Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 12:45
Static task
static1
Behavioral task
behavioral1
Sample
1f808d56ccf6c1949976538e5c82d63a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f808d56ccf6c1949976538e5c82d63a.exe
Resource
win10v2004-20231215-en
General
-
Target
1f808d56ccf6c1949976538e5c82d63a.exe
-
Size
3.3MB
-
MD5
1f808d56ccf6c1949976538e5c82d63a
-
SHA1
02fad1084819163cf92b868a092ec87d0f9e89d9
-
SHA256
2363558dbf5e5853711b9c8de05f3f4e982279876d1245a753227b4727ac68ef
-
SHA512
6f137b17250cbf85ed1675436ea159ed1fb3df3691537926b3e063a977d07f0313b89095fde9d4cdc0982737457f79ab42293ab94b36ca6d03ac35dec4da24f0
-
SSDEEP
98304:o5aFEvk5ZAlmO5Qxc/uBY/upDeRqAeaV8Fw:o5aFSk5ZAEc/uppOZeami
Malware Config
Extracted
Protocol: ftp- Host:
files.000webhost.com - Port:
21 - Username:
fdhfdcgfgg
Signatures
-
Executes dropped EXE 12 IoCs
pid Process 2896 7z.exe 2620 7z.exe 2648 7z.exe 2612 7z.exe 1032 7z.exe 2576 7z.exe 2820 7z.exe 2832 7z.exe 1964 miner.exe 1560 webcheck.exe 2216 webcheck.exe 2616 webcheck.exe -
Loads dropped DLL 16 IoCs
pid Process 2880 cmd.exe 2896 7z.exe 2880 cmd.exe 2620 7z.exe 2880 cmd.exe 2648 7z.exe 2880 cmd.exe 2612 7z.exe 2880 cmd.exe 1032 7z.exe 2880 cmd.exe 2576 7z.exe 2880 cmd.exe 2820 7z.exe 2880 cmd.exe 2832 7z.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0006000000016ccb-77.dat autoit_exe behavioral1/files/0x0006000000016ccb-75.dat autoit_exe behavioral1/files/0x0006000000016ccb-157.dat autoit_exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WinMgmts:\ webcheck.exe File opened for modification C:\Windows\SysWOW64\WinMgmts:\ webcheck.exe File opened for modification C:\Windows\SysWOW64\WinMgmts:\ webcheck.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 miner.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 miner.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 miner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 miner.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 miner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 miner.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\main\WinMgmts:\ miner.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1964 miner.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe 1560 webcheck.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeRestorePrivilege 2896 7z.exe Token: 35 2896 7z.exe Token: SeSecurityPrivilege 2896 7z.exe Token: SeSecurityPrivilege 2896 7z.exe Token: SeRestorePrivilege 2620 7z.exe Token: 35 2620 7z.exe Token: SeSecurityPrivilege 2620 7z.exe Token: SeSecurityPrivilege 2620 7z.exe Token: SeRestorePrivilege 2648 7z.exe Token: 35 2648 7z.exe Token: SeSecurityPrivilege 2648 7z.exe Token: SeSecurityPrivilege 2648 7z.exe Token: SeRestorePrivilege 2612 7z.exe Token: 35 2612 7z.exe Token: SeSecurityPrivilege 2612 7z.exe Token: SeSecurityPrivilege 2612 7z.exe Token: SeRestorePrivilege 1032 7z.exe Token: 35 1032 7z.exe Token: SeSecurityPrivilege 1032 7z.exe Token: SeSecurityPrivilege 1032 7z.exe Token: SeRestorePrivilege 2576 7z.exe Token: 35 2576 7z.exe Token: SeSecurityPrivilege 2576 7z.exe Token: SeSecurityPrivilege 2576 7z.exe Token: SeRestorePrivilege 2820 7z.exe Token: 35 2820 7z.exe Token: SeSecurityPrivilege 2820 7z.exe Token: SeSecurityPrivilege 2820 7z.exe Token: SeRestorePrivilege 2832 7z.exe Token: 35 2832 7z.exe Token: SeSecurityPrivilege 2832 7z.exe Token: SeSecurityPrivilege 2832 7z.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2880 1220 1f808d56ccf6c1949976538e5c82d63a.exe 28 PID 1220 wrote to memory of 2880 1220 1f808d56ccf6c1949976538e5c82d63a.exe 28 PID 1220 wrote to memory of 2880 1220 1f808d56ccf6c1949976538e5c82d63a.exe 28 PID 1220 wrote to memory of 2880 1220 1f808d56ccf6c1949976538e5c82d63a.exe 28 PID 2880 wrote to memory of 2720 2880 cmd.exe 30 PID 2880 wrote to memory of 2720 2880 cmd.exe 30 PID 2880 wrote to memory of 2720 2880 cmd.exe 30 PID 2880 wrote to memory of 2896 2880 cmd.exe 31 PID 2880 wrote to memory of 2896 2880 cmd.exe 31 PID 2880 wrote to memory of 2896 2880 cmd.exe 31 PID 2880 wrote to memory of 2620 2880 cmd.exe 32 PID 2880 wrote to memory of 2620 2880 cmd.exe 32 PID 2880 wrote to memory of 2620 2880 cmd.exe 32 PID 2880 wrote to memory of 2648 2880 cmd.exe 34 PID 2880 wrote to memory of 2648 2880 cmd.exe 34 PID 2880 wrote to memory of 2648 2880 cmd.exe 34 PID 2880 wrote to memory of 2612 2880 cmd.exe 33 PID 2880 wrote to memory of 2612 2880 cmd.exe 33 PID 2880 wrote to memory of 2612 2880 cmd.exe 33 PID 2880 wrote to memory of 1032 2880 cmd.exe 40 PID 2880 wrote to memory of 1032 2880 cmd.exe 40 PID 2880 wrote to memory of 1032 2880 cmd.exe 40 PID 2880 wrote to memory of 2576 2880 cmd.exe 39 PID 2880 wrote to memory of 2576 2880 cmd.exe 39 PID 2880 wrote to memory of 2576 2880 cmd.exe 39 PID 2880 wrote to memory of 2820 2880 cmd.exe 38 PID 2880 wrote to memory of 2820 2880 cmd.exe 38 PID 2880 wrote to memory of 2820 2880 cmd.exe 38 PID 2880 wrote to memory of 2832 2880 cmd.exe 35 PID 2880 wrote to memory of 2832 2880 cmd.exe 35 PID 2880 wrote to memory of 2832 2880 cmd.exe 35 PID 2880 wrote to memory of 1608 2880 cmd.exe 36 PID 2880 wrote to memory of 1608 2880 cmd.exe 36 PID 2880 wrote to memory of 1608 2880 cmd.exe 36 PID 2880 wrote to memory of 1964 2880 cmd.exe 37 PID 2880 wrote to memory of 1964 2880 cmd.exe 37 PID 2880 wrote to memory of 1964 2880 cmd.exe 37 PID 2880 wrote to memory of 1964 2880 cmd.exe 37 PID 1108 wrote to memory of 1560 1108 taskeng.exe 45 PID 1108 wrote to memory of 1560 1108 taskeng.exe 45 PID 1108 wrote to memory of 1560 1108 taskeng.exe 45 PID 1108 wrote to memory of 1560 1108 taskeng.exe 45 PID 1108 wrote to memory of 2216 1108 taskeng.exe 48 PID 1108 wrote to memory of 2216 1108 taskeng.exe 48 PID 1108 wrote to memory of 2216 1108 taskeng.exe 48 PID 1108 wrote to memory of 2216 1108 taskeng.exe 48 PID 1108 wrote to memory of 2616 1108 taskeng.exe 49 PID 1108 wrote to memory of 2616 1108 taskeng.exe 49 PID 1108 wrote to memory of 2616 1108 taskeng.exe 49 PID 1108 wrote to memory of 2616 1108 taskeng.exe 49 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1608 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f808d56ccf6c1949976538e5c82d63a.exe"C:\Users\Admin\AppData\Local\Temp\1f808d56ccf6c1949976538e5c82d63a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\system32\mode.commode 65,103⤵PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p___________23794pwd24951pwd4742___________ -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\system32\attrib.exeattrib +H "miner.exe"3⤵
- Views/modifies file attributes
PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\main\miner.exe"miner.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
- NTFS ADS
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {240B0521-70B9-48B8-A6C9-E7D2985AC35D} S-1-5-21-452311807-3713411997-1028535425-1000:OZEMQECW\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-i..tional-codepage-875_31bf3856ad364e35_6.1.7600.16385_none_2adebd12b4e159ed\webcheck.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-i..tional-codepage-875_31bf3856ad364e35_6.1.7600.16385_none_2adebd12b4e159ed\webcheck.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-i..tional-codepage-875_31bf3856ad364e35_6.1.7600.16385_none_2adebd12b4e159ed\webcheck.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-i..tional-codepage-875_31bf3856ad364e35_6.1.7600.16385_none_2adebd12b4e159ed\webcheck.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2216
-
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-i..tional-codepage-875_31bf3856ad364e35_6.1.7600.16385_none_2adebd12b4e159ed\webcheck.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-i..tional-codepage-875_31bf3856ad364e35_6.1.7600.16385_none_2adebd12b4e159ed\webcheck.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b5481c3b2cfe124696fe3ad3dac7b20
SHA10b2df0b19c5f3235d093cf1225827a749ab508a9
SHA2560c585e07737ac2348e708bffe0836d41403b28a1302267f48f660f381540131e
SHA5121a70d9567893b5570a3804505720beb3744dd0b5b02a67e4fbb9ab2b523d112ecdb55453a6f6e7d673d6a0a169f954afa5c76626028a73a08745fe3fea93e774
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
702KB
MD5696246dd815ceca4b963ef6fd0f7f470
SHA1b27d63dc36ba569662e918915a9091a14a5f1f18
SHA256c37fa5517314c8a8fd5e0520854021813e1043ff08d963d6515384d39d5f3adb
SHA512c89bfe6f7beb7f083c283c6103f05e239048ef6c9fbcb1f0085667ef806165668a3625df55d267f009448ac257934e8785bf9c969418046c0df51feed4d42c06
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
186KB
MD51bafe2794de943a3096a732979c0faf1
SHA10a9d798ebe62688a00982a4729593e2b92c9f1e0
SHA2563c4dc41b912fc3791463b7eabb5735f08e8b1a36b934efef0f46342ff624ffa3
SHA51274e4080ae47ec392c9c1a02b753eae0896f9eedf992bdc1c2b2fc2fe425a548961983fa8b29bdfb89200f638685f80a0313b154202234e94c0f8eb13f21d6c6b
-
Filesize
119KB
MD56af63cf19f34997f47ffb27274379809
SHA1deb07615ce0239c67b60f37c394999b7db689c4c
SHA256c665782f96df39e584456317959b9316b51f9e3a84f519e33ebb6ae1b24589a4
SHA512a2c728ebc2d3405c04d173b0bb68ef7c9373320b7b9c885946330dcb529f755e71a07596aff03f9f17bb83f610221b3133a4b411a1a65b93aaea3284ce4de4d1
-
Filesize
36KB
MD58dd5dc7c2f67f09d78e3ba2a4acf212d
SHA16f34aa95306bda96de09b3606120e4caeaf98ba7
SHA2560db503724ac5befe3b662fe0d67e9577ffbe1f814b5a22dcd7e04a6e1a173c37
SHA51276fc6e2b392b78189cea1b1b7fc84c59c85a2098f9fb4563b5bc4a9dc75374627492da7583f42d5abbea30cc9820d11c7f105d3f7357de263857641b1f5f78c6
-
Filesize
98KB
MD5ec277af6f3ebc6554520430cd0209d46
SHA14a572baa93cf68834e88d47b312d4f29349f7d5b
SHA2569f1993895361ee1695b7d358428750da5fec1f1babb44d938f89e70d46a26aa7
SHA512e4e8d9a424c5177f26c71cffe1a4e23623f339a62a9da5d0c171c4ea219190a077a67dbc982a31b7a02a8183d4c27e91197b2439700dd64ec7ea01213d6329b3
-
Filesize
236KB
MD578eade688696aa68426a69d2e051cd68
SHA1027d57255e2c25ce883ce1fc6298e2c4dd2431df
SHA2566487d57506e4e88bce1d7f9c45a91b4a533ee47b461b205237357d730686279c
SHA512f81f4272178f65f7abe51b55d89c6d3291a543a0e3deae59fdcfd2d279163c5e0cd8dd21cc2fdc659ed704ab8871b9a9891643a17f31f54e2d6fcbf7597e1f0d
-
Filesize
48KB
MD528796416ba3404c70ef5f2b3debfad51
SHA159d80d1eee1f4816909b4933f1d1d981b1e59e8c
SHA25691045d25bae386b46fd29ec2ac336c9d135478359ceaa1f09897fc66b696a0f3
SHA512c8ab32412e53312eb0394dfd2a3d848c650ba07c821f0726d7757c17469c8e612b61a947248754aa0ccb253c61aef249cd866b1035d8ad22f61a8b1fed03db18
-
Filesize
20KB
MD5ac21a64b48af70775a68fe3adde0d3c9
SHA1461e94bbcd43116598263dec12ea81a2b973736c
SHA256ddd4567d89dc8727447173129649ed90997b32fae634ca51e61af43ba0a13a5c
SHA51264d4f7e6bc098634403c685c5e7f5c835e3e0dc04973b9968eda114f07ca184a6130736b1cc7c256de809cd1d65494459b9f9f6d8868eabb37cd1522c3cf9f56
-
Filesize
181KB
MD5b349a025af41b42917541f569e61697e
SHA1dfa74147e61b3919459ca28e120deee6e9382903
SHA256bb7f175f6e3d2bb24db5f4abbe437bd64a3d8c646c3ad894c7654af03dd65324
SHA5121cbf96c553839459be8cee43fa8fa787f0eaa455cd2d0691e5565ea6d0cc8a9ad95087c0664f46ff757946106f74bcca674d26acd692405c83b852a4e4335ca8
-
Filesize
435KB
MD503a507de43eb941ab3b648e23cb58098
SHA15c452baaa236a46d4eaaa87586678b7410682904
SHA256c6a06ceb1228a699c518cff681aaab00b6c4d9742c2fc15b5d7ea56f5741f712
SHA512c902615c1e0964320e389e71bcac3f6ee4c665b2d84443d057de3f29ee589ce2bd2e8767f0f81135d50b45b5f419b883911d1a12684c962033a0ee867a948749
-
Filesize
263KB
MD53bdc1f672606e767abb28ad644b26177
SHA1a634557b232412123ea19a61dbf7013b25e79ebb
SHA25615ab9b548a39cc080caa508a866a69555b74d0cf6889c55a79fdb978aa018bd4
SHA512f2cd98d315518a50afc598b3d666cc67ebe68ca1f8d7c2937d39b9ca6ccca53b752a5f63d5d38f828fab12bc2270f094efc28626a4e95557513f098869326493
-
Filesize
372KB
MD523c3bae673a90fd971f86d710f93cdb6
SHA1fcebb01662df180e226fadbe9ca5d68148fdc206
SHA256dfe7ffa268da2de511a21b06886360f2de5c9322868ce0f687675ba16d3e099f
SHA51220dd1bd22ebc39ea41fbe9b68771c502d290f5eeb8f030b3023a03cb67e4ae7782e3e2acf0341f45e18f62d2fda33b926bbf1cea2c50115e81161d6712e75052
-
Filesize
527KB
MD5b385cbbc055a736cf0ad71b1a8406fa2
SHA1b8f4d0f96981e5dc98ee17a8bd413fde6be921c4
SHA2561b588b69f50a7b828b11a35a714074b7bc25d9d76ca127ce2a0f02e68e0e8878
SHA512bce8623d15e6bfed1d3e251388f44d2ee4742e2c0ac9d71d1e5d110bfcffcc4c552bf394ed65085a0bae8f965049853780d49e7952de78cc74386a4d9d112bac
-
Filesize
5KB
MD5f7f8f275ccfa8423c365d777c5f24821
SHA1f89e8d63daa9483251faf6c4e99c6fe66de9f41c
SHA256a064230b4cd6440282c567a4b279f0669f3bf5061e8505104c885f36db742ba5
SHA512e8dfcf80fc6c177c483f75004dac5c7c4591e7325c40d5b6753c091690be9251e8a28af5ec3f6b5a1aebb004ba8508692a0b303c99bc28eadf28e4fd312cc76e
-
Filesize
29KB
MD50f280fcf273e201997dd1b383bf24367
SHA198ed58edcf77e10a1e48ea8ca6cc534ca58308e9
SHA2564b5c163021c2acd6bc48d5f2ee63a88a5e6152bba0c5bd88c0c1cf2ffbbfb5c6
SHA512b31b92011d8701cb9fb6535a732b7a4116ed4ed92959ee8df3b0bc5c90237811d24ab66ddeada61a51ebeb1009887ef64bcff5cd6afbd4ae5d94718ba065dc69
-
Filesize
57KB
MD5566446737a674f33b39cd7ba9f7530ab
SHA18b34c0fe6b40781e2517e4d7be13d159765573ea
SHA256bb9f4cb83c009083e860b0e3e420bde667273477f8f66a79f94c82b0f12f5a35
SHA51207f43d22ad44bb72914b165f763db9aadb717ebea37169520f69e1006601a91173ac11196275970ffe7a64cad39f8f2a74a56dfdb789b7cf346f8dc2d07009a4
-
Filesize
138KB
MD5ce5f1a69106c24a45a722856b92a2c22
SHA19e7d259f90d0c51e30ff5e0bc866e4be478a3170
SHA2560d332ab8ac5840cd3bfb9e576945f91f052e9093954f2db78b204df92a9aed34
SHA51220774ff12db1135b54a496e4bd5b404b50f5f50fc31c0b871e7c252f59cf542bc1d0a01322d3aec0421ba8b08c19757fa8bc9e5a36ee955c0be2a6b26d21375e
-
Filesize
123KB
MD5e4163208e39679e2cb74dc14fdcb1a52
SHA146a4db7c42c53c9acf4c6058ce2e674464d86bd7
SHA256319b373c4745e0cd1bb740d460d3d0867a5d16176ef7dd86f21fc414dc6fd391
SHA512023304b58b2088b3332c6e62b4be162a1d4e478c643b87d4a80e9f0071f83825591d80228b65c1e3470e511c9f85da3cd6ea048b5f27cfe9b258bf3e6c8dd0bb
-
Filesize
1.8MB
MD551cdcde9d860d7f1afc1c4ffc2544f6f
SHA19fafc62083549f0eb51c4abf93d41479dceb764b
SHA256a0465a9521f20fa8b24016cfba76fed3d05ecbf9e097270836af5995b5c3094d
SHA512e9062226cf40e88fde3db57c46ce4fda07c1d8dc9475b3aa383f327988bed8480745a0187ccdb74d912526622e156ef99b4bf5d70e1a8385bebdd4bd51d76d6a
-
Filesize
474B
MD5a475346f88b21627ae1a374bfad9a5df
SHA1c44131fcf78c5d1a46db796b32f5b27e477a2b65
SHA25636454fd474b79cf94ab53b0f60949d4de37d0a98551ace3474ffb36a40bce9f6
SHA512b63d5448b130d2648f4e3f41beda02ad4a5695feeee07e657c82b40349cbc5a4801e1b1d031dc0638e2fb555d4135917dd587a1d0c8c731517502f516c5e75a8
-
Filesize
177KB
MD50a654c93ee0cfbb8cae7e4faaea63855
SHA17b1bc6e1857702d4b9c6ddb597e42c72362556c0
SHA2568503b27293cef0d79edb788e7d6ba9c993250bdf5d77f3f519ac583c88c5f4f8
SHA512eabe5edea990afc19b9b46deb5103e7391f4327f928f83b83d3becfdb2ab2cd6c4912849197a54fd07a3b5a2e640e71882b269093ec6bdaa2550e17a4289edcd
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-i..tional-codepage-875_31bf3856ad364e35_6.1.7600.16385_none_2adebd12b4e159ed\webcheck.exe
Filesize1.2MB
MD5abe36bf39d6167eb9c12fcdcf48ef508
SHA1496bd18fa6cd505a9e8f075e9a928ff0a2489c56
SHA256837f62877205239f1fe4da919c60d141c30812018451ace07767895cbf6437d0
SHA51245288821df6d8fd15195ddba6733262fa0c2918939ba55aa9b3a382883dcd0da7c30692c6c2cfc58be0305c25f36778a4b93bb113247e8a67b8afd4d7d7992a4
-
Filesize
341KB
MD50a0e64eb0cad89930c9210155b8ee138
SHA1d095fdc5de54d316b05a583cfbf0fc8b8a8538eb
SHA25681d1bdfc640e6627d011cdb4d818f366664a1de41d77c7d9c2fd21ef2d67c8ab
SHA5128312f1dba1cbd9eddcffe561905ba1b2446b14ff674b30c8ee420baf7752fd91bd78eb48e2155daab8b48f5733c26dd5a293b2800e15d34acac71517cd3f0498
-
Filesize
311KB
MD51a483d12773afc7914f73afb8609c9c2
SHA1322985565d1410162dccba7d2bdaf3f385711834
SHA256fe6793fe0457e3cab6f0a5dc111f53ecd1b1b51c0c9a8a2584dc953b59731101
SHA512eae3e1d50ea3e66ddc1cd189f00a6cf8dd505bc0c015ba9df82be98105dfee9deda6dd464dda6c1c44302d46a836d217d2ad106286cee9eb05e84ea3a4e36da5
-
Filesize
41KB
MD5cbabc1d47aa322205a9ac303f32e9bdf
SHA1250e1884fd36e20db32c2959b2dd169d4087c468
SHA256f26ada1896f5721888cd2cbbea47f994cdee0cc914ca77449bef4445204fe22b
SHA51222e94b8d07f77bedc0f5ccf412a339c1e29ecd5fcbcc587b2db98ca2685cda83d6ffc55a0045afb7cd4c1325299d60d95f2e2dec60d9475914c0026bf71f41f2
-
Filesize
45KB
MD565edac326e9545adee2502812d2c89bd
SHA16327f3cab470c4373d5fa7748d868d11b922feaa
SHA256b597cbf79ebd84b650a8da8e6893a20125489aa8a8689f5da52e9c7829cca071
SHA512c9838f570cc024d8371ec36f6f115daa60a915f2eb48072fa04d8cbbbe11b6cdd250256ba900b938821fa15d6417d69f6b9561f725104633b7371ac6a77f2a03
-
Filesize
30KB
MD5db4eeedf506b2e80a3411d308e38c582
SHA1d2e8e376b445df6e4f8c85680942f9c36f5248c8
SHA2563fd5c589196cf845221713c5127854592d1bd97649a7cfa0961fa89d9587ae5e
SHA5123c58bc5a440b4000ca37d6197c28252030cf1719968f949125e4bbba119a8ba0250843c67faae9df2cafbe4c0c4cc76ae29592e65d90e546545c9b02579db3c3
-
Filesize
1KB
MD5b114a241f4d7700d4a3501068f3d0a63
SHA131201f3f110036f78478915213ca5480985f0015
SHA256bae727658f6f6b6b3c2f20538f38d1ce0b0fc0cfc2b2a80ee7e263be711be48a
SHA512839106976ad6e8fe7aea0f7eb18d19e47ada49bdae3ba6331b2cb5a7afede9e8d0ebb4d29d3553777924ab4592d5b1a91554ffa90285810cb85ab0ca0b2213f5
-
Filesize
192KB
MD5f915099e7119de5adc61f2b340453e10
SHA147a7f0dd176efecc87154c62a2ba4684588976ff
SHA2560a1d9b9b71460d584cc116aeedb4e925fcf0ffebc0947858b573b200898abff6
SHA512fb84e5f34a1510ad654cd86a1312e4c212af7d5415473dab36ce98510d7c7ad8820e471cfdcb18895f516738eb81766f0ebd368d3a94783a4b7738d31458ac87
-
Filesize
415KB
MD531b667d97fa7ba7e9c6acfb85389847a
SHA191feb58e9148abc14839b405beb68386b0fb6635
SHA256d6ba98bad08a0ff8d6644ab48d380afb4fe681f712b8ef8a7282b350a61fa201
SHA512eeccf967970689884278d839892353e850e472563a8107ba879b65ed350c0f50ee7fe3ac385031f55a90f1331f9929ed1e0a04b02044d19a011b9b64a4473536
-
Filesize
239KB
MD59ad048f2b199f8a97eed1885bdca3cd5
SHA14d3a38ba8f5d981ae0f2e4e2ad17eb8f74f9b429
SHA256c1a99506787c1665ba419cb3708bfcfe83ad24ec3fca19848e720f03f0811db2
SHA512644fe91ee791dad1112e6cc5f042d5928d60746854173c34005ce6a3367f1ab59ccea43ddf7461e09b37d70652f3c6ffc5f5436aa222384f560abbf57dbf64b8
-
Filesize
142KB
MD5d4f01558065e1caca413965a33359138
SHA129760f80c659414c98a2820d3d3b0f00acc7b7c8
SHA256bb248d2209cdc11a7ed40cce49d9ba6cd3cf982c3bc03d544792b3db32b03b23
SHA512f7c6ac2100ffcd935603a4e215920ff52bb417fa16b84c0912d17e78bf117e8f270d13b9fa46f3078013c7b05a462389574b82f236d1d581a0d8eff1aac0d565
-
Filesize
372KB
MD5e6d1d1c7cf365280f02146c1b03342ce
SHA12302179a2526fe679d6cde1675c2990e2230d768
SHA256124dcfe5b61d89fb1aa922d6d852f0ac78a3b35c36acc0c303d4a8e232123611
SHA512f4774a1a0fcd249926d8c119854aef6bd8774467339cdce156f6d132817e38dc672b4a9736d1232a9ba3a6262474368d2a8b32baf31d2770d8a85d72b2c23fbf
-
Filesize
306KB
MD5582362c787834ea70e6dcbf5fa167081
SHA14ac34215d5d67929f5aa6d9f6d724e209219dd6b
SHA256522c61999ed38baea57447e906629d3f6efd0702328e9a26faf3b1276f242ddb
SHA512868fe9d5cdec7c5a8dfd25b1d4a593830d7f502d16d1e61f01bd27eac128071f267bf2b006066d5fc8376d9640cb9098fb33b9fe58a98d832778a4dd233fa5f4
-
Filesize
201KB
MD52124e3f56575744110032be104ea6065
SHA1fc909ebf2d0526262424cf66b2a9d9e2d3590153
SHA25643b5e87e7787e5ca7c84d73c1dee8dcccafc5e49ab63e4f86bc6217d18a94c62
SHA51201115e68af905512f0b3520f09fe8d693509d1883869d03cf63b01223ca05fb39895b3560f5d9d0414476198a37680fcd5aa6054f98da92ebee60a455d722c02
-
Filesize
93KB
MD5e4d7d7e2eed0f7a13a0d1945c137f549
SHA14dcdf8cd84347de40a985fed21f2a162dfbc17cb
SHA256ce2440d3ed81e76bbee9bcc4f9c9fe3b3c7158e872b5ffcf4f80b331721c540c
SHA5129cd4ab7d6962fc34cf5d4ea06df0079d7065f9a9fac088faebe984e5215026daea25c0cf672ce6ff99da8d384299dc5adeb808254730e538ed41d6b7e7dbd6dc