Analysis
-
max time kernel
155s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
c7857963c582a980b1b7ffb466a2206f.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c7857963c582a980b1b7ffb466a2206f.exe
Resource
win10v2004-20240226-en
General
-
Target
c7857963c582a980b1b7ffb466a2206f.exe
-
Size
2.3MB
-
MD5
c7857963c582a980b1b7ffb466a2206f
-
SHA1
14050cc8fec11bc116b73c50e846bf47b16f6d50
-
SHA256
93ef2fa78c0c9147ffdea7b50546c0a8a18e90444229132e1c0b32c06d4ec87d
-
SHA512
599311ae889280c08d5044299ae474fededd8f226466338f2f98eb5b3aaab619d4f32cd4bb1cf2607d51d7718af76f6ebdcf0d572f5f74519609e8e3eae24613
-
SSDEEP
49152:7uuE7AnqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFWd:NE7AqrlyutLxC3sEwwMd
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation c7857963c582a980b1b7ffb466a2206f.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation SogouSoftware.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ExternalApp.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation MiniTPFw.exe -
Executes dropped EXE 9 IoCs
pid Process 4704 minidownload.exe 2716 SogouSoftware.exe 3276 ExternalApp.exe 2068 SogouSoftware.exe 980 MiniTPFw.exe 1364 UpdateService.exe 1304 UpdateService.exe 2328 ThunderFW.exe 4196 MiniThunderPlatform.exe -
Loads dropped DLL 26 IoCs
pid Process 2716 SogouSoftware.exe 3276 ExternalApp.exe 3276 ExternalApp.exe 3276 ExternalApp.exe 3276 ExternalApp.exe 3276 ExternalApp.exe 4272 regsvr32.exe 4228 regsvr32.exe 1444 regsvr32.exe 2068 SogouSoftware.exe 2068 SogouSoftware.exe 2068 SogouSoftware.exe 2068 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 4196 MiniThunderPlatform.exe 4196 MiniThunderPlatform.exe 4196 MiniThunderPlatform.exe 4196 MiniThunderPlatform.exe 4196 MiniThunderPlatform.exe 4196 MiniThunderPlatform.exe 4196 MiniThunderPlatform.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32\ = "C:\\Program Files (x86)\\SogouSoftware\\3.2.2.58\\npdownload64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SogouSoftwareAutoRun = "C:\\Program Files (x86)\\SogouSoftware\\SogouSoftware.exe /AutoRun" ExternalApp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 SogouSoftware.exe File opened for modification \??\PhysicalDrive0 ExternalApp.exe File opened for modification \??\PhysicalDrive0 SogouSoftware.exe File opened for modification \??\PhysicalDrive0 MiniThunderPlatform.exe File opened for modification \??\PhysicalDrive0 c7857963c582a980b1b7ffb466a2206f.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini regsvr32.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol regsvr32.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI regsvr32.exe File opened for modification C:\Windows\System32\GroupPolicy regsvr32.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\ApkTool\extheme\ApkTool\.svn\text-base\phone_unconnected.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\9+.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\text-base\magnifier_search.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\.svn\text-base\tooltips_dlg.xml.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\9.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\report_bug.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\prop-base\backward_hover.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\text-base\recommend_nor.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\ApkTool\extheme\ApkTool\.svn\prop-base\guide_smt.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\npdownload64.dll ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\tmp\ExternalApp.exe SogouSoftware.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\.svn\text-base\upgrade_beta_list_item.xml.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\left_btn_mask.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\update_info.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\text-base\scroll_thu.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\text-base\Ñ¡ÖÐ̬.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\ApkTool\extheme\ApkTool\ins_banner.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\driver_uninstall_list_item.xml ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\.svn\text-base\web_external_browser_dlg.xml.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\prop-base\pcinfo.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\ApkTool\extheme\ApkTool\item_icon2.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\close_search.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\prop-base\update_hand.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\driver\.svn\text-base\WirelessNet4848.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\ApkTool\DrvInst64\.svn\text-base\DIFxAPI.dll.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\ApkTool\extheme\ApkTool\.svn\prop-base\closebtn.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\prop-base\8.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\CommonState.dll ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\id.dat ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\text-base\driver_fresh_progress_fore.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\update\USBDT.dll ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\ApkTool\SogouApkTool.exe ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\ApkTool\extheme\ApkTool\phone_normal.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\.svn\text-base\update_list_dlg_2item.xml.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\setting_act.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\prop-base\recommend_hov.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\text-base\btn3state_softupdate_small.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\text-base\refresh_nor2.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\driver\SMB4848.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\ApkTool\extheme\ApkTool\item_icon_4.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\update_dlg_list_item.xml ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\prop-base\search_bar_act_focus.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\driver\.svn\format ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\ApkTool\extheme\ApkTool\.svn\prop-base\ins_progress_bg.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\ApkTool\extheme\ApkTool\.svn\text-base\progress_fore.gif.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\ApkTool\extheme\ApkTool\.svn\prop-base\confirm_bk.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\.svn\format ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\.svn\prop-base\msvcp71.dll.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\.svn\text-base\MiniThunderPlatform.exe.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\download\download\.svn\text-base\msvcr71.dll.svn-base minidownload.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\prop-base\left_btn_mask.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\dlgClose_dwn.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\text-base\pc_to_andorid.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\driver\Monitor4848.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\ApkTool\extheme\.svn\format ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\drvget.dll ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\drv64\drv64.exe ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\7.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\text-base\scroll_bk.png.svn-base ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\ScrollBar\scroll.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\driver\Unknown4848.png ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\IEHint64.dll ExternalApp.exe File created C:\Program Files (x86)\SogouSoftware\crash\.svn\prop-base\ExceptionReport.exe.svn-base minidownload.exe File created C:\Program Files (x86)\SogouSoftware\3.2.2.58\skin\PNG\.svn\prop-base\radio.png.svn-base ExternalApp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 12 IoCs
resource yara_rule behavioral2/files/0x0007000000023251-4.dat nsis_installer_1 behavioral2/files/0x0007000000023251-4.dat nsis_installer_2 behavioral2/files/0x0007000000023251-9.dat nsis_installer_1 behavioral2/files/0x0007000000023251-9.dat nsis_installer_2 behavioral2/files/0x0007000000023251-10.dat nsis_installer_1 behavioral2/files/0x0007000000023251-10.dat nsis_installer_2 behavioral2/files/0x00070000000232ad-85.dat nsis_installer_1 behavioral2/files/0x00070000000232ad-85.dat nsis_installer_2 behavioral2/files/0x00070000000232ad-93.dat nsis_installer_1 behavioral2/files/0x00070000000232ad-93.dat nsis_installer_2 behavioral2/files/0x00070000000232ad-94.dat nsis_installer_1 behavioral2/files/0x00070000000232ad-94.dat nsis_installer_2 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D4D786E8-0535-41DB-91F8-B18ABBCCDE6C}\Policy = "3" ExternalApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D4D786E8-0535-41DB-91F8-B18ABBCCDE6C} ExternalApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D4D786E8-0535-41DB-91F8-B18ABBCCDE6C}\AppName ExternalApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D4D786E8-0535-41DB-91F8-B18ABBCCDE6C}\AppPath ExternalApp.exe -
Modifies data under HKEY_USERS 37 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore regsvr32.exe Key created \REGISTRY\USER\S-1-5-19 regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244} regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore regsvr32.exe Key created \REGISTRY\USER\S-1-5-20 regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\.DEFAULT regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244} regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244} regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ExternalApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SogouSoftware\Shell\Open\command\ = "\"C:\\Program Files (x86)\\SogouSoftware\\SogouSoftware.exe\" \"%1\"" ExternalApp.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\TypeLib\ = "{13D91BAE-B37C-41C3-AE86-463E53990546}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D91BAE-B37C-41C3-AE86-463E53990546}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\SogouSoftware\\3.2.2.58" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0}\ = "IDownLoadBHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0}\TypeLib regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\SOFTWARE regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SogouSoftware\URL Protocol ExternalApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D91BAE-B37C-41C3-AE86-463E53990546}\1.0\ = "SogouDownLoadLib" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SogouSoftware\Shell ExternalApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4D786E8-0535-41DB-91F8-B18ABBCCDE6C}\LocalServer32 ExternalApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D91BAE-B37C-41C3-AE86-463E53990546}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D91BAE-B37C-41C3-AE86-463E53990546}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\SOFTWARE\Microsoft regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\SOFTWARE\Microsoft\Windows regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SogouSoftware\DefaultIcon ExternalApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SogouSoftware\Shell\Open ExternalApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D91BAE-B37C-41C3-AE86-463E53990546}\1.0\0\win32\ = "C:\\Program Files (x86)\\SogouSoftware\\3.2.2.58\\npdownload.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0}\ = "IDownLoadBHO" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SogouSoftware ExternalApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\TypeLib\ = "{13D91BAE-B37C-41C3-AE86-463E53990546}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\TypeLib\ = "{13D91BAE-B37C-41C3-AE86-463E53990546}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32\ = "C:\\Program Files (x86)\\SogouSoftware\\3.2.2.58\\npdownload64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4D786E8-0535-41DB-91F8-B18ABBCCDE6C}\LocalServer32\ = "C:\\Program Files (x86)\\SogouSoftware\\SogouSoftware.exe" ExternalApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\ = "DownLoadBHO Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D89601E-1736-40FB-A3A5-84A376F286D0}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\InprocServer32\ = "C:\\Program Files (x86)\\SogouSoftware\\3.2.2.58\\npdownload.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64608416-BAFE-43A2-91C4-324C6CA4EF52} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\ = "DownLoadBHO Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1871D0A-4929-4A3C-AAE5-684235E62244}\TypeLib\ = "{13D91BAE-B37C-41C3-AE86-463E53990546}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D91BAE-B37C-41C3-AE86-463E53990546}\1.0\0\win32\ = "C:\\Program Files (x86)\\SogouSoftware\\3.2.2.58\\npdownload64.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{D1871D0A-4929-4A3C-AAE5-684235E62244}\iexplore\AllowedDomains\* regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1304 UpdateService.exe 1304 UpdateService.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2716 SogouSoftware.exe 2716 SogouSoftware.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2716 SogouSoftware.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2068 SogouSoftware.exe 2068 SogouSoftware.exe 2716 SogouSoftware.exe 2716 SogouSoftware.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 3476 wrote to memory of 4704 3476 c7857963c582a980b1b7ffb466a2206f.exe 100 PID 3476 wrote to memory of 4704 3476 c7857963c582a980b1b7ffb466a2206f.exe 100 PID 3476 wrote to memory of 4704 3476 c7857963c582a980b1b7ffb466a2206f.exe 100 PID 3476 wrote to memory of 2716 3476 c7857963c582a980b1b7ffb466a2206f.exe 104 PID 3476 wrote to memory of 2716 3476 c7857963c582a980b1b7ffb466a2206f.exe 104 PID 3476 wrote to memory of 2716 3476 c7857963c582a980b1b7ffb466a2206f.exe 104 PID 2716 wrote to memory of 3276 2716 SogouSoftware.exe 113 PID 2716 wrote to memory of 3276 2716 SogouSoftware.exe 113 PID 2716 wrote to memory of 3276 2716 SogouSoftware.exe 113 PID 3276 wrote to memory of 4272 3276 ExternalApp.exe 114 PID 3276 wrote to memory of 4272 3276 ExternalApp.exe 114 PID 3276 wrote to memory of 4272 3276 ExternalApp.exe 114 PID 3276 wrote to memory of 4228 3276 ExternalApp.exe 115 PID 3276 wrote to memory of 4228 3276 ExternalApp.exe 115 PID 3276 wrote to memory of 4228 3276 ExternalApp.exe 115 PID 4228 wrote to memory of 1444 4228 regsvr32.exe 116 PID 4228 wrote to memory of 1444 4228 regsvr32.exe 116 PID 3276 wrote to memory of 2068 3276 ExternalApp.exe 119 PID 3276 wrote to memory of 2068 3276 ExternalApp.exe 119 PID 3276 wrote to memory of 2068 3276 ExternalApp.exe 119 PID 3276 wrote to memory of 980 3276 ExternalApp.exe 120 PID 3276 wrote to memory of 980 3276 ExternalApp.exe 120 PID 3276 wrote to memory of 980 3276 ExternalApp.exe 120 PID 3276 wrote to memory of 1364 3276 ExternalApp.exe 122 PID 3276 wrote to memory of 1364 3276 ExternalApp.exe 122 PID 3276 wrote to memory of 1364 3276 ExternalApp.exe 122 PID 980 wrote to memory of 2328 980 MiniTPFw.exe 124 PID 980 wrote to memory of 2328 980 MiniTPFw.exe 124 PID 980 wrote to memory of 2328 980 MiniTPFw.exe 124 PID 2716 wrote to memory of 4196 2716 SogouSoftware.exe 127 PID 2716 wrote to memory of 4196 2716 SogouSoftware.exe 127 PID 2716 wrote to memory of 4196 2716 SogouSoftware.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7857963c582a980b1b7ffb466a2206f.exe"C:\Users\Admin\AppData\Local\Temp\c7857963c582a980b1b7ffb466a2206f.exe"1⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\minidownload.exe"C:\Users\Admin\AppData\Local\Temp\minidownload.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4704
-
-
C:\Program Files (x86)\SogouSoftware\SogouSoftware.exe"C:\Program Files (x86)\SogouSoftware\SogouSoftware.exe" /Loader /DownLoad?status=true&softurl=http%3A%2F%2Fxiazai.sogou.com%2Fcomm%2Fredir%3Fsoftdown%3D1%26u%3D5M778mNuk-Kw66tJOWcnxVIyq7ipK9-4p20UapZ8toovVxTGleG-1nyYfaHrXRFTIPp4pUfCo4c5CO_d3gMycDFnNnRqkyTflpTSOWHHbhZrasjlu972Ww..%26pcid%3D5835010671494799860%26filename%3Dvs_enterprise.exe&iconurl=http%3A%2F%2Fdl.app.sogou.com%2Fpc_logo%2Fvs_enterprise_00001.png&softname=Visual+Studio+Enterprise&softsize=2.91MB2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\SogouSoftware\tmp\ExternalApp.exe"C:\Program Files (x86)\SogouSoftware\tmp\ExternalApp.exe" /Update3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SogouSoftware\3.2.2.58\npdownload.dll"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:4272
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\SogouSoftware\3.2.2.58\npdownload64.dll"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\SogouSoftware\3.2.2.58\npdownload64.dll"5⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies data under HKEY_USERS
- Modifies registry class
PID:1444
-
-
-
C:\Program Files (x86)\SogouSoftware\SogouSoftware.exe"C:\Program Files (x86)\SogouSoftware\SogouSoftware.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:2068
-
-
C:\Program Files (x86)\SogouSoftware\download\download\MiniTPFw.exe"C:\Program Files (x86)\SogouSoftware\download\download\MiniTPFw.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Program Files (x86)\SogouSoftware\download\download\ThunderFW.exe"C:\Program Files (x86)\SogouSoftware\download\download\ThunderFW.exe" MiniThunderPlatform2024-03-1403:05:54 "C:\Program Files (x86)\SogouSoftware\download\download\MiniThunderPlatform.exe"5⤵
- Executes dropped EXE
PID:2328
-
-
-
C:\Program Files (x86)\SogouSoftware\update\UpdateService.exe"C:\Program Files (x86)\SogouSoftware\update\UpdateService.exe" /Install4⤵
- Executes dropped EXE
PID:1364
-
-
-
C:\Program Files (x86)\SogouSoftware\download\download\MiniThunderPlatform.exe"C:\Program Files (x86)\SogouSoftware\download\download\MiniThunderPlatform.exe" -StartTP3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:4196
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3972 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:112
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:772
-
C:\Program Files (x86)\SogouSoftware\update\UpdateService.exe"C:\Program Files (x86)\SogouSoftware\update\UpdateService.exe" /Service1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD56e888d41691f655ab9ec752384e009eb
SHA16c54689dc6fe3070e2d24011a9f8e710f5444d66
SHA256a5adc7b2757172c55834a3720731c0b3eb22ddd1766cc531c06de537bcef786d
SHA5125995cb6a7bc4573d5593904fb518bef91401b4f44fef808ed915017a0b7f0589bb5b810fc183b196ea57de32ec4a0e63b54ce89dde3283e41ff706c6999c4977
-
Filesize
827KB
MD528ba86c039552346dafff7e9363ce02e
SHA10c7848c17f84f7fae9f058ae49658dba4371975c
SHA25649837458d579b16b25f81d0d477922c0d363867e120e0114577c2eb0506639a9
SHA51260fa470134c5a9dfeacf2ebf615d656fd84d80f00ce0c3ff6d617e73f7942b5d48501b1073cd76fa717a0323d69b246170af5f8232ae7d4af3bc45b0325e7283
-
Filesize
128KB
MD5d62b45d4e6992f61cbeb751439ede7f2
SHA1aa7baf1cb5a3a06a00eaddedc9bd978f1091747e
SHA256470a6933ba657221deff2347e4f92dc0c6efdbda1303894c08372b9c95c78410
SHA5121340fe4984ff4e55bfd28dafaec6d3b7bf8d368788a8d84e4f8257bf7e94eade7489268d61f88be8977d7eb3eeb6fa8a990d81052af3613f5cb0e5c1cd4004f6
-
Filesize
1.2MB
MD5fb7a98797d8601196a79545775864de7
SHA10148ce7895eab4725b95a57e0fd3469a21de579f
SHA256ffd9ab6a997659efee084a1493784c2755010a04f5a2ab03cd0ea74c637b3e96
SHA5123afbef824abb40ccf128bdfa52cb7357b7340fe9a65139b6a2f42a17425548a96a7c95c3154728517aa784d8b00c0a5834a4af95f04bdc590eb8cfab9c24f75a
-
Filesize
448KB
MD54e929c23b302f10b9ec17eea980ddcc9
SHA12ccbf2d27249a3fd7cebfb9e28d222afbe0837e5
SHA256b071ce19e79bea65dcaf9642560d209148731c5f19804f340a5a95d1862a17fa
SHA512896c64ae4fbc4c8a6e4b7aa205e87319d17002b5237444476d293bd4a329393404a75d1483a15b5ce11645bdc66390789216266d780853119514f7c385df9ba4
-
Filesize
272KB
MD5c97af614b96b1d7adeed67261b3771c0
SHA1f67f94dff7a78953d4a9a6af63d30fc7dfe40a8e
SHA25698f283754465cae416af646c9c68e4c1a60eea088616bb5a265cfdd9c896b1b8
SHA512972cee7e0fe258ec1d62cbe7b077380010a5ab4a02c24791d23e10047f5d2a16e847b2a33bde9f7b27e6a59483f61371d98186281ef40a3a370629f546f6d322
-
Filesize
315KB
MD5b256f88501223e358c03ea2a172e0f7f
SHA19ee8c5b3db6d7076742c488b001a76741fc3aefe
SHA2562fc446c8fdb3ad5711e6e83c720379062accd40cf9203c6e484eea83faecb840
SHA51210f9d2bcf55d2241cb92dea7b1f7833f7d2536e93c7906d3c483df25f8515f24bd3fa57659f8972b888cf57457ae5bd5a9f564e9326278ddc66ed7201e52d19e
-
Filesize
23KB
MD5f5f5698ee6b73535a7a55ffc9df6f38f
SHA176b4f170b339481149f72a7294218ad7ea5f9ecd
SHA256613125461abb68bf1535c2b28d3cbf1efc3fe04484acdb89c0e961296837f1ec
SHA5125c83a38a0a0639bada0666592bcd73754e3f161b52ffcb14f066ce11ddac2f818de39ac5a36ebe3d026c202d087fcd1284d6fd5b65d38a112c6c1647274a3bc1
-
Filesize
2B
MD5c30f7472766d25af1dc80b3ffc9a58c7
SHA1136571b41aa14adc10c5f3c987d43c02c8f5d498
SHA256aa67a169b0bba217aa0aa88a65346920c84c42447c36ba5f7ea65f422c1fe5d8
SHA5120354672b288ac5ccd92c7336f24c3b5a9e669d95bf3036241d3919bae5aadba2c312742d7b422cb04347d6ce98151019baf81a3390e12de140365f17a9cf9afc
-
Filesize
8KB
MD554fa38a675e31cb61c4d684857401bfa
SHA1548d9fae0de3f34a40c66400524a48a4d9295491
SHA2565bee78015e52f35c0e604a38b4045d04d174950a26658201714a770e4176f02d
SHA51261bb5f5cbc3cb5ff9e05984678e2d12b5914340ab2dbf812ad1a519aa4938b3f4b220234c5b33d198efc2d8a90e6a947f8a20b352bd2862a313e57c43aad8fda
-
Filesize
1003B
MD56e30b0f37668df11c09a638ec2901959
SHA162f3c4379d14c86261724942016e8b30777049cb
SHA256bf08172a35630a61b905c438f4c7f33df2a57ad078e24125de41b77880ee7e53
SHA512f82eb5a5efcb8994a89a30ec47fc43173964adc5913f5277ac30adfd5c7f7a5c8cddbb6dcdff6ae49dc5391bed38884633482600e1fca84ce9738e52ade08cc1
-
Filesize
950B
MD5a0151daa5f849bb6b22e20abbab78436
SHA10f8a2ae2f4982fd562221cf8567cd6a5e68bad1f
SHA2564443ee00c111715fdfbcc9f221c44bef3333de7e887b70c39417c61ec7369728
SHA512b9dfb5c784a762ea9ee6b0b3fa514dd3c96242019d79c1919f11f195984c9626b934e668480152ee56c8b88ac2ebd0e028cc6af0c33f25573bb5fd019781071e
-
Filesize
1KB
MD5af5deb4ef4870c69e6a7edf2f38faef4
SHA116bc05409d7da0a8121da977607af958d10e96fb
SHA256638a6fd479b267e2a2b349953604a149bd521fc3f9d8f1ccd4b53aaef0a78513
SHA512153714ebf00226c67d2a6d2cd88c1226bd16b951704cde38df869d7c488e2c753d2bfcc9389f504558578af4819e4573fdcb1f0bf478fe227ccc9c3f31294054
-
Filesize
23KB
MD50d5b69334bc73302a52bc3bab5a5ac27
SHA1da23a6f5ce158774ca047f7761e834258d907f52
SHA25642030cb3333c77d3019180f5aca1deb1345de55cd33a1816db5b1a276445ac84
SHA512c2d54552b7a874d8189adfb15d35af852d5b5b4526b76e72b914ea2fc4b022e632f5e583ff6528ad9bde2f2639d976d7215d9e76c5bf9376b1e33c84be1a3fb5
-
Filesize
1KB
MD5bd0f970f72b8b9064dfaab084fc55fea
SHA1c792935e9f72bea9b4ecc555b28ebb5fdf03ddfb
SHA2566234d5b195a6f28da3e7fff79c4a95262ce33a176e8e8355b94a36f61e96913e
SHA512cfcc5608056bdaf647361416e5c51a58caaed58548c1d32942eb946d177f781f76e984e997f1326abd07395ec42fff6fe47b1553a83728e9b1c4bbb849fd13bf
-
Filesize
1KB
MD54c74aab2bcf16cb617837aaeaa7cfa1b
SHA137925cfde22e94db3f4ad04df39d8fb20ca55c17
SHA2568092dffbb4bc611d6f92786fbab70fddf7da5634f84d423c6fc20afd26172628
SHA51262d96a3dc3001b396907855f12f91073a9d9e1d602e111a859c84a3207431c12564e46d0f052f293692cb130b56eb4b9e6fe7310ec2db0b401e4225f7afefc2f
-
Filesize
1KB
MD5fa6fd08affac19e21aa47df7a50eacd4
SHA1fff56332d1d2e2386ca874c9bd8540b3306f59fc
SHA25697f1d1b373351f9593227c67cb5e8dc073641a962d81df936920f33cb8d3c4cc
SHA5129f4ce00d51450ef25e06dfe64587fcf8a5e9d65288ac9c44af733e10825e2173f40ea1e37d4dd1c39842b4b23b8a53cf9d0a0aeb609261ef0a3ee394c6f3ddd8
-
Filesize
1KB
MD59876c5a2a2433a1d0d12dc272c2c226b
SHA1508fbfb0a0164ce84a83c1f8fe257035e3b62929
SHA256e182eb30de511bbc685548a771daa015a42299c207989c495bba0e8c9f5d0c1b
SHA5125c89ba6180d0b22cf45db507b4d90e61e4d32b0753703f5735d36caf442e25d2ee4a617495ff022a6cedbb9fd0949912d5feb068afcb6aecc2451a7541edeeef
-
Filesize
1KB
MD5ee3e7acb4e6cbd2bd2280af9f3b61805
SHA13173f5a908928a464ce97181e20b84bc67e7adc8
SHA2567f721406c23540bef70c6f91abc63b98ca26bca59f13605f96005612e56e5e7a
SHA5124adec1dbff9bf684f2637df46094f2e344b71c960775ebce7885b45fe71ac9f356cad868ee18b04d7cef54e52cb5d98756f1c2f3397a9fc3b30ac4f4ce6697dd
-
Filesize
17KB
MD56e0e5b09e6b0dbcd105c1dcfd13025bf
SHA1421f47fb759a3b8a68dfd33e980ee01a3312677e
SHA256d4bf4bf16ea64e57391cebd9d85d8cbbad866b7dfbb32882ecc7f8a29b19f5e0
SHA512783070dc6a31297c942ca857a04c6d1c3542456b63987cf9ca54c7b7c22d6fc0b3bd78c7e7a7d0a8d898307a0c1740554096640991ffcf0d21baac96266a9f65
-
Filesize
5KB
MD541e22dc53a45821cf4755dfd512097fa
SHA19009f852a32c89dc6a2a01c6a658579389f0907c
SHA25681e89178822622014427ff3d3b11179d392ec4f222b331d6483214667e8e9749
SHA5123770f8c789bc51b8d9354cd8de7e70072d4f4d09f66e37e6030e830f28a8f3b2f4aea90db53bf5e713d2a7b38b86f150e0f9b44ea4f56fe3362cc508feecabd4
-
Filesize
995B
MD5db61ef6be10662bde9e80c76e3b51854
SHA1f48725f24dec25548d1a778dbc9fa95146a042b2
SHA256478ce132c5472395f0ccfe3853a6b60dc727c2ee1c8d525c05e8717e264fd176
SHA512dce39e93e47089104cc9fd1a73abcc506ccb4b29132e2b56adf8f052c9bc6dc6a05452bf7e44c60363705467af13a1cfefb87fede4f15aee6e73272a07e72f95
-
Filesize
4KB
MD5292cae7ef8a682ebc2fb855afcf54f2d
SHA12401ce33d598bf417859eee779127703fdaa4762
SHA2569ccfd9c2c1a3b12aa881d6c4a52375595a50a7f3f2d8ba157dd12ffcdf1d75f7
SHA5128f1b781676ba8dd945f9974282715be65f4b4302dc07196e7a1377b3fcbb73c209836be42e912a079879d5db0af9d411dd614a53fa5533d232b5dce5ea50055a
-
Filesize
946B
MD51e8fb34ac9925d9bad14a75ec8ea5f56
SHA1bb197cb5dc01c484788f958fcc4ada2b129fa5ef
SHA2569f98ab7d58b34d7ce6bb84eac14edfb3ae263b315c1e8e6a3c161b31c19ed0a5
SHA5129b9643a36bf239c78d77668e9b61bbb7247cc86ad03ff542fb2863c32775b1bd9f4ba964b23519e95c573cbae67389ea37697dd222dbca100cd3c2ea847b997b
-
Filesize
1KB
MD5e3e5a56632c8620a18044e695ba7cdb7
SHA1bd2d52b5a6afcfc331117b6aa8e51b8c5db3e66e
SHA256dfc05aa1d37f984f68db0303d2c4cf894b190659ebfc94486eda228d6b5fa95e
SHA512c5808e1e035bce16e4599f0c0c7fcc54c007ea548c945a8c2bfff7c75efecfdc3a80da1b5fd9db70d60af05194b8b22842b501c76378af88a4f92f6e72bd2723
-
Filesize
8KB
MD599c91df6c81dadcd064743be25f50480
SHA1da5af0368ada0b3ecb6eede6137a5a01ea388113
SHA256f8e4a1dfa021ebea8f705739f0d1eeaa29824af0f7283eee268d72cc3b53a1f8
SHA512b703ef1330337dca4499ae204e5e23aec8dff6b47f361257e56e6abc499650266f86133effd5843c0dfc076cde32b2d8b46ac67608366b815d0f2e8035abde10
-
Filesize
3KB
MD50075ebe78309b52bd59fb132c31f912c
SHA1dc931227e1f076abbce19c89245f38e303890665
SHA256f7267655ec266625f19be5845a005da04da328cdd5ff91d239388a5ef21c0616
SHA512fcfb1f872c5012db302f5330f12b2f6d5ee6ed86c3cd36f29ba4b57204f909f4be18692f4e2c887ef31cec009721191602f7c8d9647e3b293c168e674bb2563d
-
Filesize
7KB
MD5273805210c8d49fd526e45ba8caca3c9
SHA10a45b0d24a345dbbae8be8f157af3288cc73a29b
SHA25669931a6debab54157d1b5c0bdb124f36a6831ed7ae110b98c8f00cd886215f87
SHA512f14df0ad40667999cc45710f342978c981a89cebd27a726e7b02bebd6dc807985db2cf1a2df6227ce8834c15763ecb6b9f3f161071c1bc4d7103ef39471e566e
-
Filesize
2KB
MD55add447f7599a9bacc6c870c6d9e8c3d
SHA1429cefa6b79b2bc2abe0923e6e222b102eff3228
SHA2560fc1ccdcb753da863531b1da84ffcc482ebd2ef9f9e5bc2c0c1c5c9674527a6b
SHA512f9ee6ce2c7a0e2f7574b4730a9dd7824f0c1926332743ab00a9772aadd600cd668ccd76a0b07a3a901ebcedd43aeed3b6c4624b4a2d23396c0342be669dcc2e7
-
Filesize
5KB
MD525eff46b9c07384eb6514c3056cf3edc
SHA1a2703aa571978fd4405a548f9ca3c58924c5451d
SHA256a31e6b90ae103837c49da3037458b843248b58ce4a6a79e551dd9b4f30129c33
SHA5123ef4c686657683c0b23b138b025ed0f1318a07cbb4013d009d0d980c09c43088548aabbe34c95cc586838f130f9d76f2421311387f0bb5e5e69d966081b8d5d1
-
Filesize
5KB
MD574b9cc551416a9e012ad8d30d309e754
SHA122168c14cfeaff5d9ad1399fba131a3c5d4ee67c
SHA256a004641143d10d28fb7302963e1afc77b16b4df41fb3df6b752944f3a190fff3
SHA512989ce2b5520976a0c5cbc9d44149e5cb86444614557ddcaaffbad580ae1b38b8868fe6bca09768d2ce7b868c2335920e744cf530f24658bac78ed877875b83d8
-
Filesize
1KB
MD570d0733d91369221657da75972aa2996
SHA196f083da2839e79d1abfd48a59814184abaa32b3
SHA256af03f14213c248c7fe7b670a7aa2d9dea1a1c724330c32f01352cf386ff5e57d
SHA5123999d25b5d0cf7f94f60f20b78704161aed4a3871cbf508b9f575e93081cc7a23a8bd950d0eb3c9b08e0c86f8b7775f33efe047a1fa3f08c21390430b2b057a1
-
Filesize
589KB
MD5ae8a8778ac495b47070774f33089753a
SHA124b443630adbf79b12c920f8fa2586abdf8ba6d2
SHA256bc35883beeb5da827d8eceb32d30bd07a838ad6c8ffa07f0dc7708a118ab4a39
SHA5121bd8933a7ca742769bce5463190d774ecfb70b984e500ab8b0229330eb7c4aa5e7c8432385459f4cc8e528504d2d5382e8379f7d6c13daa7a7506184fef3b125
-
Filesize
64KB
MD5fa1b8c51831422de4eaab039d95a8f63
SHA121b8d8870bd694d5a847e53e1b45c20719db8548
SHA25659e98bfbf3111ad0537abb6dcae7b864c162d1d66045ee9e59661103ab988dae
SHA512d42456b76e78fce6aeed71d4901d2c247a79d5969b3e37489c79046d3718ab809a8011804616cbcd6debc540b84650d26d4c00a52b6aca56c7240f6b7d87bfce
-
Filesize
232KB
MD50bc2d003fcfe3fa65f4c3ba7a015fa41
SHA172ed85bc1c57259b4f2ed36d16ce3fed4e30607c
SHA256388069590fb9569b6c498f941d0565416cb52fc803648ee21b8c59917c63eb4b
SHA512ae8d83e6ca21ee9b0d5e5845fac3a4dc01c6038243da36b4360b2f42763478265cdafc89072c47672b9738de1930e5e5191e2bf91715055cbd16a949d313ff24
-
Filesize
450KB
MD5b1ce2dba9515e144908aa34ac77f5a46
SHA10a3e601eeba273a16d815c5e59793eb73db9daad
SHA2565a7349e46f16ec394af8575b666c132c010bacaa2c59da472b842ffeccc5623f
SHA512d0a78b5de9126b8126b531fb8f72ae375aac898930dccd8a61f173c28470895daab56b368c34a5925020dfdc642785651445967904d8756bb1ce7c1d2f95525a
-
Filesize
53B
MD5113136892f2137aa0116093a524ade0b
SHA1a0284943f8ddfe69ceec90833e66d96bdf4a97f0
SHA256ebbf7e8800c3446bc3a195fa53573bde1073b0bf7581a614372f1391a9286d02
SHA512d3201cc19ae702a9813aa8bc39612ebaa48138903e9ede64dcadff213691f6e711876aa4fa083887c545325d5d8bf70649523c528090542459f2b01697180e99
-
Filesize
58KB
MD558bb62e88687791ad2ea5d8d6e3fe18b
SHA10ffb029064741d10c9cf3f629202aa97167883de
SHA256f02fa7ddab2593492b9b68e3f485e59eb755380a9235f6269705f6d219dff100
SHA512cd36b28f87be9cf718f0c44bf7c500d53186edc08889bcfa5222041ff31c5cbee509b186004480efbd99c36b2233182ae0969447f4051510e1771a73ed209da5
-
Filesize
71KB
MD5f0372ff8a6148498b19e04203dbb9e69
SHA127fe4b5f8cb9464ab5ddc63e69c3c180b77dbde8
SHA256298d334b630c77b70e66cf5e9c1924c7f0d498b02c2397e92e2d9efdff2e1bdf
SHA51265d84817cdddb808b6e0ab964a4b41e96f7ce129e3cc8c253a31642efe73a9b7070638c22c659033e1479322aceea49d1afdceff54f8ed044b1513bffd33f865
-
Filesize
29B
MD5dbdddb37dffafd829b9dddd86c8cbf57
SHA14fd1a652c7bfe2eb39e98a795cd77bc415b13d07
SHA256e661aadd4b5793e960bebdb4862589720b757d7f2c9849c73a9490c162830466
SHA512f1883accc58a7098f9b15a1a7225e7ef0e2ce3175dde6f5b2851c63654ee02919db734e41b45e74f998ba4c5e4f1fdc96abb5546a7fa1b02cc32ffe7d0c5fe36
-
Filesize
1.4MB
MD54cc34f51e0009eed6a11bb8b0450ecb8
SHA1e3b7c9d848f4b00839a784802f3f6f562d5e4ff9
SHA25624d9bb24411b02b92b7273d274a673dba652fb54e3d5c278ed319ec5f970e0d1
SHA51294c45098641405da8a284b99202b6558c5e0abee9df64040fccd3ecc48eebe09817825e7927611d9e9882759d26e1aa50ef076ee45f96ab1fdd71ae175e6a831
-
Filesize
3.9MB
MD5bbb71ed8544f41e256642bbcf619cceb
SHA1761aded63f30d0df6d8b08966dc7040df81fa536
SHA25654b29325a9833ed9a463482df1d62271c040e950fc1e402ea6f368a8eaf68260
SHA512a366b35af4a3ea83bf6502fca754f3cbdf49ed72995bec95f63c55dd85602f618807c194598f42d20258af6fb0cfe863d793e8fae85be03d9af972cca62d143c
-
Filesize
4.1MB
MD50acd113506854456bda2cc97335593d1
SHA16de0af189dad86058ab2103b5720679b88c66d3d
SHA256ce14b3c110258b3b54055b5cf7370a5ba591152fcc558893a6acfc8b4e5b0fc3
SHA5120836ddce69f75e74e9277cedb557dc5ab28cb93e7b6da45c168a6c21b0eb51d6b3b9a7b095d1f6d8628fc852f64b7e723adb2fd8b000f9fcf6f3d0995df775ae
-
Filesize
168KB
MD53d3e5a0455863ae5b4db90b07c974967
SHA1d6316c15eeccb0942a2779636812be9b3da333d7
SHA2568671d4570f9462ff5c4cca67094baaecefebea212b2c8f27ad29d38f76ff312b
SHA51237178f6ce1bb692b3eb19767955089be56649a02b8eaa940522fcac29397030e2510a3c7419f3e72be0b595b2e8c8f13ce6d4ac723f22a52103d669e6490331e
-
Filesize
1KB
MD5583d00663d5b2f31771e0a6b745a5a16
SHA19898ef4771c5b63f9017e593e30a0ad26dc20b9c
SHA256c1e37d9d42edbd2509eb2026ba31e958b1c13bccfb2d65aefa95c3f5c3939b90
SHA512afca7cd6d6e981f7abc93cb86555865b1dd10a9ab98aafe02e007f0ff1ea59c118da538e3f42ca50036519338e2d145cd841858fec32f88f6ee5f74b33a39152
-
Filesize
4KB
MD5eb90d066d1c98b73d2450891a65e58dc
SHA176df0aaf64a0b457ad1229233431bd97aeae29e1
SHA25681272e2e50a4861770e564b34d74d50e1eac4565542f8a49cc35b50488e19b28
SHA512f94678116e9d0f03ed89b7853a1a4fe3772a95adf0c9f7227a043ea4bcc265050bd84bebeded73aca9fe1eb732097c7e9fd0325de5c3a25e34e49a0429792f3b
-
Filesize
1.2MB
MD5dc68cc80901f3b51b96fbd42bc599036
SHA1ad02e1c74be06d5dbbed3effc74271a81e519f18
SHA25607363499c5c195c2c9092f216fa82d71b383980eab3d0ad512f1324078e6f5e5
SHA512d8619d20ffdc6f5a1e2eaea3ee6d2a64358efa01f014ead6fa58bbcbbaba3745d20ea4ac8e9c0ad6b97b09b50233ddcebc7bf18b7f234470d870a156b8bdddd1
-
Filesize
1.9MB
MD50618e9851ea4a522abeded8d40c2f19e
SHA1c6772967fdf545e32d28f3b46e97aec5b9ff99f5
SHA256506c374fbdf14420306e2da8d123c2138c2ceabd2046178317508a25949d3dc4
SHA512b8c4816d81aa14646a3b690da76c0d33f59b7d419305638747503dba6bb84a63b906fe7d0ced59850ad25db37c1e0e6f3bd614a902f2f5ffb3d2bf74ec4e571f
-
Filesize
1.1MB
MD566d80ceebe6556879b5c3547224af0ce
SHA17316289d02f2719b105a194ae2c81875aaf02920
SHA25662e10bb4eae5e3d22bc962575bdc962b1e286622b26827f20e584aaa5c888e3c
SHA5129f19a47c9196508368007ac98d9af4c5bfca36d0a031b0bf6af4f85b68b6a8bfa0dec15355043864a057f2f0a1f68bd7acdf36f2920bf79f058a12cc81f0554d
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f