Overview
overview
10Static
static
10Dropper/Berbew.exe
windows7-x64
10Dropper/Berbew.exe
windows10-2004-x64
10Dropper/Phorphiex.exe
windows7-x64
10Dropper/Phorphiex.exe
windows10-2004-x64
10RAT/31.exe
windows7-x64
10RAT/31.exe
windows10-2004-x64
10RAT/XClient.exe
windows7-x64
10RAT/XClient.exe
windows10-2004-x64
10RAT/file.exe
windows7-x64
7RAT/file.exe
windows10-2004-x64
7Ransomware...-2.exe
windows7-x64
10Ransomware...-2.exe
windows10-2004-x64
10Ransomware...01.exe
windows7-x64
10Ransomware...01.exe
windows10-2004-x64
10Ransomware...lt.exe
windows7-x64
10Ransomware...lt.exe
windows10-2004-x64
10Stealers/Azorult.exe
windows7-x64
10Stealers/Azorult.exe
windows10-2004-x64
10Stealers/B...on.exe
windows7-x64
10Stealers/B...on.exe
windows10-2004-x64
10Stealers/Dridex.dll
windows7-x64
10Stealers/Dridex.dll
windows10-2004-x64
10Stealers/M..._2.exe
windows7-x64
10Stealers/M..._2.exe
windows10-2004-x64
10Stealers/lumma.exe
windows7-x64
1Stealers/lumma.exe
windows10-2004-x64
10Trojan/BetaBot.exe
windows7-x64
10Trojan/BetaBot.exe
windows10-2004-x64
10Trojan/Smo...er.exe
windows7-x64
10Trojan/Smo...er.exe
windows10-2004-x64
10Resubmissions
03-09-2024 14:02
240903-rb57sazdqf 1003-09-2024 13:51
240903-q59avszclf 1002-09-2024 19:51
240902-yk8gtsxbpd 1002-09-2024 02:27
240902-cxh7tazflg 1002-09-2024 02:26
240902-cwxc2sygll 1021-06-2024 19:37
240621-yca7cszgnd 1009-06-2024 17:07
240609-vm7rjadd73 1013-05-2024 17:36
240513-v6qblafe3y 1012-05-2024 17:17
240512-vty3zafh5s 10Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 16:15
Behavioral task
behavioral1
Sample
Dropper/Berbew.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Dropper/Berbew.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Dropper/Phorphiex.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Dropper/Phorphiex.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
RAT/31.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
RAT/31.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
RAT/XClient.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
RAT/XClient.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
RAT/file.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
RAT/file.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Ransomware/Client-2.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Ransomware/Client-2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Ransomware/criticalupdate01.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Ransomware/criticalupdate01.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Ransomware/default.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Ransomware/default.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Stealers/Azorult.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
Stealers/Azorult.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Stealers/BlackMoon.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
Stealers/BlackMoon.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
Stealers/Dridex.dll
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
Stealers/Dridex.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
Stealers/Masslogger/mouse_2.exe
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
Stealers/Masslogger/mouse_2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
Stealers/lumma.exe
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
Stealers/lumma.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
Trojan/BetaBot.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
Trojan/BetaBot.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
Trojan/SmokeLoader.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
Trojan/SmokeLoader.exe
Resource
win10v2004-20240508-en
General
-
Target
Ransomware/default.exe
-
Size
211KB
-
MD5
f42abb7569dbc2ff5faa7e078cb71476
-
SHA1
04530a6165fc29ab536bab1be16f6b87c46288e6
-
SHA256
516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd
-
SHA512
3277534a02435538e144dea3476416e1d9117fcddef3dcb4379b82f33516c3e87767c3b0d2b880e61a3d803b583c96d772a0bdeecbfc109fe66444e9b29216af
-
SSDEEP
6144:zia1vcaEaA+HPsISAzG44DQFu/U3buRKlemZ9DnGAeWBES+:zHctWvVSAx4DQFu/U3buRKlemZ9DnGAn
Malware Config
Extracted
C:\Program Files\Java\jdk1.7.0_80\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Detects Zeppelin payload 15 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe family_zeppelin behavioral15/memory/1500-89-0x0000000000020000-0x0000000000160000-memory.dmp family_zeppelin behavioral15/memory/772-173-0x0000000000030000-0x0000000000170000-memory.dmp family_zeppelin behavioral15/memory/2904-273-0x0000000000030000-0x0000000000170000-memory.dmp family_zeppelin behavioral15/memory/2904-4110-0x0000000000030000-0x0000000000170000-memory.dmp family_zeppelin behavioral15/memory/2260-4131-0x0000000000030000-0x0000000000170000-memory.dmp family_zeppelin behavioral15/memory/2260-7101-0x0000000000030000-0x0000000000170000-memory.dmp family_zeppelin behavioral15/memory/2260-10944-0x0000000000030000-0x0000000000170000-memory.dmp family_zeppelin behavioral15/memory/2260-14538-0x0000000000030000-0x0000000000170000-memory.dmp family_zeppelin behavioral15/memory/2260-17979-0x0000000000030000-0x0000000000170000-memory.dmp family_zeppelin behavioral15/memory/2260-21886-0x0000000000030000-0x0000000000170000-memory.dmp family_zeppelin behavioral15/memory/2260-25871-0x0000000000030000-0x0000000000170000-memory.dmp family_zeppelin behavioral15/memory/2260-29405-0x0000000000030000-0x0000000000170000-memory.dmp family_zeppelin behavioral15/memory/2260-30322-0x0000000000030000-0x0000000000170000-memory.dmp family_zeppelin behavioral15/memory/2904-30351-0x0000000000030000-0x0000000000170000-memory.dmp family_zeppelin -
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7392) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
Processes:
notepad.exepid process 1012 notepad.exe -
Executes dropped EXE 3 IoCs
Processes:
TrustedInstaller.exeTrustedInstaller.exeTrustedInstaller.exepid process 2904 TrustedInstaller.exe 2260 TrustedInstaller.exe 772 TrustedInstaller.exe -
Loads dropped DLL 2 IoCs
Processes:
default.exepid process 1500 default.exe 1500 default.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
default.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\TrustedInstaller.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\TrustedInstaller.exe\" -start" default.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
TrustedInstaller.exedescription ioc process File opened (read-only) \??\U: TrustedInstaller.exe File opened (read-only) \??\R: TrustedInstaller.exe File opened (read-only) \??\M: TrustedInstaller.exe File opened (read-only) \??\H: TrustedInstaller.exe File opened (read-only) \??\E: TrustedInstaller.exe File opened (read-only) \??\B: TrustedInstaller.exe File opened (read-only) \??\Y: TrustedInstaller.exe File opened (read-only) \??\V: TrustedInstaller.exe File opened (read-only) \??\A: TrustedInstaller.exe File opened (read-only) \??\G: TrustedInstaller.exe File opened (read-only) \??\W: TrustedInstaller.exe File opened (read-only) \??\L: TrustedInstaller.exe File opened (read-only) \??\P: TrustedInstaller.exe File opened (read-only) \??\J: TrustedInstaller.exe File opened (read-only) \??\Z: TrustedInstaller.exe File opened (read-only) \??\Q: TrustedInstaller.exe File opened (read-only) \??\S: TrustedInstaller.exe File opened (read-only) \??\O: TrustedInstaller.exe File opened (read-only) \??\N: TrustedInstaller.exe File opened (read-only) \??\K: TrustedInstaller.exe File opened (read-only) \??\I: TrustedInstaller.exe File opened (read-only) \??\X: TrustedInstaller.exe File opened (read-only) \??\T: TrustedInstaller.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 geoiptool.com -
Drops file in Program Files directory 64 IoCs
Processes:
TrustedInstaller.exedescription ioc process File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\vlc.mo.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME03.CSS.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198447.WMF TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0285484.WMF.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME31.CSS TrustedInstaller.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Lima.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Saipan.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-templates.jar.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02097_.WMF TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105396.WMF.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15022_.GIF TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\STS2\background.gif.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL089.XML.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\UnblockEnter.zip.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Perth.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.swt.nl_ja_4.4.0.v20140623020002.jar.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-application-views_zh_CN.jar.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Adjacency.xml TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0252349.WMF TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-attach.jar TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0321179.JPG.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00837_.WMF.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\send-email-16.png TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-core-kit.jar TrustedInstaller.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152898.WMF.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\AST4 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\ZY______.PFB.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\BTOPENWORLD.COM.XML.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-masterfs-nio2.xml TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00234_.WMF TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0102594.WMF.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00192_.WMF.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\STOPICON.JPG.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0216612.WMF.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143753.GIF TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0233018.WMF TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.ES.XML.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.directorywatcher_1.1.0.v20131211-1531.jar.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\date-span-16.png.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prcr.x3d TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ProjectStatusReport.potx.5E1-A3C-E88 TrustedInstaller.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0103850.WMF.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL090.XML TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\AdjacencyResume.dotx.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\jvm.lib.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\create_stream.html TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\LoanAmortization.xltx TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\SplashScreen.zip TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ashgabat TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\feature.properties.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ql.nl_ja_4.4.0.v20140623020002.jar.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Bahia_Banderas.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.SharePoint.BusinessData.Administration.Client.xml TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_MediumMAsk.bmp TrustedInstaller.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Maputo.5E1-A3C-E88 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Riyadh89 TrustedInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_underline.gif TrustedInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1212 vssadmin.exe -
Processes:
default.exeTrustedInstaller.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 default.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e default.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 TrustedInstaller.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 TrustedInstaller.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 default.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 TrustedInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 TrustedInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 TrustedInstaller.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 TrustedInstaller.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 TrustedInstaller.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 TrustedInstaller.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
default.exeTrustedInstaller.exeWMIC.exevssvc.exedescription pid process Token: SeDebugPrivilege 1500 default.exe Token: SeDebugPrivilege 1500 default.exe Token: SeDebugPrivilege 2904 TrustedInstaller.exe Token: SeIncreaseQuotaPrivilege 1548 WMIC.exe Token: SeSecurityPrivilege 1548 WMIC.exe Token: SeTakeOwnershipPrivilege 1548 WMIC.exe Token: SeLoadDriverPrivilege 1548 WMIC.exe Token: SeSystemProfilePrivilege 1548 WMIC.exe Token: SeSystemtimePrivilege 1548 WMIC.exe Token: SeProfSingleProcessPrivilege 1548 WMIC.exe Token: SeIncBasePriorityPrivilege 1548 WMIC.exe Token: SeCreatePagefilePrivilege 1548 WMIC.exe Token: SeBackupPrivilege 1548 WMIC.exe Token: SeRestorePrivilege 1548 WMIC.exe Token: SeShutdownPrivilege 1548 WMIC.exe Token: SeDebugPrivilege 1548 WMIC.exe Token: SeSystemEnvironmentPrivilege 1548 WMIC.exe Token: SeRemoteShutdownPrivilege 1548 WMIC.exe Token: SeUndockPrivilege 1548 WMIC.exe Token: SeManageVolumePrivilege 1548 WMIC.exe Token: 33 1548 WMIC.exe Token: 34 1548 WMIC.exe Token: 35 1548 WMIC.exe Token: SeIncreaseQuotaPrivilege 1548 WMIC.exe Token: SeSecurityPrivilege 1548 WMIC.exe Token: SeTakeOwnershipPrivilege 1548 WMIC.exe Token: SeLoadDriverPrivilege 1548 WMIC.exe Token: SeSystemProfilePrivilege 1548 WMIC.exe Token: SeSystemtimePrivilege 1548 WMIC.exe Token: SeProfSingleProcessPrivilege 1548 WMIC.exe Token: SeIncBasePriorityPrivilege 1548 WMIC.exe Token: SeCreatePagefilePrivilege 1548 WMIC.exe Token: SeBackupPrivilege 1548 WMIC.exe Token: SeRestorePrivilege 1548 WMIC.exe Token: SeShutdownPrivilege 1548 WMIC.exe Token: SeDebugPrivilege 1548 WMIC.exe Token: SeSystemEnvironmentPrivilege 1548 WMIC.exe Token: SeRemoteShutdownPrivilege 1548 WMIC.exe Token: SeUndockPrivilege 1548 WMIC.exe Token: SeManageVolumePrivilege 1548 WMIC.exe Token: 33 1548 WMIC.exe Token: 34 1548 WMIC.exe Token: 35 1548 WMIC.exe Token: SeBackupPrivilege 1480 vssvc.exe Token: SeRestorePrivilege 1480 vssvc.exe Token: SeAuditPrivilege 1480 vssvc.exe Token: SeDebugPrivilege 2904 TrustedInstaller.exe Token: SeDebugPrivilege 2904 TrustedInstaller.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
default.exeTrustedInstaller.execmd.execmd.exedescription pid process target process PID 1500 wrote to memory of 2904 1500 default.exe TrustedInstaller.exe PID 1500 wrote to memory of 2904 1500 default.exe TrustedInstaller.exe PID 1500 wrote to memory of 2904 1500 default.exe TrustedInstaller.exe PID 1500 wrote to memory of 2904 1500 default.exe TrustedInstaller.exe PID 1500 wrote to memory of 1012 1500 default.exe notepad.exe PID 1500 wrote to memory of 1012 1500 default.exe notepad.exe PID 1500 wrote to memory of 1012 1500 default.exe notepad.exe PID 1500 wrote to memory of 1012 1500 default.exe notepad.exe PID 1500 wrote to memory of 1012 1500 default.exe notepad.exe PID 1500 wrote to memory of 1012 1500 default.exe notepad.exe PID 1500 wrote to memory of 1012 1500 default.exe notepad.exe PID 2904 wrote to memory of 2260 2904 TrustedInstaller.exe TrustedInstaller.exe PID 2904 wrote to memory of 2260 2904 TrustedInstaller.exe TrustedInstaller.exe PID 2904 wrote to memory of 2260 2904 TrustedInstaller.exe TrustedInstaller.exe PID 2904 wrote to memory of 2260 2904 TrustedInstaller.exe TrustedInstaller.exe PID 2904 wrote to memory of 772 2904 TrustedInstaller.exe TrustedInstaller.exe PID 2904 wrote to memory of 772 2904 TrustedInstaller.exe TrustedInstaller.exe PID 2904 wrote to memory of 772 2904 TrustedInstaller.exe TrustedInstaller.exe PID 2904 wrote to memory of 772 2904 TrustedInstaller.exe TrustedInstaller.exe PID 2904 wrote to memory of 2940 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 2940 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 2940 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 2940 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 1380 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 1380 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 1380 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 1380 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 608 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 608 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 608 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 608 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 2568 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 2568 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 2568 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 2568 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 1480 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 1480 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 1480 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 1480 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 2688 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 2688 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 2688 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 2688 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 1504 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 1504 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 1504 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 1504 2904 TrustedInstaller.exe cmd.exe PID 1504 wrote to memory of 1548 1504 cmd.exe WMIC.exe PID 1504 wrote to memory of 1548 1504 cmd.exe WMIC.exe PID 1504 wrote to memory of 1548 1504 cmd.exe WMIC.exe PID 1504 wrote to memory of 1548 1504 cmd.exe WMIC.exe PID 2904 wrote to memory of 2016 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 2016 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 2016 2904 TrustedInstaller.exe cmd.exe PID 2904 wrote to memory of 2016 2904 TrustedInstaller.exe cmd.exe PID 2016 wrote to memory of 1212 2016 cmd.exe vssadmin.exe PID 2016 wrote to memory of 1212 2016 cmd.exe vssadmin.exe PID 2016 wrote to memory of 1212 2016 cmd.exe vssadmin.exe PID 2016 wrote to memory of 1212 2016 cmd.exe vssadmin.exe PID 2904 wrote to memory of 2652 2904 TrustedInstaller.exe notepad.exe PID 2904 wrote to memory of 2652 2904 TrustedInstaller.exe notepad.exe PID 2904 wrote to memory of 2652 2904 TrustedInstaller.exe notepad.exe PID 2904 wrote to memory of 2652 2904 TrustedInstaller.exe notepad.exe PID 2904 wrote to memory of 2652 2904 TrustedInstaller.exe notepad.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ransomware\default.exe"C:\Users\Admin\AppData\Local\Temp\Ransomware\default.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2260
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe" -agent 13⤵
- Executes dropped EXE
PID:772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:2940
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:1380
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete systemstatebackup3⤵PID:2568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete systemstatebackup -keepversions:03⤵PID:1480
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete backup3⤵PID:2688
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1212
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:2652
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵
- Deletes itself
PID:1012
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1480
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
2File Deletion
2Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD525cd409fdd70167e1dfc4d37130df9a4
SHA10d13f55fd0991896e10bfeb93222b56cbb2c5369
SHA256c5360327cd36b06414a4e768e85a4cff55b5621dba9e0c53852fc5db5cf37e72
SHA51260bd1a18b7800bf11bbbf3304afa6c8337e6e5cd3364f49bff1536ce8ad0035dfb9d1a36d73a2eab0235bf6ff1b6a0b67e1edbce9692215d84bc898b53c738f3
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB.txt
Filesize29KB
MD59840a9a61a7157ca0f4d877c174db4a5
SHA17dd7cde76512253ea1b384db245498db718aa74d
SHA256e10d63785e296de8cafe1085cc3a989ddfb0cd695590dd963fd997dcd52cb97d
SHA512cc65f9d54455de9f7608ff79e319b3479ccd5b730aa99006652d8beb74d4740daff7fcf201c1d00fabf128442219bdd47cf068d99e2594f172ccd6b0ea5b43a5
-
Filesize
6KB
MD5a5ca7435638fbb8c4dc81cce36ad0185
SHA13d545b1e3dfe171f2bfa1a9be24217bc865ce969
SHA2566f69caf6f822a5980c92bdbeb44ca79b7a7a2d9b801b9f876d3d5067c70c5014
SHA512cc979a0785fd8590801a13d1373cbccece745361f26e73d8560706c831033cac16d468ad4396f0b27b4fcdf8f54b57a9f85f9205cee4bc1a695535010fe227e6
-
Filesize
122KB
MD5c4ebf3a5376bcbf131bb1b2af4fd9fc4
SHA16fe3a6fd9071c291caf24f08a4541e75bf9c8e1c
SHA2566d25758a9b586dcb58d5291ed830172cd9bfede056113eda11c6e1090c8e9e4a
SHA51231a1e45e24c6d6c3fdb3793996c6ffb7766ee19799848872a3d177578a40b7c3bab096abf6cedbde9a281ca58a91c6fbd5190e50b2853b8f71618c5f725733e9
-
Filesize
125KB
MD58070ce75c707a1500c19c8f1c3f7b64d
SHA127779db5dc84eda18901ced5edebf87d46590dfc
SHA2560bc4f23f6f810e06ad13cd72c24acb221c14ff8d5665d6bf3c34db7b46f28577
SHA5122540fbfb616e87257842ce0f5446b2f1379ab8531b2fbe32d0a629f747f01cd35c247168fbc849da2e07ed06324f3aa0d0ae772fd5b0cf02b99be468f5f7e167
-
Filesize
258KB
MD56fe819ef98a4f771139b9af82b74af65
SHA11a49fed49070ed4099ac8407c2e68ee61e578142
SHA25606137853df0295675eea706de24e47ab410c8c1efcbdd9f9daf779b2efb90625
SHA51244819b74af5eb00c92eb8113c64cccca66c885d6c1ceb81059b2e3428b4711a4ff3bc77ce65fe6e057c481340791174bcf74c75b92d90a67836c8fd4183473bd
-
Filesize
332KB
MD57c8141f36c0c1629ab7e4eb55a5e1d38
SHA1dfff4d0c3dec0cac0cdec07270257c967ed2c2aa
SHA256a143dc9c6b2d8a575dca66c5f4c2d6242a92231d2b16bc6ec5642c6c907370d4
SHA5125a3664a37553360821c259ce82fe40cef031e351115cf46dce66fe9f0b31a1d4b6a89fbb05b7eb1870ea5736e9f22ea54e0765e7e009a328c752eb63f87477ad
-
Filesize
78KB
MD564091b749e4c68da93dd12515929e209
SHA162fc21fb142b38ac7145848c9d3d5fb45c8b56fc
SHA2560f3c7e3e8d8429f0e2cf134667db8021678c449a1b5f5d9d98936cafdb416ec7
SHA512e4b31d1295555530e51033f133614423a3c83707e56cfb3c6d4d1c582ad1c2e3e6bf13418ec15b4de46428435ccc243db47eac63aa374bb97d07414d58fc5272
-
Filesize
7KB
MD56cfe17f9a3e5dc8b8fd499fd8a263157
SHA152ef5efe513694b65c05c82a3cdb99ab210bc4e7
SHA256782aca96b24585e2f0743689a2a9613cb952a2b0207151923f739b20427cebcd
SHA5126342fbbc6296fa3b4d06ef97f492f1cb5ea31a6c92cfa836142e4085632a30236b158b5e3313c9edbe25e8906e0f86b71b3a0e6f41a745ae2c2d9a693fd94e5b
-
Filesize
78KB
MD5f92307043fb6965ff433683d3a82a1da
SHA176b84ec3423c51584630521614412baa008db04a
SHA256ccda1d3b30ebfed76ed243a6cbb99fe4242be8b98d7890533893f9d7ab020afb
SHA512cc585e001686a9b42fe381378961d6468aaacf53e09ffe46f16e367f95118915026c30f617ebea23d3859d13212d5792e49c393c23bff08f556f0d176ddde9f9
-
C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\Microsoft.Office.InfoPath.xml
Filesize249KB
MD564e27c5307bdf2ca2ee40be275063207
SHA19df0cc8eec9dd194b70720432ead7702fe147f6f
SHA25603d0d977e12d799bb7d9a61f7f8ccdf151428d28fd5ea565025a93762fd16c33
SHA512b4000c8737d7b474aa784bfbe50bfb8beead0a12cd0f175fc7012da551d8e509f0fafced455bd8cbc26538b1184085e7d7618959877fc9f8cc31679a4530e58e
-
Filesize
78KB
MD5eec3b06c8244508bf440dbaed1a1e77b
SHA102b75241be5c31687265940f3457e653afcac79c
SHA2560c6686cc19e10eedc6ea8420d13458ff5df6d46b1923339e8c82047a999b0fa3
SHA512a90c4c6ea28f5e5d632baac0c36c8e7090ae8658ad21aaa8d222e525296074c8e97f5dc0e69d6d578f58311e692424878724cc4b1769477a45b5f9c30316ad33
-
Filesize
79KB
MD5e9923febf3cf4b4adced945d1c40b5be
SHA101e514a990a40d8deabdb2865397e3ebdb3e7357
SHA256f624a6db0f0e9c37f0f6b1af7712d87eac95aa9633b53f0c153e0b2d04f0221c
SHA512e983ad309a9a6d42ec52d168c2e43619424362e1edb861cd381e7b1ed809640297a4ee28d409d6c31ad0a1335f74de1bf46ae6a250d6b423708c09710369188f
-
Filesize
78KB
MD5b06e4ed0a7f3c409c7eeaf3c030d0da2
SHA172b5b67f2fb5477f65af1fac98457833c45799b0
SHA25634225471664b7312c1fc6231e77279f1712712aec8e91186624aa92dd21a283d
SHA512fb1af3f8b37935a6545c7bf26cd2b557a5db83a67087e162be560f9aff4088ec2569a6da704f07361281c67c3bb9f477be5bcf90017e969302c49602f3a3ffed
-
Filesize
985B
MD5cabc2b4f7bb4ea55d3b70e2abd5bece7
SHA1725a4af35737b7c7db7dc165c0774012bf40815d
SHA256a944be6805645b7ba0b94661023c0033f9917010250e02e32927020a829d0add
SHA5124de84442163ddabc9d6ab58fc7b0057d209c793a4cf0bd84971553b451f2143040cab3734f48443da7df0e85951a8ec7b4a56db1b20c279c4dcf12594b55485c
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\feature.properties
Filesize7KB
MD51e7d37dba198ea3bc69a0996fc70832e
SHA17cd5a5ce07bbfceb83efe8a5965b0861cb6a931f
SHA25697a175504f74aaddcf6f656f87bb12bd5e514480feaf965e8913b80d02a1801b
SHA5122c2824cdaf31afda3737d7c91fcb1ca19e1405aef5051f9083814319ae5859e8b2901a58c84a9d9eda20d0154dfb5323a6d6b2f19df4c89592b130f7079ac486
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\license.html
Filesize7KB
MD5e0456369f3182d5b0be8497b7b86be9e
SHA14dc4777d2e096f74636c00e1693774f131fe4425
SHA25686982f29604573cc424dd28402eeb44f1be816a024496d4c618382a44d402ef6
SHA512d2f6df36912d5645a01245c4b68845f7413789e805eb326ae76c06598dc12740821a8ce75a93aac396583d2525b1466fec2572a47e307540052dc7503c775137
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\license.html
Filesize10KB
MD540e2b8866d05e73133e01bc24561b81c
SHA1a9786a1e4d6a9427f37dd1107c326c99d412b487
SHA256f04e71744d0c4bac6f791a9afd51ddcc46f5259bf65e15a70b518bcacd383e68
SHA512eff73e76069b299a5aaff314f9f5dac8863bcfcbe87b8c94e3a1ba068d6e89ed81a896d0be96a4d24a15d1d50e7fca1f0dcb1e92163a1891a8bb6e5db408f2cd
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\license.html
Filesize10KB
MD5b9ec0e4196b5898df0ffaf7b66326840
SHA188c5a5ad75f326d5a73005b42f61abf7f14c2970
SHA256bfb27f6fe671e5598a190367973688a321c0f24fc341cd32b07d3e4d9aefacfe
SHA512e446bcf9e76b15f4d26a73b43f25901e3d71d3841ca24c9c363a0adbede9a40376e245e3dc55773cd4725a248c2c2738b57677bcf1c1f3b2b571056e3c34dd05
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\license.html
Filesize10KB
MD53144710ae7c2292915a2635bd9661901
SHA1684be4c263cbdbf22e24b1ab2355de4c1a4ccfbc
SHA2560f6c381aebbcc48ad22bc411918fdc349d6a307f494c4defa76e396077b6da93
SHA5124be35450aa3f0de1896fc2151d1197d5c6a24f9edfbe5718b6454ac402dc574c2d6bd57a208e5331e4f9294b0706c15aa516d1946f62eb5884f5744f39077750
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\epl-v10.html
Filesize13KB
MD575b5917ccf5896da1ca7bda3fb592725
SHA14e1b5fd6debb0279d2395e52f47888bb52eac735
SHA2564e4b71efd95f481c43fdcc378c8fe9524a7a17f5edff1963a53b18a13e004699
SHA51243c3a75b246ae72734cd33c1cdcafd856cb031df9f4c4c4008415597fc33ba2b24d6fc73e666aabf8533c56bfe9b89b405f6b937be8672b115636743c0cd6c43
-
Filesize
604KB
MD5145cf8869b56bcdd929df4781a161239
SHA1907bf04fc6491e000fef5e1c558beb6a95c76108
SHA256a780f6e1ba0f160df079ed9337eb5a3ad1edb60ecd8a0c7f6394aa538ddb3595
SHA5124c8e127b9700ecab4c783534ecb4004b5ee6efef91c612c5f9dd7406dc8f5ad1ce9e88a2fa0d702f5455dce2c5b947d50c287fc0ac0db37e6502cd061f992a8f
-
Filesize
606KB
MD536fcad8cb0b560427b57446ce2ecafeb
SHA19bdfc1c63bc664b61202b6a8fb262bcb1bb40954
SHA25632788022b12855a37240a452b084b57396c89fabc28f37ae705e6841b3f4d90d
SHA512dfb14cf11577d2713788b69d24e72c468c2622b516f101fe4d06750653e7b1ff182ca81ff10f76e1abf26d5aa32080f35d0913a37c583b6f1f398ee62ebd7060
-
Filesize
785KB
MD5abc638d4bb511f9183cdd9a8b8fca167
SHA1e2c3c5480c4a2bd953441904e036ab31095b447b
SHA2560d517296102880454b1b8fa644acd190271abb29c8864d7c901aeb99e365ce86
SHA512166b42d59f2152afb5855d13427925a39ec3339259e8cfdcae3dd24f41115be44b30302576b73595fe874e8ace5b99e168bd646f4c0beb0df639b91dbe435de5
-
Filesize
587KB
MD5e3b58f9beb6835344eb1c8a9d637cc30
SHA1f64baf7404917a90dd2771e3391c9e6c4873ed89
SHA2566c2d8d77fa2f024ff50bff5d9dec0cf9be996611e2448f744d592f85c73327e3
SHA5124963a0b65bc0cf43bd2d9bd52b9fcca1f915c19547716d30f183b57188432d6d226ffda29d6c9e66b0dce05c31d1acc901680545085645beed4c5747214f01a4
-
Filesize
528KB
MD5a4aafb7bc2cc5f061b233edad11b16d5
SHA1b9fc29a01534e5cab0c1af153854a88f5d111c97
SHA256579f504c2cb51c081f06f52a98056c821827cc3b9ce6ad4aa1c18daf19e042cb
SHA51249f1cc77252e49723a968dafbeec16584d8eaa24fe73c1151addb785a776f3c47ea9660af346978278efd5d6e046948ade16f5319d4755c2d24f7c41bbe81758
-
Filesize
764KB
MD5855c0f7f44afaa2911120c451ee82e03
SHA15b63e10659acff6a660271b6094f69b92fbdb799
SHA2569ad74856ace369ba8223a66ad2eb3f4f51ba9a077e5d406107364a9acad37d2f
SHA51277331c8688e637283d0dac6c9c7c1a3f505d749892afd8a887e77e2db2d8577fe787a311a5bdda4d28088214ee5b0031b4dcd2e44d119722a95f84ff0e846143
-
Filesize
771KB
MD5607e96a2c62b7a2bff78705db08e1b9e
SHA15adb791e5f4f9cd44a59e0411e4be5c9ea40a6d8
SHA256c190217050613f2fdf45bd4f99e1d643b4d060a22a56cbe0feeb3e178a0a549e
SHA51207b1b28352836f64487a5c397b00b118fbb33cf563e8512fe2b6109c2c1b11d37ec374a93c4ffbf472eed280b03ad15987d3254dd68f479f4974ab14bfc4f242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
Filesize2KB
MD5793f91b724d85cfbee31286611d24276
SHA17ea041859f49b0ddbe169ba8cfae7a012566e901
SHA2561670d1c6d9364e85bbcc0fed25ee15d08f776ff0cda2faa922d2332bbdefe8e2
SHA5121a2a569ea31e129b74d72c88a82c4fababbaf1594035587be2c4605635cbe5b208ee8cc5320ff14b9381861be6eba06423c928bc097c9fd7ef6278bb9b4feec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_3F2A9DB42365395CA97CFD2FA38D17E4
Filesize472B
MD528441017ed2172f154d6a0eb6ee6cd87
SHA1b2a96dc105d2603b76c8a06da371fe207f44ada7
SHA2560eb597a1106d9f406c3a235763137119b0c2ecbf4c5ed4776b38742f85cddcb0
SHA51269f5ad19f1104a9d2918ba113e49bd27f9047a9c5a9300a06dcfbeb76e6cc5161cf53225816d6df1b4b3b680e86e9eb0ad1791189dfd0f1a351250924b6d3923
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5a26045c60badc3ea12344117b7bc4403
SHA1e042d0cb3844ca44869d5e01a2e427144b458556
SHA25669872c2a3c0bdca24598431943ea06f46d2a28bee615698ae09ba335b1cfa925
SHA5127b0e7562480066d929e4dce2201ced8be9e7d309d28ada04d7779a9ab232ee4bf5a8ba89317865eb382250f8f529c0c0b95d8eb80cff800e595280f2f395d7bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
Filesize484B
MD546624caee61558f0596199b32b0cb621
SHA1551465238fb25c2f5ccecf3672306c49092a97f2
SHA2566c98a29a570e53abcf8dc9766c18ea4376d45f5ad3a88f25354660dcf5edf2cf
SHA512b805a516163affdafb8e638ddc1e3e02eb65b77c959ee7d90e6192c619733d9af46a7135c052f12de7934f08a76c164345bb5dbbbf05b494652412d12d278ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_3F2A9DB42365395CA97CFD2FA38D17E4
Filesize488B
MD5f0e083b42d3075648f0cfb9b46ad7d9c
SHA11f4b2b769bbc1b849fc467fa01780243528d0e0e
SHA256f24bc2d71eb3204db606f228f89a80fd0617b7bd7c403073e5f7039d1dbcd6c7
SHA51267367f272a69b6558af8c2964606d762c0026d7c05b614613f0814c27a94106261e6a20815a6090d50b4552b642644cda0948b5a616bb7b5c384f1e4364b10e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5010f6bf1627e9c9e934c495b53565217
SHA1e5d7b41ad620241f720a289a749795ce73d12a8a
SHA25681b60104ce25e8288f21e2258734d69e0a93f444328a475f2c25f6ce3c1caf69
SHA512b1f2a23892c6d418c156b2f7d83b045ff0eda0cf5bd035b8b8666ecffd3111000b050f3a77781794d930818516360d0efda2d1d84bb979cc9a6c12437a153e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec97757d1c90ec45888a24eb08534edd
SHA174ffdf8cf0f1e8719a4037fffb9e54025b6b2194
SHA256a6c255d77a737eb647015c4d59efc2ded570746e315eaee7d3c7ebaaabcac16c
SHA512c391eaf8f4e6e0ebd543512c0d39ee2573e07d31a0ffd717072f0dededd86f2823c694c75bad903b4371943442dc58639afa0db299fda5ffa88bda3da88c6c08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5812f672efa2a11ee461123fa752adb50
SHA151dfbbf813ec8b73f00c37642824d100ea77e541
SHA2566db01184c73d20d2bf3db27b075ff3e2fc8b5321ba8938fc7d76eeb4767ca0fb
SHA5126a3b2d7016169817aa91ca4935246de5721008796a13c24787532e114c4920848ee0e7d2ec8ef5f2c791e0545647104eacf01b212e3c58e08cc482ea8daeffdd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\6RVSG4S9.htm
Filesize18KB
MD546e7f28a55cdab07533424725a04b9e5
SHA148a915fe8958b0882f364b1e0ceb37e7b7948319
SHA256e40cc25f9a709e182c284705b0b50b448deb4b1b81b456a633638003db77068b
SHA512717be51be74aa8b36d714f35942d40c8c18bea13a49d293681e16f1b10dfbdf3887a887ca40688348eee38b10ec80c96a17c338378c315c70d4abebfd42e9076
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\VUQRYZIG.htm
Filesize190B
MD56ebbeb8c70d5f8ffc3fb501950468594
SHA1c06e60a316e48f5c35d39bcf7ed7e6254957ac9e
SHA256a563426e24d132cd87b70d9cb5cd3d57c2e1428873a3f3eb94649cf42e37b6a1
SHA51275cfab1c9f5a05c892cf3b564aed06d351c6dc40048faea03ae163154ff7635252817d66b72a6ef51c4f895eebf7728f302df51148acce2a0c285502bf13652c
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
147KB
MD5421413bdfdd596cf831c28d8d741c641
SHA1ed7d3b766e1a3ba8989d151fee86bbaebd9b2df3
SHA256e5dd81b2d2f787f5c68df214bd846439dd7f9ee8fd8b0b2d61aaa1572534a6e7
SHA512c07a08e2183bdb178cbb7edc6e3c3d944e5de634527e48868299a4ef01b7bee4eebb4f342a861093a8a00cec93f38fd2de08e605127c8512b678e474d6fca321
-
Filesize
301KB
MD536ddaa3708c97d121f7ef2cc894c5130
SHA1e4d7a7500f4207df9988ceffd1cf4e51aa3f7be7
SHA2560387fb4a309790f9c856375453645d4524cb08ec018c0f36f85a9cbc937ea574
SHA512d027191226e314be77ce2c6faa11a1bb5a5a2405d93a4d0c256a2fafb540c45e756c1a62ca05227d2ab80c56e8bc0a91143c3878f8ddb544076437a1c04d50ba
-
Filesize
217KB
MD5d9b74d4fa696a7c6b201bfd0c8669dbd
SHA1d100fda3d962d746fb6902f43e5e921bc049ca40
SHA2565b1f6e6be6f3e8ab26d60b815ce31716c90d71dfcb858683c27bf090c5b15fd6
SHA5127ae60f4ffbf316432738f78f43b03474e5b7fd1af3ee5b7e7370a748c50257fe5e15c2e4166215c03f75015268fb25a9162ff724a0af35af7c245c425d076fb0
-
Filesize
398KB
MD560ac932f09a732ac0efef0e82e80b21e
SHA1e93319a8a4d62f59025302ebfa1ac68c9e4733cd
SHA2564a8f9b746b3cf0e405997d194ffc087b4d31b4b797ddbff9de48ba7f47b60763
SHA51222dab0c3588fe0e9d4b62f5a68eb37f2ab7627430b0d3c1befae577db2e8f214367945e448631ee58a997cafdb4b1e33dc58285f48e55f2d5fa568e19a451b05
-
Filesize
273KB
MD58ea8a04cf4b61547b99c20cb2ddf26fd
SHA169eef68adda82debd77d1e0fedeae75898e94caa
SHA2563378edc196cb3b8b71f2f366036c370e658ebb1560fdccc569f45d053682f936
SHA512f5058f189c62f485504b05d1e0f09851b110c7031bb0741dc82ee8effb06c89de6fc7f5ea05da4738b9a1ad2d823865287535122dd0939678694968a22ff88cc
-
Filesize
342KB
MD5605fa80461f434f747cbc79daf2acb04
SHA12e0fd48b9c1554310fa7639fff3b301b0cb04277
SHA256b741cbed5198c46820958548582ddab51ca2760834663059b7c07db58ffe437e
SHA5124a40fea852f53208ebd1bfa6da3ad1c2b80eef3923f988662055b96dac2d4aec0428441c0d57cb70fdd1823a02636cb9310623c1e7267772560f88279722094a
-
Filesize
175KB
MD5fcf93c6f69168c8bb40d9a754effb2bd
SHA1e6a0d0c0b92be76aa4d3ac17dddaf00a906a69d4
SHA256ac87274eb59cc186a417dda6b8174b5cf14945cd66eba868213e23ed0d6b7740
SHA512e67cb4770622fd6862b2d94f0010cd69892a5225477d95096dbdc0e016580b908298231b097d6b800a22eee8ccdbf7e2abbc3c4ec1005644f1233c140b30bc57
-
Filesize
573KB
MD5f328ccea0513ccae1db936168b0c7f70
SHA1f7c5a501f9ca5ede50a4036d27ed38af49d1f7db
SHA256736fcea58cc09daabbf697ccf64e15b8f50db08f6b3d0f5162cbeb9f51ec8079
SHA51288d379f76fb16d7f95f4f1c5803b02b3a953f714587388621456fc200197115e6c5da9e226f8e58859a55b237552cb36e167c25ceef87b9dd228f0956b71bb5c
-
Filesize
231KB
MD52dcb59fbccfae35ef72c452d6ef3a2fb
SHA160141c17774d89bbd3487b2ef54498ab60f00233
SHA256a6024fcb4283fdce80799a83827237e0649b324b37fa73664cc8e61055871043
SHA512176fe28a4207b47ebfa6fae980dd491799bebf00c282803e97f7e1a270667bdc255225bf9c2212d345180c433d21c110f695ac75d5af22a25ed523a84f5f4f58
-
Filesize
370KB
MD5da9483f772845ee98a74032d81696f6c
SHA16e1958ca44402afa915c0993692f334298b67890
SHA256a2af380c6dfbd114a1f8bd84a31ac257ce21e67222586771d1034c3b49737eef
SHA5127be3b75eac251aaa0c71f95925b88cd786b256e7476613828bfa28ff9a83336d7dd82e78f9dc41b7eb78c10c17a9cec0cf85fba816dafcce7a6c08f36b405302
-
Filesize
356KB
MD5a597f70d3046b1b8b6bb2f4356de1120
SHA1d2befde1f7615d6675552efc3750014b7b026fd2
SHA256716af6894e7f1b09717bf2fbb700bd32e584da1a9fd266d32b4fed58cc8be51f
SHA5124d24439004ff54572c53a76e5e155bef2c0b4d7d649d309607fcf0a8cebe7f38f38ca32ddcbda2e8660a33ddb708243bb87187943564be82ebf0e5900d1e985b
-
Filesize
161KB
MD54c0e929e132075bab8357a56daa5f568
SHA11cbd754db5e6f29cecd7e10301250364dca42f8c
SHA2561c6a4f37044b80cd158e396a15700fb750cfeffaf80207d5749588b4b0dbf025
SHA51286e2d40bae4ba3817cb7a0f2e742ccb90c6745dc70e17c79893737635e271d770205825967f3df8d4283a3807a82d1cca9d9bb132b9d1dca4534d7c424d53fbd
-
Filesize
412KB
MD5361b5a1c059bd905378abab5630c7130
SHA140a9721b5a51569a3f73b4fe174fd7fd877c68a5
SHA256535e6e7719e46c95d67544c55efc39c57157ba7ce503f5fac1f167041a3117b1
SHA512019cba4939bca2693ab91af44e2099ea09b3c927e1734d3b95cdf859a901111bbb7e5111bf707034a6c90f1be88e0ad0fe2214c70b25e0e3f5c3fb7acd09ae9d
-
Filesize
315KB
MD5b5ed216b6ec4a33c28bc1d4578b0bcc3
SHA1791b7beeba66e52692af5aa7dccb3b68c909c112
SHA256d3d61e0fbe45bb8a7a06025976aff8a504229180a3bedd24e02ef551b4388095
SHA512bfa8bad42bd6020b104373b5aacb47aab2e2e76b580d5f5a0728a2f7f688148f0f1789ebe0e855735fe856d301c95058628479fdc8a1d20d966e8a568c533903
-
Filesize
245KB
MD5e83e09088179cfeab9219850ba2cf436
SHA10d3e6b3b43c10e36dc30a1665cd9112c4af4fc30
SHA256de6a33043128fdf9a0384f1a326ee881812fdbcea4c156fe70de9386e9109172
SHA5122ca98b5523703a5cfefc80e7c984541b5f4a2c3cc4161da255e90a2ffe7dd07a18f3e7ab9ff7b51ea517a7ba8f56d254e99e9fa1f97e0ac20b27d480b0510101
-
Filesize
259KB
MD5e50500cd84b2ac38a31720fd50dfc826
SHA1aa487655d310514a66c4f8d70e293ce572881e50
SHA256cf6eb278265161b867d4d4d59a47d79f90832577f2b4f9f63e874c4c49d78732
SHA5129fb37a00d639f3bd0211f20c5ff3f000ab0901802925e890d46d7816b67021b7c8c593bc111fec1153057e53df943476d3842543b5964099d7b588f151cfa502
-
Filesize
287KB
MD54c675b79e3aab04374e42c2131d67ee9
SHA1eb9a0ce4e3c25a59cb947346811ede132467d7b5
SHA2567843a48140b8a6a9138e7cd4793c1ad8480026906d771f90f4e5a92829018e91
SHA512646622d69c4ddf22210eb94c1b88a102c49840b26e6c60e7314fd1c7565957a9cb0477c272b38ea868f2c7c5c6684e47751ed548710f034608004afc3a1982b4
-
Filesize
189KB
MD5012cb4a4859f73538fd39f0f505ce68b
SHA16366c632fe63899130559f76e4e883d6262b2763
SHA2567b8a750fe0544a8c86a747819d38658c5ce822fb46bb500f1d9018ade5994211
SHA51241fb9478a57c91311a87a1cd616877f7e6629a91931f48c24a0dd4a2253579f242ce95f3986b1a5f4bacbeb43340ce7f7b622987c5c28b5f0f247f923a491bfc
-
Filesize
384KB
MD56b10c4a7278b6eab590f9db98c590937
SHA1c0ea3c78c3ef639c5299b3f001d0d82d384b8b08
SHA2564a799cece7a56ed3531a718a07d4a540cfbdc1d62e27605aff1b905bbded4203
SHA5123df2a60978b93262b7ff97fafb7be311ebe2a9bc2db6f7df4bf89b0a1b14ddd96502f17be981610674e1f44294dafcad8d5aed703cc16d4cf13ce0aa078a5dd4
-
Filesize
329KB
MD56c7e90e43dc4b1f7ae60d0426c266df6
SHA1c6c8e0e1d8f94045216b048529e81d6c66b94733
SHA2560720f0cbca5a94d77006dd9cd16052589cd2e3b4a66ee89e29d5c7f7bfebcd53
SHA512c864c7ccabe8b843d2786fbc1d1cdd205a2cb3969d0690b515ebacc9d32d03881c2379566ddf214d45feda2e682693e8911279ecb753f463205feb6285c390e8
-
Filesize
203KB
MD5ff441941a782ac6bb58aad344c09fb8e
SHA1f3cbb1a1cb2de58bf9a8dea49d72586c2784b62a
SHA2567458a2b88c28dda560821eddf74738205144cbc41ba7bc0234739d3c4a0fa2fe
SHA512b837ed2293dcaa0f5cd799c38ecf6fe8cf55f990f94c7aa08e09491ddb25af179aa1053f0b4e0e1340d6b42167b99291bdd0fc9304f0d129d0d033f299462d9a
-
Filesize
82KB
MD5331eedabceccd8bf596475ffd8115a70
SHA11bef87af4288ef1a902f545feebf50a19c17e6f9
SHA2566a962081870ed91c5ba420bb98ce0f9d712bb68420b0091a4ef8bf0ad8b98a52
SHA512650f82e998f2a7dfad4b20821b6d9313acd76b376316a2a034b075657ef40ce5be48cf4c1b13ff6b5409238bd42138ef721df96c89f82bc67e37a3efb550d5db
-
Filesize
211KB
MD5f42abb7569dbc2ff5faa7e078cb71476
SHA104530a6165fc29ab536bab1be16f6b87c46288e6
SHA256516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd
SHA5123277534a02435538e144dea3476416e1d9117fcddef3dcb4379b82f33516c3e87767c3b0d2b880e61a3d803b583c96d772a0bdeecbfc109fe66444e9b29216af