size
2.8MB
-
MD5
1535aa21451192109b86be9bcc7c4345
-
SHA1
1af211c686c4d4bf0239ed6620358a19691cf88c
-
SHA256
4641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6
-
SHA512
1762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da
-
SSDEEP
49152:5aA7f7tlVmdqK23H2bpHI4Qs5ABV9WRHZRsgI82lcHGAaKLinXBgJ:Q+VMkX224QsWBq5SfARGRgJ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2908 butterflyondesktop.tmp 2880 ButterflyOnDesktop.exe -
Loads dropped DLL 7 IoCs
pid Process 2344 butterflyondesktop.exe 2908 butterflyondesktop.tmp 2908 butterflyondesktop.tmp 2908 butterflyondesktop.tmp 2908 butterflyondesktop.tmp 2908 butterflyondesktop.tmp 2908 butterflyondesktop.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\ButterflyOnDesktop butterflyondesktop.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Butterfly on Desktop\is-L437P.tmp butterflyondesktop.tmp File opened for modification C:\Program Files (x86)\Butterfly on Desktop\unins000.dat butterflyondesktop.tmp File created C:\Program Files (x86)\Butterfly on Desktop\unins000.dat butterflyondesktop.tmp File created C:\Program Files (x86)\Butterfly on Desktop\is-RGM3V.tmp butterflyondesktop.tmp File created C:\Program Files (x86)\Butterfly on Desktop\is-82QL2.tmp butterflyondesktop.tmp File created C:\Program Files (x86)\Butterfly on Desktop\is-34DNQ.tmp butterflyondesktop.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "61" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\freedesktopsoft.com\ = "61" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "18" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "29" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9626CC71-9D7D-11EE-B578-EAAD54D9E991} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "4105" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d3000000000020000000000106600000001000020000000ce9d0866286369940e771ef63e87aff5ec2a6afc78d8a4a136afa9af7ab6c23a000000000e8000000002000020000000393fd383b61520eb20ec44a1956cd37fe74470425911f369f15ad9a58770edac200000001c2e645db55a1190ca6b3338719c759cd310f0e37e082656798abbb624ed27e2400000000e51f386af6b16d602935dce0a9930f45731e32160f0d7677d6c3f6ee6f94cc1e53459ca2b2eadd89fb80af335603b204a990c1b55987685b34956c89d79af85 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\freedesktopsoft.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09e8a6d8a31da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409049189" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\freedesktopsoft.com\Total = "29" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\freedesktopsoft.com\ = "4027" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "4123" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\freedesktopsoft.com\ = "3991" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\freedesktopsoft.com\Total = "4105" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\freedesktopsoft.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\freedesktopsoft.com\ = "29" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "3991" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "18" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "4027" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\freedesktopsoft.com\Total = "4027" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\freedesktopsoft.com\ = "4105" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\freedesktopsoft.com\Total = "61" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\freedesktopsoft.com\Total = "3991" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2908 butterflyondesktop.tmp 2880 ButterflyOnDesktop.exe 2668 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2880 ButterflyOnDesktop.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2908 2344 butterflyondesktop.exe 28 PID 2344 wrote to memory of 2908 2344 butterflyondesktop.exe 28 PID 2344 wrote to memory of 2908 2344 butterflyondesktop.exe 28 PID 2344 wrote to memory of 2908 2344 butterflyondesktop.exe 28 PID 2344 wrote to memory of 2908 2344 butterflyondesktop.exe 28 PID 2344 wrote to memory of 2908 2344 butterflyondesktop.exe 28 PID 2344 wrote to memory of 2908 2344 butterflyondesktop.exe 28 PID 2908 wrote to memory of 2880 2908 butterflyondesktop.tmp 31 PID 2908 wrote to memory of 2880 2908 butterflyondesktop.tmp 31 PID 2908 wrote to memory of 2880 2908 butterflyondesktop.tmp 31 PID 2908 wrote to memory of 2880 2908 butterflyondesktop.tmp 31 PID 2908 wrote to memory of 2668 2908 butterflyondesktop.tmp 32 PID 2908 wrote to memory of 2668 2908 butterflyondesktop.tmp 32 PID 2908 wrote to memory of 2668 2908 butterflyondesktop.tmp 32 PID 2908 wrote to memory of 2668 2908 butterflyondesktop.tmp 32 PID 2668 wrote to memory of 1192 2668 iexplore.exe 34 PID 2668 wrote to memory of 1192 2668 iexplore.exe 34 PID 2668 wrote to memory of 1192 2668 iexplore.exe 34 PID 2668 wrote to memory of 1192 2668 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Malware-database-main\butterflyondesktop.exe"C:\Users\Admin\AppData\Local\Temp\Malware-database-main\butterflyondesktop.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\is-B3H3H.tmp\butterflyondesktop.tmp"C:\Users\Admin\AppData\Local\Temp\is-B3H3H.tmp\butterflyondesktop.tmp" /SL5="$30156,2719719,54272,C:\Users\Admin\AppData\Local\Temp\Malware-database-main\butterflyondesktop.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2880
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://freedesktopsoft.com/butterflyondesktoplike.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1192
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD581aab57e0ef37ddff02d0106ced6b91e
SHA16e3895b350ef1545902bd23e7162dfce4c64e029
SHA256a70f9e100dddb177f68ee7339b327a20cd9289fae09dcdce3dbcbc3e86756287
SHA512a651d0a526d31036a302f7ef1ee2273bb7c29b5206c9b17339baa149dd13958ca63db827d09b4e12202e44d79aac2e864522aca1228118ba3dcd259fe1fcf717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_2904BACC9596DCBFDE1A1AD512218F17
Filesize472B
MD5618c421ae8b21ead9b75846f59212e90
SHA15b0d86043df613f04ce45553bd97cdffa6989f8c
SHA2560c09bb037f1099544939fa6a91412038f1fde0168eefbb64b6e0ddbcbd964cf0
SHA512ff31251231a50ea394a59f5c042f159a68a9ca0bebc871dd4db59e8b371ddce2bd227a4b57092dcf0a9949a665e5c8b8b53b31841b72e40e5c12b02845cffb58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_2904BACC9596DCBFDE1A1AD512218F17
Filesize406B
MD578bc758f7aacdf4947a1b8b3bc827449
SHA16e01bb72bada707dbaeaea7300b59aad2f72353d
SHA2560f621e9c15f509aa02842928b7997526715b52b61780b60c06dbdde14a3c9175
SHA51215a17d5367643da0c42437b20c138277a86a3affecb619006396ee0e6b6119d18ad10602882a56cc0edf4d4ba7bd428ee32adea1da0cecd340f6e59024b9cafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e5eacb219bf084e8ddb9b7658feab2c
SHA1a7af1eced29468a8e0c5592bc4428d7204d6ec40
SHA256cfd1d4731b2f3a508ed5ef87a8d527c1326d442ebeb715196bf3ffae7077733a
SHA5126d20dd550cf04e3e4a06714eb4e3111ec5d0b480230b82a66c2e0c0eba91c077edff6461c1f34075b036b6c3eba2e7297b3bb690b9e48f980aa96bd837bb2f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5a40b31068f86bfb0bcedaaa86aab17
SHA1f16067df1a46ccb8ee2fb417f3e87ada61d8a02a
SHA256a4a03c01c2d0e77123d333f050c0668e64916ee87213aa36d27cc797099e4b09
SHA512206a0a23a7475fbf3f5e3fe6f86d3a0c20961bcc8a27af3cbc1eede1bdb1a8089b683528e11c6add06c4f67bf8e2036a1d31ddd3cd0f8bd997af2075de390a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5729da2915d2bd5ec3933101e5ab69b40
SHA1a17412db3919a185d9ceeadc489b366be9032e86
SHA2562e47a65ba8802480b0e3abcae357e5c49ed330f5388fc22d3cb9326b2243ed00
SHA512b9880e8572c63c3be9f38f589914d87de79ed2df4db5b9f0ea185c6abb99898c7840a7f9867a5a395a887f94f15c81b898c450fa15a1c026aa9d4a1433d3c081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59683cdc666905cc35e19fb434eeeb939
SHA1aeb3f35fc85d665d889866186df6d3dcf79b8515
SHA256cb8110735664d44c6d289ca5e473bce02623a020cb7ac3372c9789b49e1e0acd
SHA512713225bcc4dab98247e424eb78c68f00b20100a78c1b8e03b13e49c2a9295867a47e6aeb98965701f53bc6dbb001540b650cd00a6aef31e7164cbebef00a380d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589ce09f5af11d17c8e35473612da1b4b
SHA1e08b5ed220d68ba41f41424bb5cbfc8ba41062dd
SHA256dbc9c337c9f9929e8ecf637fa2681957a1936ab68575a7ec6481163f0362008c
SHA51280c08531693b0464551a0d5f36f7fc295bc31c9ae10de44628bc13336ed7af3202fd4c9328d3f6a002e94d014c269eb8b0e1d144d1794e5357e765bf40a34e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f05f947bd663a7c9bc1d88175bc182c4
SHA151deb4402153fddb391b27ec1baa95d7c1289c34
SHA2563d078e416179048828cf9ddbe272730372aedaa8057bb5f35414fd698b0e26ef
SHA512ed16483b508dc54d877a8c93a1327c83c21b7fc0dfb06fb19c57af819091063cd3c22b3ac73da10e38fb8f9c396f7b09140e1a011db33f62b7ce956fdcb27cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8e3b55d42c247e8a257f4abe376ac9f
SHA19e789a99039cfa6cbe4c0cc53800def949ce198b
SHA256aaaf6bd1eb1a86c7da73bb504c6cfc6005c1a16b43c725ccd911690da0ef57f3
SHA512f48eee53ea3f82e39fe17000335d2e6c324b4a6871bc3979b57b61019e05e8b8cc8a2c9f493ce079d5c049a9c2532c6ac957ef106cbab449b33fec791aff2be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b2a34036099d87a616f94182b024807
SHA10623d1167c0ab647e599213a3f26bb8efb34965b
SHA2566bbe7bb7ba71f21808380c4bc9412639448f560d7ce227ef5924d877a730cec5
SHA512694208e95363252d2c1689e490b7abf31bb693e7fbdb17eddcb0e03c2b751cff5d6a36a80921f611e641f952277da6f5a071b20e1b9f4de3a8c7c8a49c3ea14b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55382a1bc521c8a8b02da0b629140dcae
SHA1d9e7fd4f6fcbc4bb39149ded474a7fe969db4423
SHA256f560e8c6213fb93e417fc611e3952e5487924cdc0ce9e213006e689277df5ad8
SHA51229897a3ef8002c4f5eae87815870ecd386aa22d0326f5a9136c6e1e0beff7761588c6604cb64ce9485b9cd363ee15c7deb92c6dd5398bd68ee49b52fc07472e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bc8ec7764c4d56c908170bf691025f0
SHA17a21337fdf3044b320527e72db516e24c1e224bd
SHA2564bd3ee4a9d1aba34764f30122a082c36e9bd82f7cabbf394dc9f43897c32fa67
SHA5129306b6b12c7eb581f6f970453c729845e4139e99dbdd47f6d58cf111d2cb2e0f0aa7fb7ddacb07fb716605c151034d1f99b4373b0fafc37f604686a38f4d4a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d79786bc311efd500c407ca26fd33702
SHA1caae03cd746f76f81fdf5bdf16e21aeff9b159eb
SHA256b6db51dd310a478e8d9df021785b01d520dd98e60080dc28745359d82706ae31
SHA512b06f7af97106dd055dde49ae9aef474651a1f0b3d0b38413a1286fb91d58d5f986091c3c4c280378a9d3e22c9d540ede9c272526254c95fbabe76dcda296b405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfb34757b93a9b874102b9723ccebac5
SHA121e09bc03f2a93afa50054bac31c344aef269e13
SHA25664e58d3c0dfc1344800a5c86a1928c2f74e1e8fdff7f14b4ce0c1dfc0fdd782f
SHA512e60af858dfc2899a27b1907bef82143d54ca773b0ab0b29d832d29022325682259adee16de9889d67e45fdebf883d52c23c4b7273371bc4e597574ccb8ba0bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5566861a990533317cae20ab4b7c08dd5
SHA195a447b08bffbd91b62b7cdbe111b3cce625ca65
SHA25606ac457fc5f798b761d207734ee3482833b833fd0a2244a5c5a002350ce9cbdf
SHA512d5d3ba200305f16c8043411a72bec35ea17dc954cefe4660ed6e76aeeaa27853dd25b82f5b3e9db8471c1a37bbbee392dbfef4cb412888936da25d6628999cce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586c8b3dfce00ef3ed81f8c0e4b4f793e
SHA17bc30008773f2eaf6595f4193821f3eb838dd9d1
SHA2568ce1983fc3697fdb13795d0bf17c9cdfb1889a6a849d06de605b329912c8a4eb
SHA51273370a08a79152fed8fadd7a8260a9cb7c9ed7d5a8e2e30e2ae541cc3f0aea5e1f835d11e9fc4ab8690b3fe73ba030a1d483b21d7556e7d1b97c4a65625f7492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c856e69fb693dbe8bfaff34d1e507cb
SHA1c2f421f1616f8c62a5815825fe01b4579bf52540
SHA256d1cff24377b1f8d50c3efc567f84e098a3026a32167e4acfb32913dac895af67
SHA512efb01fcbac6d938ec7abbe42c8ab474ecc91ffe88b8c5064f2e7c1cbbb1415a835f29f3c6190ce966a99869085e12619ab791206818c858089a8882f862d1053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e23b14e5cb606d403f24b85237d5046
SHA180480bc42f22f01b331ccccf091c5ec262b644d0
SHA256e166ce82cc124198ca4bfb3ca613ceac3bf2ec203fd2c9356f5a224bf327b4da
SHA512e7d64f62ad372fd911bc9a032f1daaab85ec1013e3ada0257d8fbdc87c5215914993cbd027cb4caba9f6d23bca3910cde0d4a3e3a2bf382d375c52bde8796b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513576c7a4450f33207d66213e971636c
SHA15d5af4a2cb2c87ce1356d6d5b78cb3925c9d95ad
SHA256c0939d17a5c9e491843af6119e910965f3d644ebafbd44709ddeac29bb0b02f4
SHA512cc442255ad40709089a7db4d86b6f9eb4fa30191b46a5e796f8bf8513a08e9a6005f54f594836d0a39d63d7d477060a8f02104cee96c69ccf1af9586b1fd0fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcb684936bba3465a33e888449795e38
SHA1631ac2e748725558d86f25700a54da182b06fb5c
SHA256907526815fbe4627d3be21c8cdea8286f79995f1e662c7bba23d57b8ea7a4b73
SHA51271966cc40f07b8aab495a3f04b89377992718b39c37f7c6a2de080f957ac5ca71010d47266c2d56ab5301a6afa1bccb1a3247637fea793625dd1fc4b50093f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bf13960414936190d5967563e54d5b3
SHA1f750411ad7b1a469c91d177bb37a4b785eb64e51
SHA2569d6d028dcef115bf058547891e570bd44b6e0ca1997a3fd49fcea77410f3eb11
SHA512f582174180505c7af541476eb342e474eb37848b625b394f73e82fec08076c5980b2a523f05be2c2851a6536dafda880bc4014cf4ebfe4b8927a731680ba4d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf4a00bbae9f379b5396fc862cf74620
SHA181d339ff7329dda81f31a71a45f4efc5e56e26ba
SHA256c00d9e56de95294af7e241e65f4216e53ced780c524b787d70e64a7ae0593854
SHA5124e61cf83abd3d4d071b869084af832686ccaf84f533da090149293601a7a431fff69786b1f7697f3a3fd74bed095f23ffc77637303b5128fbc945875463077ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534b80fe8c220a6cec87c2df104455a91
SHA139e0a5c9f7a415cc5cb7ef3ae06f77d1dfcdcdde
SHA2563f7a6b136b6857dceb7ea9422f6e01c6ad404773f6f8ea2fc7e71a0be7ff9ca0
SHA5120c13b39072a3b141c74bdadce97249aea4c057123675364bb3d64825fbc2709596c02d6964cf010d3d6d24f5d67548b91d60968fc17abee8d9af260b67c6e0c4
-
Filesize
92B
MD539a8b8d0f3053380197785d28a884351
SHA1d126c93976c1eb1087a3a71fb744df2e58d088ce
SHA2567025f6773a217a2a52533b4e850907f4ec9ed43d8a5dba54f8a8c33847586599
SHA512e7655a0611ffb09f9c233f06fa1e255c884f252be8ee2f49f94c2d362dec1e70be31656b84cac9be2e77db248259c6ea7bb2d3551afdc24df23c9128523b9843
-
Filesize
103B
MD52f3721077a76a82df464e6d7a22d1849
SHA1ca928ab7f4991499ffca5cc7a9f073b3e5a98cad
SHA25656118a1700b44aea6dcc40d73c43c6acd08d4f112d0bda92e2f9da3a6396ba88
SHA5129630a9f28d5e92cd8c75c2def77cfbe0e20fcec882c55001a07fe9fe49dd3a519f08d45ff8487bb3950d745465607dac7272d55f58f8c1982ef57a65889adf9d
-
Filesize
5KB
MD55b103281af7a7397e53d6b9a12d02f24
SHA17c32a15f29bdb8f5f28e0bd5d84594d53af7b5f5
SHA256face941139533d364040a20a078573dd613d4be8ef802210d1961dec98f2533b
SHA512e124ee1d02234b91fca4f7c6525416931e992013dbb73981d49697a85e75066a05cee8a96d02cb1ec40a06317c6310123cd57a90fc211cf0ec15cf64fe8409bc
-
Filesize
1KB
MD56a00b8a19485d782bf7fe123b8898aff
SHA1901d22f5a95ceffb266f555abb080007c5c69d59
SHA25673ab5855de20e32d0aa5925d10a0f20d3301b10cd3297a4cc89b87fd6e3538c2
SHA5128da4cb26100044b3f711c34c741e457fcd9aec9196cffb22e3494a48046a044067d2f6ff0f0740cc56879436cbd557e90253aefe30fda59ed47292ef0a055e99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E324WJ9A\f[1].txt
Filesize29KB
MD57bc13e084e4b651981936b63e5262df3
SHA1f06efe403f59d8ff15a771596fa7e4121b2e1421
SHA256425c887bd8caee3ae355f251cb53649dd492f884523e1609ce4437ef70edc727
SHA5124f9363e3fd5c651aca56a72ee5935b2421e9711db56c3505df6570efde6ff092cce7e7dde6fb40d27bbe43bc9f3ae6fe48e0efdfc6f3bf3b97776250d5b4109d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E324WJ9A\f[2].txt
Filesize53KB
MD57528067fcf996e8d6cac25c95051baaa
SHA192267f58a3ab0959a5e3954c9c9c8b839218584f
SHA25660fed3181b6988afdf2820001db18b9ebde443b9899fc4e89c6ae5c6bf6bdd33
SHA512b89d7f77c4e16ecebe6c03c06faa6cc08232c2d462287a846e281e599c9ce6e357b324971387124f934d6526c47b466f4f739f962da637dac8b5a0e2987c860c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGM5U0T3\favicon[1].ico
Filesize1KB
MD5972196f80fc453debb271c6bfdf1d1be
SHA101965ba3f3c61a9a23d261bc69f7ef5abe0b2dc3
SHA256769684bc8078079c7c13898e1cccce6bc8ddec801bafde8a6aec2331c532f778
SHA512cb74de07067d43477bd62ab7875e83da00fad5ac1f9f08b8b30f5ebb14b1da720e0af5867b6e4ab2a02acd93f4134e26d9f1a56c896da071fc23a4241dc767f1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGM5U0T3\ufs_web_display[1].js
Filesize203KB
MD5687f36959d3133324c89c89fa708b3da
SHA1d95eecef21ac59ff2d9359d452394ebfdbcd8181
SHA256566012676f5d43acfea4dc0bc5d9bb2c0805d8775fcdd081b1c895310956829a
SHA512cd732600d7f757fd7d031c035db9445b2564936a79c1d8ad7b481fc295989c7d2c10bfc0c0cec53656c99ce5479a76d5f231ddf2322c9ae2496611fc287b4f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SP6DRJYJ\f[1].txt
Filesize31KB
MD5e0a8b8097300144ccee5948026827cf3
SHA15a693ff5850843af1797cfc8781322934e812051
SHA256565592ede82822decb298ebd1e6f56e9c6a680b1a79cd4208513a834295e4c43
SHA512e19564212d6454eccdcb772b9dd4ed6261e2f9a010da30dcc55098eabb4b30e9ef458e92af84b73f67bb68675d62dde616e63e48f589fd5f8b0837d9445f20c7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SP6DRJYJ\f[2].txt
Filesize2KB
MD543df87d5c0a3c601607609202103773a
SHA18273930ea19d679255e8f82a8c136f7d70b4aef2
SHA25688a577b7767cbe34315ff67366be5530949df573931dd9c762c2c2e0434c5b8a
SHA5122162ab9334deebd5579ae218e2a454dd7a3eef165ecdacc7c671e5aae51876f449de4ac290563ecc046657167671d4a9973c50d51f7faefc93499b8515992137
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SP6DRJYJ\sGrT9ysWSs9_t34896WOusE8LdS7rNyFrC7hJy7peMg[1].js
Filesize52KB
MD5d48d74adfc515a71970fdd0ebbdbf6c4
SHA1fa16d2837d440b0d29b8311ef819b2a4d324656b
SHA256b06ad3f72b164acf7fb77e3cf7a58ebac13c2dd4bbacdc85ac2ee1272ee978c8
SHA51260f9683fb6d79a52713b301f853bffda4dd72944b4699eaa388be5a9d1cec929b2a21b584d9f11fc33d236438088cc5468ef1555c9e4b7dd816bdcc5c34022ce
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
2.8MB
MD5d878cc1292f398a1ddb81cb3c33deec4
SHA1006d7989fa4fafec6f600f97c2568f9abd778f7d
SHA25604f0249051e5df983cabcd4d42452cd34c89a75bfd55d1badd690d030c10f6ed
SHA5127c1ad56f6b7506592a0f18ab6b80cccfb12b7d75db12c2ee88e89afecce734ca3e947e9a349f34dd3db323ed07a97e7df5af1122028127a9bf7bcec15fcbf90a
-
Filesize
698KB
MD51fee4db19d9f5af7834ec556311e69dd
SHA1ff779b9a3515b5a85ab27198939c58c0ad08da70
SHA2563d550c908d5a8de143c5cd5f4fe431528cd5fa20b77f4605a9b8ca063e83fc36
SHA512306652c0c4739fce284e9740397e4c8924cd31b6e294c18dd42536d6e00ad8d4c93d9642fe2408f54273d046f04f154f25948936930dd9c81255f3726f31ee65
-
Filesize
688KB
MD5c765336f0dcf4efdcc2101eed67cd30c
SHA1fa0279f59738c5aa3b6b20106e109ccd77f895a7
SHA256c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28
SHA51206a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3