Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
Stormshot.PC.V1.0_dde77ad87c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Stormshot.PC.V1.0_dde77ad87c.exe
Resource
win10v2004-20240802-en
General
-
Target
Stormshot.PC.V1.0_dde77ad87c.exe
-
Size
2.8MB
-
MD5
6aae47cbaa4c56095a1eb0422c1d2ecb
-
SHA1
34e29d1801d270a2bd7ac02d4ea84c14c553d66f
-
SHA256
ffd63fe2aeaa91f05bef47b3583290ccdba3f44912ab8b67044f3d58bf817ebf
-
SHA512
d6b2406922d2618816db55110bf12a8579b69325e0c196d0d2508bafec68a0430acf48482160bf42cca4bd0995d864abfa2425e8e5af794c8d8d1c430fee4cff
-
SSDEEP
49152:c8ZQVqWu+fqu79LNTRBO1L2VQjJY80KruthaPVu+2zE0y5VCmdAlacRk3Y:vZARtBEqVQq80ThzTzEElask3Y
Malware Config
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo Stormshot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest Stormshot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse Stormshot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService Stormshot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF Stormshot.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ Stormshot.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ Stormshot.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Stormshot.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Stormshot.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools Stormshot.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Stormshot.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Stormshot.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Stormshot.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wine Stormshot.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\st_global = "F:\\FunPlus\\Stormshot\\Launcher.exe" PC-Launcher.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: st_dde77ad87c.exe File opened (read-only) \??\D: PC-Launcher.exe File opened (read-only) \??\F: PC-Launcher.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Stormshot.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation TQMCenter_64.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN Stormshot.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer Stormshot.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName Stormshot.exe -
Executes dropped EXE 7 IoCs
pid Process 4556 st_dde77ad87c.exe 1500 Launcher.exe 3848 PC-Launcher.exe 1068 7za.exe 1076 Stormshot.exe 4824 UnityCrashHandler64.exe 2996 TQMCenter_64.exe -
Loads dropped DLL 47 IoCs
pid Process 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 2996 TQMCenter_64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language st_dde77ad87c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PC-Launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 Stormshot.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID Stormshot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 Stormshot.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID Stormshot.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Stormshot.PC.V1.0_dde77ad87c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Stormshot.PC.V1.0_dde77ad87c.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 PC-Launcher.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 PC-Launcher.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ PC-Launcher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString PC-Launcher.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Stormshot.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ Stormshot.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Stormshot.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funplus.st\DefaultIcon\ = "F:\\FunPlus\\Stormshot\\Launcher.exe" Launcher.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funplus.st\shell Launcher.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funplus.st\shell\open Launcher.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funplus.st\shell\open\command\ = "F:\\FunPlus\\Stormshot\\Launcher.exe %1" Launcher.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funplus.st\DefaultIcon Launcher.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funplus.st Launcher.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funplus.st\ = "URL:funplus.st Protocol" Launcher.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funplus.st\URL Protocol Launcher.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funplus.st\shell\open\command Launcher.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A PC-Launcher.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 PC-Launcher.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 PC-Launcher.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3848 PC-Launcher.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2264 Stormshot.PC.V1.0_dde77ad87c.exe 2264 Stormshot.PC.V1.0_dde77ad87c.exe 4556 st_dde77ad87c.exe 4556 st_dde77ad87c.exe 4556 st_dde77ad87c.exe 4556 st_dde77ad87c.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe 1076 Stormshot.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3848 PC-Launcher.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeRestorePrivilege 1068 7za.exe Token: 35 1068 7za.exe Token: SeSecurityPrivilege 1068 7za.exe Token: SeSecurityPrivilege 1068 7za.exe Token: 33 2336 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2336 AUDIODG.EXE Token: SeShutdownPrivilege 1076 Stormshot.exe Token: SeCreatePagefilePrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 2996 TQMCenter_64.exe Token: SeDebugPrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 1076 Stormshot.exe Token: SeDebugPrivilege 1076 Stormshot.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe 3848 PC-Launcher.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3848 PC-Launcher.exe 3848 PC-Launcher.exe 1076 Stormshot.exe 1076 Stormshot.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2264 wrote to memory of 4556 2264 Stormshot.PC.V1.0_dde77ad87c.exe 89 PID 2264 wrote to memory of 4556 2264 Stormshot.PC.V1.0_dde77ad87c.exe 89 PID 2264 wrote to memory of 4556 2264 Stormshot.PC.V1.0_dde77ad87c.exe 89 PID 4556 wrote to memory of 1500 4556 st_dde77ad87c.exe 90 PID 4556 wrote to memory of 1500 4556 st_dde77ad87c.exe 90 PID 4556 wrote to memory of 1500 4556 st_dde77ad87c.exe 90 PID 1500 wrote to memory of 3848 1500 Launcher.exe 91 PID 1500 wrote to memory of 3848 1500 Launcher.exe 91 PID 1500 wrote to memory of 3848 1500 Launcher.exe 91 PID 3848 wrote to memory of 1068 3848 PC-Launcher.exe 96 PID 3848 wrote to memory of 1068 3848 PC-Launcher.exe 96 PID 3848 wrote to memory of 1068 3848 PC-Launcher.exe 96 PID 3848 wrote to memory of 1076 3848 PC-Launcher.exe 98 PID 3848 wrote to memory of 1076 3848 PC-Launcher.exe 98 PID 1076 wrote to memory of 4824 1076 Stormshot.exe 99 PID 1076 wrote to memory of 4824 1076 Stormshot.exe 99 PID 1076 wrote to memory of 2996 1076 Stormshot.exe 101 PID 1076 wrote to memory of 2996 1076 Stormshot.exe 101 PID 2996 wrote to memory of 3984 2996 TQMCenter_64.exe 102 PID 2996 wrote to memory of 3984 2996 TQMCenter_64.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stormshot.PC.V1.0_dde77ad87c.exe"C:\Users\Admin\AppData\Local\Temp\Stormshot.PC.V1.0_dde77ad87c.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\st_dde77ad87c.exeC:\Users\Admin\AppData\Local\Temp\st_dde77ad87c.exe2⤵
- Enumerates connected drives
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4556 -
F:\FunPlus\Stormshot\Launcher.exe"F:\FunPlus\Stormshot\Launcher.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1500 -
F:\FunPlus\Stormshot\1.0.0.77\PC-Launcher.exe"F:\FunPlus\Stormshot\1.0.0.77\PC-Launcher.exe" --currentPath="F:\FunPlus\Stormshot" --configVersion=1.0.0.77 --launchExe="F:\FunPlus\Stormshot\Launcher.exe"4⤵
- Adds Run key to start application
- Enumerates connected drives
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3848 -
F:\FunPlus\Stormshot\Plugin\7z.21.07\7za.exeF:\FunPlus\Stormshot\Plugin\7z.21.07\7za.exe x -aoa -bsp2 -bse1 -bso0 F:/FunPlus/Stormshot/download/ngame/st_global_3.23.0_2f838baa3e5237f9c1e7a11d6f9b8be6.7z -oF:/FunPlus/Stormshot/nGame/3.23.05⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
F:\FunPlus\Stormshot\nGame\3.23.0\Stormshot.exe"F:/FunPlus/Stormshot/nGame/3.23.0\Stormshot.exe" --index=0 --gameid=22025⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
F:\FunPlus\Stormshot\nGame\3.23.0\UnityCrashHandler64.exe"F:\FunPlus\Stormshot\nGame\3.23.0\UnityCrashHandler64.exe" --attach 1076 25038013767686⤵
- Executes dropped EXE
PID:4824
-
-
F:\FunPlus\Stormshot\nGame\3.23.0\tqm64\TQMCenter_64.exe"F:\FunPlus\Stormshot\nGame\3.23.0\tqm64\TQMCenter_64.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c rmdir /s /q "F:\FunPlus\Stormshot\nGame\3.23.0\tqm64\stm\"7⤵PID:3984
-
-
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3c8 0x2ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2336
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5d21a736a7bf9eda1ae8c46ac5a6fa260
SHA196ead8e08305736e69815ebb5ea772aaade25a3f
SHA2562d79e27cfa6dfecd595fd5dda0a401ad7806762e46214f442e045ed06f744c7b
SHA5123f2ec06ae593c27b67d632902f5f07ce922b573fc4ae22c844063ab38cc7b1bb5d9875faeae86257328f029e671bf8e45458f772e50bcb5ef032712e43c84a17
-
Filesize
38.2MB
MD5022835772d21b81e66e42ce52b8a7292
SHA185f22e3aa49a458120a0887dba3b1832c2aeb3d8
SHA256daa5a8f3d9941c0aa2c95848d623e75f4fbd9cbe484a3ea7f3249140879482b9
SHA51212c5b5f296563b84e8bd885fca3567d4f20972ad66be4000e6ba77289a174bdfb979458643e646586248e3eeb56243d000d79bfcb9898f27df0537a01feaf191
-
Filesize
8.9MB
MD54610981b68a8f7532ccd9dbcf2a1c595
SHA10c83819642a7823c39afb2b6b520dd8a55fe8bc0
SHA256d163b72dafaa6b935cada2f5e0a0f87c9581b747366b1855a285acec2f4b8ab2
SHA512416269b24b2fa28bd88d3c7e392d32a218873a8babdb05e572524e54f16dd1346f46cece89f0398e3022155f266603a43bc4f96e44327c5e973962d1da27c6d6
-
Filesize
5.2MB
MD5ccb1f269d09dae974fe338ac807966f0
SHA15bbc886073b68ac54c28e5cd2f81392b532e5c55
SHA2561cd06fffc17269a864fec6ec8f47bbf8af3f5d1cfa391f173ae63da4c7a7b498
SHA5122e82eebae0b9c4c7f7168aa89082d51e45c8622ad831c13b1a2219ba22db50dcff9e4846642dbfe8103f18bc8277d35753494be7aaa3791929975d135345f4b8
-
Filesize
5.7MB
MD500375b48f58242be0aeb9fea5db47a34
SHA1f5ff390642cf75f562aa43e5041b3ecaeae19e8e
SHA256b5d8b8997a484f342739e15689b4a29389c1cd99e61d8a2ab208bc5644c1d8a8
SHA5123aa570d2395019bea0be84523a1c81f9a8bc8ae984066f478aa7ff967fbc241f150bc23b0d9bd727a960b0799d84e1d36d46a7bd8e5ff95b60b24a4cc92130b0
-
Filesize
1.0MB
MD56ac9a28a6fbc7f48e7504f34b5480797
SHA1348d596e4566cc99cb7b78ba4e9076ba9d8a1d38
SHA256fc6179c80db2afb79f67b2f0e39ed1739717129ae30b8b81c6155f17ba83c576
SHA512a3a5da0bce62d5ec48563b93e4faf59e89162afa8f5c01ae23198490b9b202251baa550582d84d83e51187b93ca77b7bb7a3c3ec07950b283f49e16beb6f077a
-
Filesize
2.9MB
MD52247c7ba00ffd5fb0b8bed697e7e7ab3
SHA10977e47d8efb192fd2a05c845e5633109858ea0d
SHA25661bc4ed1824d6c1327d298a7a788d7ce3d8a2e64dd9e7955fd08088920890642
SHA5122331e1d1dfb71f1482efd1d5ba4c71e67ca84570e089a020d4cfc9341dc3053bd79a39448ad952b53f9055ca49cbbbd6b0f1d071f96ca5b16a3e3d7fa585949c
-
Filesize
349KB
MD5b79193c4770635dbc6d578d4bc24142a
SHA183aea1916910f865449a2db90a68e9c1cfd22a1f
SHA256e488c6ae94e9610f8df22a97732c918f3261c32a897c3c357e6fc8995e94810b
SHA51237f362fe14dfebacf32cea643a59a059f6e6116c6986516c98681b0314290894c9cfc7571d7ce04dbeab93aad5a869eb7ff586a88f7b30606e1ce05a6cd94a46
-
Filesize
3.4MB
MD5474a9e2de31376e21bce06d9cacef668
SHA1c3ee8d3008d1daa6cce23d1261ea3f7bf4ab5308
SHA25682156019afb320612a4b48243b05c7c8477770c83b23af836c7c99563fa26786
SHA5125c894e47ff3853f1d692e3ab8f773ed70161cb05e497b8cc9412a060366dd7ddb4bc01939671d5ad6853d83c4a7641625d0b4f6eacf40d34401e3f12269773df
-
Filesize
72KB
MD5a2075c10b993bccd74523823d362a727
SHA1e2f324e0f29bfa2b4016649aacecb71074e7a835
SHA2562f3f0142e9b82e5c6d4f84c04578255a957981ee14ac96d76f5b93f0ca1c6769
SHA5122dfd91deb83fa0ba2115ec8c03cd20515063fcf69a6919e5fa023672251d519664d33e8662670625745f85784445a559133c03a10bc7986859221045bbd07216
-
Filesize
264KB
MD537265e6e2e85b59f9cc85c9b8fba9074
SHA1f1db159aeb042fc9aa2d017e67a0a384ee9e5382
SHA256f4453045b5bb77f14ab3ff2e7a05d6aa49681f3120851ccfb8e33660cd2662da
SHA512ef9de075a05defcd6812bff34f4d7cbbeb9d7c39d17c213ab120b93410b43415be8bbfab78a4c911ffd2e4361df9efcc9e4b21fd725e8e67e49a87f6764a7579
-
Filesize
125KB
MD5aaeac5122ab6a42e8b186ea771a72cc7
SHA126194f8d020d332990f33883294eb51bb8472bea
SHA25641da80ee11c6d9caffa0ec863e61faf665c0ab3fea5add6febf131d2ad45071e
SHA512f38b8c176f03c47bb7ed7942edfbcff7be20b1e796c5fa62a4fec2e3c7b664de06989699cd50be9c1cbae3501a9ac854870030576f5a4a8cc1cabf19bd73cf21
-
Filesize
4.3MB
MD5a372a06ef5d5dfaeca77e54597585e03
SHA1035c5bc89dd0fbe93ce411ebcb808c5fb50cc63d
SHA25614230cbb6fcabd799c0269723c0f77dc46d4b89789b3d8eba0920ea217548c5a
SHA512e68a5df0a1a70f0a11127d071dc528dec43a0d7e34ae568b282f3ed888a674b8ae0c80c0714d7f04fdc4a2fe4e820ae4629bf3429be7ab606784d9107b9f8604
-
Filesize
6.6MB
MD58082299bc394324885eaadaa880c37f6
SHA14512b2441622d56089b12273feeb5ab466391639
SHA25687434863f2a2f89b672adab0d2ba791fc01ba474b7a6ebbf20b85ae761f6a1c1
SHA51291389a1b1fd2dd2743d88fb666e1a9d855ab3b73c75215be044daeb001a7dc744a82f3ced013e8def4d8449cd0612ebddd26cc04b555e1d3343773bdc747a10b
-
Filesize
40KB
MD534732c85bc4f9bb4a4a2297a0aa20aad
SHA17e8d22f248e8d23b208807df1c86db99435afe49
SHA25679e48711e6bdd497e9efc7c423f34f30d742db0aa04c0febd3b214004526a818
SHA5123cb974eca119d2f521219c9f8037cd484d116a41ab3c8f2886b2219b75ff16c7accf619ba985645d1a8dc2c32c7acb10b03e3169111e786bd90a18fd69267f17
-
Filesize
38KB
MD56f1b578054aadf5e184d9153a0537364
SHA1136c349a97957f406e45a60247fc1d2bd4296294
SHA256c0964a239ba5b0b5262ac6ed36d41ba4b8c466d5e8cfc8577f8a061197e6272d
SHA51228cc8d72e524dfbebc6ae35c150f874c082652cc6bc1d99712d0211219e893d63dfefeed8981dd2ed1097cf217d852c50845355d39691045bf19d53fa171750c
-
Filesize
42KB
MD53e887a30afb41edefc0651eed9478942
SHA15c132f72c3fb02497d565bfe066d1813e4d1e668
SHA256af8a95934fddaee350425a26206b732567d6f47e52b33853447382e553df1916
SHA512e9319e42349b491c9afb0ca72a1696f8af15e2b4bc9db0667057fecfd8b4fc7166c7ac4a0d764cd036c0784b5731b881a3da58d0914469b6e5495168172f8a48
-
Filesize
36KB
MD53f7d35e556b2223286a9c70869192b20
SHA15e520e616170b4efd7f37f1f083b8c1613eedf8e
SHA256004e88375bdf797c20a1fb83bcc461882155c3ce0bc51ef9f99f89beea11858b
SHA5122158f0851cb08160e57aaba56e7eb7c6cf9d4e2e8104e2a458b23e8f11b468f1ce8950f45b1c85a777aade8c1ab3b53ba80eda4b101bd0689356d736294d8b18
-
Filesize
385KB
MD57adbe963467564d0e33335f9208209ab
SHA19773b6f12728e3e7b388972b5e44bcdbc5eb6d0b
SHA256dfe1df3c8e7dec4a2e754f48012ccc18baa59b1332fa908a4cc34d09f260d010
SHA51238f7e3bb4af8ac34abb779f2fbb64c9f96e9070de6385b2cfb381261ea863705d19ae9cb4a975f14f4b0fa62e9a47e1c3a21dccacd89989edc991f7b04b78d8d
-
Filesize
33KB
MD56ec14154abfab839695ba85ba1d0d675
SHA17a6b116c5cb09fc6b2d48c0923395baddd7bbbc5
SHA2567e05e808865b8633ff507482beefee9da290dbe5741bf12f0dae9eaf6faa0fdf
SHA512e4bcc00221d9b3b9f1efb73e2e95c8c3fc906dc386cda4a3b486936cf62d2679ac291a0e754456d46d972ced7d906685f7778a3227f513f8cd8d0cc2308aba26
-
Filesize
32KB
MD5891c2966d58483c0e4b98dceb37d642a
SHA1b1dbb83e021994b3ab8f3a3f5f9a7b5c7dfd9a1d
SHA256236085c82fbbe4cc9a4a96a5744916da729cdfee91e89a8b56b68b0e8b831960
SHA5121948f2bc9fe207ad2d5c2f23366ade8c27271bf6ca090e67c433c9033bde92852b5524d91d71f07a7277b18c1ecec966b0c5d6c6400dfff94c73969e2a7d0200
-
Filesize
31KB
MD5015dba45aedc50a3ee5737c6bc7c97b1
SHA144545cd8ed24081a68f4524848c716f6c00e8281
SHA2560adfc1901455be8fa9cfe420b0529c9f7a1fadcee4140ec0441256a1bb2235da
SHA51266ad7811aba986339a2bd806aca7f5f8b33d2d4140e0cea5619642a3761447a2e8ef260cf06e22daf37df5df573b77b830cec9281065b64778a0bae3b5ac8376
-
Filesize
356KB
MD56742a1c8b9687561ff37f385ac492c30
SHA15b9d8f698dc1ec47ab791225707db4af59360efc
SHA256de742e6d940061f32d2dcaedbeaab6006f55b181db16d08faa66fc6eaf1ba8c2
SHA5124eb40d887b6250951cb14f68918d3e6133367b246692b4d4eaf4c970d823d1183998280c1113e8453270dee8e94c52bb2ff36a6aed692b5bded3cefa480d64a6
-
Filesize
30KB
MD59228078a9ab4aa393a99c32b1a399e35
SHA16184f51bcfd52e3e14cdc0b595189fc7f89acdb9
SHA256e45ac8841b5cb23ce1c46c8ca23cee7002ee66c77e6a6c8fde6e3a6a9ced581e
SHA512f78aafbcc43af9ba9928619d55c1cc6ce3d996122cf9a68a31e9583317cbee31a88d62105eaf21053546b2ab5517761adf3f85e21ab444475b385fc9c52d6817
-
Filesize
409KB
MD51bd1829d0fdd041dec9d50c8c0a77e32
SHA1728afbad0fcf76395f98a46e1da06c500cdf8472
SHA256190da7505ed54ad3ad06a274e73f00f26405a043bcac86fc437549dde8070719
SHA5124dc545b03b9399c57ca01a69cff45d332fbb9da996746d8bf7fd84ec3cefcc45772a35c30a4cdd0f589ecf83910440dcbebd2b05fd7f6361f08004ebbb504eb5
-
Filesize
520KB
MD59ad86cd2cf928eec82bb877a50bed442
SHA1319ee98c31f3a142abea30ab933c78062d860765
SHA2567041e2c62651c6f1215dd0fa325ec3bb0e9dda5dc956a54e20b0089e4e1c7eec
SHA5125ccd0de6782291da7ce0460d804156123eff25a78c67c6af3daadf745b8136f31a864410c509cdf9a22fe8d80ba75888ce74320c43c200227081d2fb48a52f36
-
Filesize
425KB
MD5d4e9ae2301232a7599807ae02023187e
SHA1af68af4f51c1affd0a8c29b3e707642636374583
SHA256322af358aad037db8136623586e65fedbba3040b355f76ed34e7aa1763b2dc89
SHA5125fe2cba77f0c285c519142a71cc1e6216b4ad78077aebf1c3f23e84e4b8fcd7f9cb6363668674869e3bd2c56ffd178b2c2d51725ab38e0a2338e5dc15d7d05f8
-
Filesize
20KB
MD5ca7c343e1f6ffdacd0818b9e46ad58a5
SHA19731858d1cc5f1c1ca3bb2253df8feb9a912b8f2
SHA25687428634883461f50ef4dc812273dc8822cf608b32ef6f11bcc61223052c1ae1
SHA51213602dbd97f41dfb32f9c2cb5fcc263fd2663667374372b4414f64f0f56191419a79e74add3286524710d1b75869933cd21c8d8401ff6df6d711dd8efc8800d9
-
Filesize
1.2MB
MD5981f9dc4f537012d21aab34071896788
SHA158e0c4baf55f1908c6abf8f2b81fa5cab6a5c840
SHA256334f317e5afd0b9cf05e85ba1c241e57cc84833658c6db04595c0f1accdfe69c
SHA512d4327a401909fe8b0e9cf561c525a51fbd6e168cf6daf1513653c524b08d0fe12b9b2db588a3398ef1285e993cd3078a9d3770a676a001c61f3f358178266e5d
-
Filesize
132KB
MD5b65e3ef6042684b489d0cb2574b4d144
SHA198747aec7f187d03ee2604fca947744efcab0b99
SHA2569fd317f3da3eee0d53dc78687aad61440dfbc30a0d42169be434731e11f423bb
SHA512980a7e9a9265c275beeba3469a0e676bb68f0b18ee760b43c0b9ab9856a11cf23175d10b53532299e1f8c1f5b74aaace61352eef398b4307267812a698f0e008
-
Filesize
76KB
MD52cec885177f8e329a314f975806d0e3d
SHA1942d6525d23833ac51af1fd0cb6c18f0aacc90fa
SHA256e4989178cb90a65428bcb19b2f1d2c811ab66077b38c0645522d8669b176b99e
SHA512210d12d8912341e1625bbc603060aaf37ded1fec58fe677b0f92dd5bdc89d1629f29b50f7e95985bda6c7f316790f753dee2305d154ae94f5ee7816886e91fb1
-
Filesize
88B
MD508e0b216e53f07006cf6facb6c693d97
SHA1f17d504aed629d8d34c2c0e22c1e2768d65fbe37
SHA256e3072888d3b33afd15ad355fb5a505c5a2e6a91cc589a853caad93bcc89dde73
SHA512b1282d2a624ac7d9b3f255ce87e0475b1a6e34d1020823cc6bad9b8024cc2ef0c6495412f5a0aa7d80cf7085c2955c5fbea141e1b05b6ecd4bcb1b7e61050f25
-
Filesize
1.1MB
MD5381ec7c34c3a2b3f3e60e5baf4f7a45e
SHA12cc0d0709e0426fb4037f0045a1477f5f3532535
SHA25634bc81dad31472967339d8c6c97306f71635248f32d6e857f65142b1c737d7c3
SHA512fc99c76a685efb3fb85d39426be84035f7404102730927ccb87ee18d54aa852f7e0e2349e0b0b9d57157198600b59934953eea31c7a43465e3e0f8fd8c1166a8
-
Filesize
822KB
MD5aba4e46f75a9d3768ae26b5027a010df
SHA1ee1a6bdd029bf4431bd60d5a4a2ed77398adbdb7
SHA2568efb204d78a28e7f714b9086f7e01b56642a2980c5b646c83b15cc3adcab9163
SHA512e4ecef5a3a6cd55a62034b392eb0326c52b1661bc6debea81e86b1cd2513269fad9e2253b901e3bda8f4a3b0a2220214ef47e5e20678c1b62b29c3a44a33bdca
-
Filesize
16B
MD5973544deb07f9a9b7e1bbbe2225c8beb
SHA1b04170d262f7430e94c8476f155304f3fe98d626
SHA25637fe61bebb58563bd19268c2f3735c9157358f6918f3d34e006282a01f1b28f5
SHA5124415e7b67d64b1d805f9aa7d24e9b8c8899af5942e43e77e1bb045e6c5719c60b049c762e015952851191cf1eff345d37cd408f832ae5e88c1c9025a90ace14d
-
Filesize
1KB
MD50d831c1264b5b32a39fa347de368fe48
SHA1187dff516f9448e63ea5078190b3347922c4b3eb
SHA2568a1082057ac5681dcd4e9c227ed7fb8eb42ac1618963b5de3b65739dd77e2741
SHA5124b7549eda1f8ed2c4533d056b62ca5030445393f9c6003e5ee47301ff7f44b4bd5022b74d54f571aa890b6e4593c6eded1a881500ac5ba2a720dc0ff280300af
-
Filesize
59KB
MD5f7be9f1841ff92f9d4040aed832e0c79
SHA1b3e4b508aab3cf201c06892713b43ddb0c43b7ae
SHA256751861040b69ea63a3827507b7c8da9c7f549dc181c1c8af4b7ca78cc97d710a
SHA512380e97f7c17ee0fdf6177ed65f6e30de662a33a8a727d9f1874e9f26bd573434c3dedd655b47a21b998d32aaa72a0566df37e901fd6c618854039d5e0cbef3f5
-
Filesize
2.5MB
MD5ed95f00376f3f7ba16044ff1ad91c999
SHA1d0cdf7727ec62134157b5cc5816199d99ef5fb0f
SHA256254eb459c7e83bea40ca4017a125bf8197872f8bce96fbf21f67fded7fed5ff4
SHA5121fd42a00ed49e10372092b04fadc42a5ba6bc8a15105a2c66aa6d29f195fc713a24bd2d4a2d104636de2412cb13069f2dc7750d4224919c8d934a4a7065a4442
-
Filesize
23.9MB
MD56ff87913a1d2957485fc7c7a9517cc65
SHA149eef8c04aa2fe1fbcaaf8b1b1de68d004b272a9
SHA256b26d58761ef6db7c658dbd144d93c6489f845edb2402fd543e0ae79584eb3f46
SHA512ee98a4127b55ee7d90c7c819277fc1b9a728f7f0f1ddcfa03f7731392e2fbe16040aeff6ab7ebbea6a93450127b5ec060f28a8eee62c8ef9ede7f7176e2f8ee4
-
Filesize
64KB
MD58dbc87f6cf2f90e24242a6e12100d8a3
SHA1e174f1ebcb972e48742c3f57526ed7383c1e11b4
SHA256ad890e1ea210c6817f6ab26496423920551500106325db7c91854743a8408d16
SHA5124f642c1da50674fe9fff2892e79878aed69666fca54c7129f218cdc3ec1a80c98838894dce240cfe12671a5dd6eed0fbea361cdf4ec7feb4b56272fd2ec0652d
-
F:\FunPlus\Stormshot\nGame\3.23.0\Stormshot_Data\persistentDataPath\Language\LoadingLanguage\language_en.bin
Filesize26KB
MD5baec8ad0af6cbb819e4e5731ff057000
SHA13e04fc7c4b5cfdb07b8e8c970f6341f071e3d956
SHA256c50025e2a11762660a876c116e44c2ce13ce62d0b125dd6e96ce609f5e03b405
SHA5125a975da91cbdce9680cc4588165d937f922d7b2d01e2e0c9ac51c635c317c77c5de7a4d55d370a17d2d4a35e365a5ce4cc43d30870cc7c8255ce51423f75a0fa
-
Filesize
30KB
MD518a54ec0ff856cce888d37dc0623a564
SHA1c6a21318e31e152f5b174a38d370c62448180333
SHA256c441b6f12c52267e4c1d9e8cd433efedece1cd1a4bb63dd51ad88de5507c92c0
SHA512a3c956bd0a118eb551da222ce52ad4bd1879eea3fbf8e28a76f36c083e9e3a5cdec1e96ed41c8df07eeb55522fd0849c4b732677e3452a36aea98b500b480b74
-
Filesize
70KB
MD5c1d4625a99a48e49b146bd43a7894131
SHA16d5fe1315f10eba1d198a4d166891114c6a98eb7
SHA25681a50ce6d89398a06e7101fa3f26fc8f89fe73d044bd509c5dd115502c0f1eba
SHA51277045881fbadd09daca2b2d60ae2f65a7544f230235c8669047fca3a060265381c5a23974a42b4d13a8cff61b2792837d44a50c8408ca2875a1299b6590fe028
-
Filesize
128KB
MD5ae6340c4b63e6de090d29e5928a89873
SHA17821d1ab4f1a66a26628c6e491a7295582805cd3
SHA256a9c1f79f75d065e1fe29f2abed5bd8b165b868e1759545c8f531c16df6014f06
SHA51293b96e82b65b132157f327a50744f79e8936314741504a3a5dddc0c1e2ac2eab8fd23e8c7da05c08239cdd5262af5e6edfe8c3f7439fe7708cf77331974d383b
-
Filesize
13KB
MD5df32282a920cc95d6c002f64816a4790
SHA14a6e2f8433db7a4663405b51d6f8609a20527e2b
SHA256f78d0f6c35573ded55653e78c5a076e2d730a3833e3a28ae9049a4eea49b05c8
SHA512505917a08dd5ce9d2fcea562186d56014c38d80f6804603a7d90ddf75a99404b83b64fc55aa867415f1e63cbf35e034787da2d428787816bcadc090fb3120e39
-
F:\FunPlus\Stormshot\nGame\3.23.0\Stormshot_Data\persistentDataPath\iap_package_excitation_limited_new.json
Filesize465KB
MD50cb7affe533ef73c17312a292eaf130c
SHA1b9535c782005a805e50da46899bb2516c99bba21
SHA256a7573842de79145253dcfea4d9baa531885ed09897f00b0792f87965872702b0
SHA512ba856f3268d2a4c43ddc154339ea846a29f3a230d9ac37b7a914099f1840bf02a2c08a5f04cb174aea59d70429a66459327dc19deca50afb7c0a9397ff3ad416
-
Filesize
58B
MD525a20f52d5ea1165797f700fbc7a5035
SHA1b1450d6a12328176ccdedf047acf103ec3a68bcb
SHA256968ac3eea874d8b8634260d955aa790de42a50e1e1cacd7ea520cde55ed3368a
SHA512b0481281fa4abb70e2e44590b036885be99bdafc14db970e88aece247c1cc242179a57ac7c5382472801ac8a360fef8b3548a860ffcd7ac3e2bb28bb6f41d4ec
-
Filesize
64B
MD57b7739b4376f7fac3557843d2e04f12a
SHA1718a936fd2817877faa150623b061f80ff3daced
SHA2565398fbd52dabd01963916d2db2a5fe67ff2d4e9607a47af2bb274db3e41a3b2d
SHA5121abff3b701af0e87c9d80cd9ccb0c2753ab451cc94a8ac5523266aac9a741304aaa5848e24f9a90ae67748367e4659dbdd251b2144b7a1e59f2c51e9535001de
-
Filesize
1.6MB
MD5c209993ad5cdd4a60b545dcd705dbe90
SHA1a40493880173786a9e4492ad71bf752502a0d132
SHA256e76e215ac26f7fddb9c09aeb9f0e15659574e8d099366b7e991d55f9634f6115
SHA5125f6c0c735fa28706aac933ebbb092bd57eb378227090d0239a1bb884dd01645cff2c23c9d2cdf322c7b5ab20b2b87d61f5a086c35438f4d8c477ac7346bdaf4b