Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 19:24
Static task
static1
Behavioral task
behavioral1
Sample
bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
bf3f2215dd6e53a9b5ee3522e2fe3121
-
SHA1
cebc14da4c2d9087047ee323bc34852fc2e73360
-
SHA256
cc3c69f92b5b1bdd604f68b17f19c237df1296853cc1feb501133d8f482210bf
-
SHA512
09646384cd58e4c8f81d36f84c62e22bea4baaa59d4db9a682ac06e90217130408d487008103e47f7d03ca3f7d845a255d7e4ad161c530929280f9967907fd38
-
SSDEEP
49152:EDv2JMTIKPwtskKWbzV1lkjI+hPCNmwPBlPt/Bok9:ERj41lkjRjwPBlpek
Malware Config
Extracted
cybergate
v1.07.5
remote
sdsf1123.no-ip.biz:1338
YU8MD1VU023H08
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Engine
-
install_file
iexplore.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Modifies WinLogon for persistence 2 TTPs 23 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe,C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Engine\\iexplore.exe" 1.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 1.EXE Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Engine\\iexplore.exe" 1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 1.EXE -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{YYOYEYO6-EHCQ-G4X5-4VX2-347IT88LYLQ4} 1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{YYOYEYO6-EHCQ-G4X5-4VX2-347IT88LYLQ4}\StubPath = "C:\\Windows\\system32\\Engine\\iexplore.exe Restart" 1.EXE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{YYOYEYO6-EHCQ-G4X5-4VX2-347IT88LYLQ4} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{YYOYEYO6-EHCQ-G4X5-4VX2-347IT88LYLQ4}\StubPath = "C:\\Windows\\system32\\Engine\\iexplore.exe" explorer.exe -
Checks BIOS information in registry 2 TTPs 23 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsUpdate.exe -
Checks computer location settings 2 TTPs 23 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 1.EXE Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe -
Executes dropped EXE 46 IoCs
pid Process 3032 1.EXE 3660 WindowsUpdate.exe 536 1.EXE 3476 iexplore.exe 2104 1.EXE 3800 WindowsUpdate.exe 1424 1.EXE 2076 WindowsUpdate.exe 2016 1.EXE 3968 WindowsUpdate.exe 3116 1.EXE 2588 WindowsUpdate.exe 2360 1.EXE 4820 WindowsUpdate.exe 2000 1.EXE 4300 WindowsUpdate.exe 2000 1.EXE 4512 WindowsUpdate.exe 2036 1.EXE 1392 WindowsUpdate.exe 5092 1.EXE 3120 WindowsUpdate.exe 1328 1.EXE 1324 WindowsUpdate.exe 4500 1.EXE 2184 WindowsUpdate.exe 2804 1.EXE 3344 WindowsUpdate.exe 1604 1.EXE 1592 WindowsUpdate.exe 4460 1.EXE 4372 WindowsUpdate.exe 2628 1.EXE 548 WindowsUpdate.exe 3340 1.EXE 4876 WindowsUpdate.exe 5044 1.EXE 4816 WindowsUpdate.exe 4652 1.EXE 2236 WindowsUpdate.exe 5048 1.EXE 4204 WindowsUpdate.exe 4992 1.EXE 640 WindowsUpdate.exe 2880 1.EXE 3964 WindowsUpdate.exe -
resource yara_rule behavioral2/files/0x0009000000023382-12.dat upx behavioral2/memory/3032-16-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/3032-54-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/3032-57-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/3032-114-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/3032-186-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/3476-209-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/536-214-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2104-537-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/1424-1129-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2016-1710-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/3116-2297-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2360-2891-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2000-3475-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2000-4060-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2036-4646-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/5092-5236-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/1328-5836-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4500-6437-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2804-7033-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/1604-7625-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4460-8199-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2628-8795-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/3340-9386-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/5044-9979-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4652-10564-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/5048-11151-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4992-11757-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2880-12358-0x0000000000400000-0x0000000000458000-memory.dmp upx -
Adds Run key to start application 2 TTPs 25 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\Engine\\iexplore.exe" 1.EXE Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\Engine\\iexplore.exe" 1.EXE Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\WindowsUpdate\\WindowsUpdate.exe" WindowsUpdate.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Engine\iexplore.exe 1.EXE File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\Engine\ 1.EXE File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdate\ WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\Engine\iexplore.exe 1.EXE File created C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe WindowsUpdate.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 44 IoCs
pid Process 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe 3660 WindowsUpdate.exe 3660 WindowsUpdate.exe 3800 WindowsUpdate.exe 3800 WindowsUpdate.exe 2076 WindowsUpdate.exe 2076 WindowsUpdate.exe 3968 WindowsUpdate.exe 3968 WindowsUpdate.exe 2588 WindowsUpdate.exe 2588 WindowsUpdate.exe 4820 WindowsUpdate.exe 4820 WindowsUpdate.exe 4512 WindowsUpdate.exe 4512 WindowsUpdate.exe 1392 WindowsUpdate.exe 1392 WindowsUpdate.exe 3120 WindowsUpdate.exe 3120 WindowsUpdate.exe 1324 WindowsUpdate.exe 1324 WindowsUpdate.exe 2184 WindowsUpdate.exe 2184 WindowsUpdate.exe 3344 WindowsUpdate.exe 3344 WindowsUpdate.exe 1592 WindowsUpdate.exe 1592 WindowsUpdate.exe 4372 WindowsUpdate.exe 4372 WindowsUpdate.exe 548 WindowsUpdate.exe 548 WindowsUpdate.exe 4876 WindowsUpdate.exe 4876 WindowsUpdate.exe 4816 WindowsUpdate.exe 4816 WindowsUpdate.exe 2236 WindowsUpdate.exe 2236 WindowsUpdate.exe 4204 WindowsUpdate.exe 4204 WindowsUpdate.exe 640 WindowsUpdate.exe 640 WindowsUpdate.exe 3964 WindowsUpdate.exe 3964 WindowsUpdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2464 3476 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WindowsUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WindowsUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WindowsUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WindowsUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WindowsUpdate.exe -
Enumerates system info in registry 2 TTPs 23 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier WindowsUpdate.exe -
Modifies registry class 23 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WindowsUpdate.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3032 1.EXE 3032 1.EXE 2104 1.EXE 2104 1.EXE 1424 1.EXE 1424 1.EXE 2016 1.EXE 2016 1.EXE 3116 1.EXE 3116 1.EXE 2360 1.EXE 2360 1.EXE 2000 1.EXE 2000 1.EXE 2000 1.EXE 2000 1.EXE 2036 1.EXE 2036 1.EXE 5092 1.EXE 5092 1.EXE 1328 1.EXE 1328 1.EXE 4500 1.EXE 4500 1.EXE 2804 1.EXE 2804 1.EXE 1604 1.EXE 1604 1.EXE 4460 1.EXE 4460 1.EXE 2628 1.EXE 2628 1.EXE 3340 1.EXE 3340 1.EXE 5044 1.EXE 5044 1.EXE 4652 1.EXE 4652 1.EXE 5048 1.EXE 5048 1.EXE 4992 1.EXE 4992 1.EXE 2880 1.EXE 2880 1.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 536 1.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeSecurityPrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeLoadDriverPrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeSystemProfilePrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeSystemtimePrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeBackupPrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeRestorePrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeShutdownPrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeDebugPrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeUndockPrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeManageVolumePrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeImpersonatePrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: 33 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: 34 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: 35 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: 36 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe Token: SeBackupPrivilege 4468 explorer.exe Token: SeRestorePrivilege 4468 explorer.exe Token: SeBackupPrivilege 536 1.EXE Token: SeRestorePrivilege 536 1.EXE Token: SeDebugPrivilege 536 1.EXE Token: SeDebugPrivilege 536 1.EXE Token: SeIncreaseQuotaPrivilege 3660 WindowsUpdate.exe Token: SeSecurityPrivilege 3660 WindowsUpdate.exe Token: SeTakeOwnershipPrivilege 3660 WindowsUpdate.exe Token: SeLoadDriverPrivilege 3660 WindowsUpdate.exe Token: SeSystemProfilePrivilege 3660 WindowsUpdate.exe Token: SeSystemtimePrivilege 3660 WindowsUpdate.exe Token: SeProfSingleProcessPrivilege 3660 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 3660 WindowsUpdate.exe Token: SeCreatePagefilePrivilege 3660 WindowsUpdate.exe Token: SeBackupPrivilege 3660 WindowsUpdate.exe Token: SeRestorePrivilege 3660 WindowsUpdate.exe Token: SeShutdownPrivilege 3660 WindowsUpdate.exe Token: SeDebugPrivilege 3660 WindowsUpdate.exe Token: SeSystemEnvironmentPrivilege 3660 WindowsUpdate.exe Token: SeChangeNotifyPrivilege 3660 WindowsUpdate.exe Token: SeRemoteShutdownPrivilege 3660 WindowsUpdate.exe Token: SeUndockPrivilege 3660 WindowsUpdate.exe Token: SeManageVolumePrivilege 3660 WindowsUpdate.exe Token: SeImpersonatePrivilege 3660 WindowsUpdate.exe Token: SeCreateGlobalPrivilege 3660 WindowsUpdate.exe Token: 33 3660 WindowsUpdate.exe Token: 34 3660 WindowsUpdate.exe Token: 35 3660 WindowsUpdate.exe Token: 36 3660 WindowsUpdate.exe Token: SeIncreaseQuotaPrivilege 3800 WindowsUpdate.exe Token: SeSecurityPrivilege 3800 WindowsUpdate.exe Token: SeTakeOwnershipPrivilege 3800 WindowsUpdate.exe Token: SeLoadDriverPrivilege 3800 WindowsUpdate.exe Token: SeSystemProfilePrivilege 3800 WindowsUpdate.exe Token: SeSystemtimePrivilege 3800 WindowsUpdate.exe Token: SeProfSingleProcessPrivilege 3800 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 3800 WindowsUpdate.exe Token: SeCreatePagefilePrivilege 3800 WindowsUpdate.exe Token: SeBackupPrivilege 3800 WindowsUpdate.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3032 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe 92 PID 4692 wrote to memory of 3032 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe 92 PID 4692 wrote to memory of 3032 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe 92 PID 4692 wrote to memory of 3660 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe 94 PID 4692 wrote to memory of 3660 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe 94 PID 4692 wrote to memory of 3660 4692 bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe 94 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56 PID 3032 wrote to memory of 3448 3032 1.EXE 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf3f2215dd6e53a9b5ee3522e2fe3121_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\SysWOW64\Engine\iexplore.exe"C:\Windows\system32\Engine\iexplore.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 5966⤵
- Program crash
PID:2464
-
-
-
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"3⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"4⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"5⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"6⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"7⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"8⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"9⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"10⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"11⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"12⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1328
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"13⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"14⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"15⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"16⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"17⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"18⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:548 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"19⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"20⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4652
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"21⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"22⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"23⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:640 -
C:\Users\Admin\AppData\Local\Temp\1.EXE"C:\Users\Admin\AppData\Local\Temp\1.EXE"24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
C:\Windows\SysWOW64\WindowsUpdate\WindowsUpdate.exe"C:\Windows\system32\WindowsUpdate\WindowsUpdate.exe"24⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:3964
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3476 -ip 34761⤵PID:2184
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD59f69d7d3263fba80976332680629847f
SHA1b9611362530b24fcb35e3a59d75a0c72275178af
SHA256087bbb7470712d3c8d8312ef25501f35f32a9c0d311d54bde582838c5bfa6f1b
SHA512b59ec5234bad9a9bab07b993a90f2c0d3ef1364c6f266cf7138ec84a286b28f65fcabdf63a1a8fa1c9bb0dc7ed7cd53d7c464f6ef5e44bd1590037747abf4628
-
Filesize
224KB
MD503322a9a1ccebfacef585946a0760a7d
SHA14cef6e43527b12ad84ef47fdae9166a0d2756fc2
SHA25668cfc31be11ac29489c6f88e75611dd4ac2f6c16fc52643cfcb7411b78f12d33
SHA5123c4d24c0fa1750a977f87335f227d41d42def7c2e4f599dd4ace22b5dbb37483b76d206f757e53720040ace8a4fd91dffaab7c5b56f890adae05bee91d397bcb
-
Filesize
8B
MD504b97b5da2d0202cceab053073a7a098
SHA198e45ef1b7bca2201f1682df2c776ea8d237535a
SHA2567765cff6e56ac62e1c6f4b2f0350df9fef824d311a0c298e563dd68e4fcd7e05
SHA512844d03ab6467b0504bdb5c370b830c4077b1eedabe7a345e66eb5c568f54fb0391b866e69c681bfb2dc10ba2a27630cfaeb7c582192cafaaf245ffaeca389096
-
Filesize
8B
MD5ae3fc0e6c983647d214c2489b8b97e11
SHA1c0d2afca625486e3a4c7d8d05a2e83a421fddcfd
SHA2568cf701c422fc36212e3b208a21b5c0b7c49948b9a9e03fd8ddc07405d84b6f58
SHA512101608c7274276ed5dd6767292540e9ef008c6a93c956217bb26c0a83295d63e476683d54bed2bf1ab34d3d812088c53aa5b1f33d194baecba4bda143f7aee62
-
Filesize
8B
MD55adcdfabeb21997094439986e0b3f895
SHA19e2b36b44acf8b349f8ea051a9df399c5fcb1f8b
SHA2563efaac805c0c4334c3587b8bcd56df7b707cfbbdd39b84da0d6128cf8b1734fc
SHA512d4a5bcbb9f74ab15f190d9e70f52ff9babb94ad7763a0df0e41b27f465b49d9c23c53d97a3d84c97b370daf4115a597a99e4885e21ac656f1d0fd577b6555c23
-
Filesize
8B
MD522344cfb7d36601c83cbea7bd2cffc6a
SHA180899d54a0f29529397eb82d693845cee9077bfb
SHA25685e7dd9f228cd55f68c29bb2ac62d84999ff8ad862fa556f24cbb1bb9fc387c2
SHA5127ce536c88551c237ae860182948bfdd34a293148aca929f75a6474c25213f370fe7ced23a23f4fcb1b68b7b1fe05a9521b1e992fe6ba8e2afadfd43fa07145fd
-
Filesize
8B
MD566e865e370ecc652c06bfc12ab18d3b3
SHA1d5b4a00db2f4d77fdf085071e179a6a528da4293
SHA256f898ed03bfc0a0f0c752ef28e9e1481a748d387f025ff1f969bfe0cb2b022ff4
SHA51250057bf9e2eb99db7f2f9382446c70927c4befb03319756ff09889d743727d33b2f080f7c18908d58722cc14f072b6f0f5a9f076edb882a17b6df6d9cbf33295
-
Filesize
8B
MD50fea5820f2485cf43e3f87c54a0bf5f4
SHA178ea4bdd20641ceaaca5fc0b1c01cbfea662d49c
SHA256f289098daadb39ced1618db2fd7e95d1a0fb0d1d164a8dc3867801647322791f
SHA512c2b21e4247bfef10cb48599124d0fc979c9626b37144ac214a67f133531d3cd6db24163fc9f85aed1f8b762514e2e79b05b28a5bc61cc95d0e09cd000e2ee8f8
-
Filesize
8B
MD5c758a73f4df04df830ae90c4b6ed767e
SHA12febe2230247a6213d5d1adefd8dcd50bced6d0a
SHA25664e6224a65741ad4c4bc394094d1666b8478373256397bfd1a0d8edf5f0b6673
SHA512322d1a3e8eac42a018c60ef1bf0bf9b7dba526223a6b2a3f6b9b04fbe258c8b0cca32fdf1ba898aca0e3f160e4923eee189fbf61f2b4ac546ee72ef0a6f98cee
-
Filesize
8B
MD5a288d07eca912a38bde45c7514b0522c
SHA15ed0e2ca908b5442967177ae077470293a673e80
SHA2565167210295f4e1404a81c5a45e71e5035c7b29c542a6f9838f583e3cf1fccec4
SHA5122c00e3e3bf5594a90df69291f14e0771e5eef5ea898b58c59758f4a2990801237713dad2ec0bb33c14f3960cac21cd1e93a71dffdf3e47b4356f4667a2197d3f
-
Filesize
8B
MD56913fdf1cc76d83065aa583c56168da0
SHA11e653e18061fc87e57f00cbb54c4d407049f99c4
SHA256684147af1dfba8f396780ee5b74e9a4364dbe6be99590ac8661fb5e9f7ae2e89
SHA51204284099e8a74458ea396da8a6044d61d8a589ff8393952430ffde3385208a013dfc1f031112325ddb4f16d0341cfbe4c962915e33024ba37520fcb74e1a8a30
-
Filesize
8B
MD5506847a58a5e842bf5a7e1ebe45e1ebc
SHA17d45f3016e9577584a24b57f36b437dcc222d6c8
SHA25646861de6d954aacd3508205313e0085a4434392e45b374994a6942e144c899ef
SHA51263d8f4d8d19c37fa459fa45d04ffa9140f2f4b1cd8b30c286a17ff1f43cfd9171fa1b5ef96175804cc697574461603652fe5cbd7d4b03ea7a56a665bce30ecfc
-
Filesize
8B
MD5df701f2717571a0827b15559d3ac0bcc
SHA1f4fb1820cf8f767aa5ef7814921cc085b75a1a1b
SHA2568000393560f448501f0b9b427561232bb7f0d5a5a75578b1478d332a9e66152c
SHA512864b95fef67347a42b20a3132afba3c32be83976f0ff9bb002aa35d0e55fbe27d7fcfe86ccad774b283839225f9b934b176f6f366eb751597cab7e620869b544
-
Filesize
8B
MD5324e9eb33e81dab67350ad7d60005459
SHA168a25472d57c641ae05a29080277b73fb8d034cc
SHA256244184956a62161d30d754d89f477e39e266143d9b702da56ce8840b9cfcadca
SHA512b9a22e0513badd10ed26e49c494088abed2410c3781436006f51b21b7ec416a563f0c99dfe4872cec187f5c90004798656b9ab744a69d98b37b9a4a2f945fd85
-
Filesize
8B
MD5efecd5e91568eef98120598af081a3fa
SHA1ba21e2856319eb64c01aa8cac7b0a7cef120d3f6
SHA2564652204c92a1d3dc997cce75fdf3b84abfd5b8bbfa76e4931e09fd558df70185
SHA512d1f48787e9f95198b18c528a1bb1dfa6aa61131f36b77389871a706e1896868774a215edf9489c877fb6c347ed5cb63c6f81f54015474a39df5b90fc72f8546a
-
Filesize
8B
MD5ab6854dc6bd2e2fe11212578d64b445b
SHA15dcbca05ebb51a583333c1e181b3600743b47827
SHA2560417b2065cf5a62c220058d422c34d7372af0c2c285c5feaf2cac6684b1cb379
SHA512d8615f33f33ea56eedbaafd3127dafc0712a5b267381a77fd1bc25c0ddae675643b288d64e4bdc794e41edf0d65ab77d59be1aa25fca12bc87c0e06b4c09c204
-
Filesize
8B
MD579dc1d091604f1a4a0f4f75272792210
SHA1175596d533d82c3fd596bc387abf60f90357c30f
SHA25667af2988cd746f361afdbe15029a8241fe1ad51abe45f1ad54e728c05033f03d
SHA5128d3d190ea5e847112a560ca82cc4ca73f930ce3577791292450bba0dfe6da30f9b276505783c50b35f6c2ccf97f5e56fd8e9165051955d08d6bcfd4cdb201bb8
-
Filesize
8B
MD5747ad6e8ea50d701ccbaebb91ea0795d
SHA121796c0ca3567d6ca30a90f8931cab19b353acde
SHA2560ded3654e1d2d440d04f9c6207f96d40584bd91b9e5615977c95fb40b55ee5fa
SHA51213a5087c3f0d679fca8649666d4456cb20a526c90c6066dcacd57a7fcfca56dcbb9cc3b268f2955b1a496548d320eb2245bf3a6fc00fe65dbca814ef668863b7
-
Filesize
8B
MD58414e764b2dd26e939614bbaaa6c524e
SHA18b17a2cb60c057d293451346822d83eac1d70c88
SHA256b442ada57a3fbf023e618da86e907ca0a3a0e814cca0182e385f3028613a92bf
SHA512334d508a18265d57ff7f73c7cc05e09fb271c61512727ab849ad272f386fba976c1bfd3daed00076cb67be7aba99f1d4832dc74ed68f0a7160e5133a0c9f1684
-
Filesize
8B
MD5913aeb56d7a4c717d800116557a9d5dc
SHA1cc9b7aa516cc9737e56eb845f986bbee0a2aafb9
SHA25694c952bf62d5ecad307f751ea9f6afa4e58bc9d2611f9704f82b855ccba72ac6
SHA5128c467e0b58c28d1800850d2fbfb3da0b3a45cce40e1dafcb0887d19bb21c7f8dfed8992ec934145219763ea877d66b4ab09b3638be64424489b40b676709a01a
-
Filesize
8B
MD5f52f73b12856cca120adab6456b834ba
SHA19755bee14a71d450083fef47b645197e39e1a058
SHA256e98ece13d0289c31f89b701a8452777cf3fa73b7fd9ab197a6667e3b3539e53e
SHA512727d59716e17a9a9241f0676df9bdbb4463373d365a51204d0fcb7976e046e5c1447977e600d46f71f037e0f617562d5ad51edc8e7e368dbf7c5b920e43202d2
-
Filesize
8B
MD54543cf3d335fb1dbc8e33eeba4eaf7c3
SHA1af907fb69859c43100625ebbc3bc2458ce2dbbcd
SHA256f701332b9efa8d02509119014305effbceb7fe089a8138585a1fcdda9b005881
SHA512929eca12eda4a8beb1c1572c0265f875b4edf818cfa061db41d6e37c6c7aeff53c10b0da5f06c1c895a8536f3c1cc6cf636741a72cdd2fecbca89c70091f22ed
-
Filesize
8B
MD53713057febd958b0fb74807bf0623146
SHA1ced426c5c8017f94985195fe8d2d2f28a0c696fb
SHA256c55c9390a4c071d4b9c5b3571f1c4cdfa27bd3a3dfd8809688383baa8df24e9f
SHA512f5ebb74088fe38e0b8e255187a3a8fc59c16f75122b58fe915b6716cbe7db043cbaad577a4908c0ab02c630d96581101cf7642a90427e3caebb28a67f9739873
-
Filesize
8B
MD53a7b161bf9a47f3e2936d7484688383d
SHA12c61f3e55ed98d47bbbc7219bda43a6bac9ea8b3
SHA256db4cc2af2cdb05e9d56a962b78976168870360a0e41f31442c036a65ef562c70
SHA512964a379ac6a82bffd3e64641b8cd038d2bd5e9bd42c58a215afca25f8c32fd796cf5f8a41d6b536813ae800c69f7df9829f7cc4a5ee740ee13b653cfa69d81a9
-
Filesize
8B
MD5576608f6a6a7c2a4116b78983b41d7e3
SHA1b90eb2479ec994ca00697d48bc9f686fa6059738
SHA2561fe028c36c315da4a66fb7aead0eea83dbefe65a31c37e128ae44c4a3557c357
SHA512060cf50492b756a2e48c3b71b5161887f0276539f578f16ae24fdf06637444bef83a95b8442ee016b586ad56a793eec619bd8c7614c9acdbf2fe50e4848a158d
-
Filesize
8B
MD5d23ca23b623756c99cbabc22a856ef34
SHA16e6b42af4528683327f8ff06af89b7b0eadafc39
SHA25676780ece484031a9f444a9bad98602e8869249fe1826b784ace647f92b3b0675
SHA51281c5bc852c8e43f64d9f84f354a9e3434b1c311ff8779e45647fc45b154bc91c59f883b1a833ef36fb6567147ba651f8b9dfc104cc247609f19656907bc4c772
-
Filesize
8B
MD55ac205ee19f231615d8b1f2555c7bba8
SHA1308b1f16112aae9193a6d86e8f331106c0c919c9
SHA256f7e836b71ca64850424381d5b32c0682dcb34ed36de65c38788903cea0205a53
SHA5120935b9af2e84d3f3b9a5cf84d19b1195132b0719f0b4419af19e328c54334639a8cb6a4b08dc9eb904df55e4e57e042a3f96f703beeaa0c4703393714b3f175d
-
Filesize
8B
MD5e5e9016e8e2702977ce069d1533d40a1
SHA17085bb989ca357a5a818f0df378176b2f19cf933
SHA256b4b6593bc97a6d348bf81336f02b96becb936dcd161fe107b469e9d22dfb55ee
SHA5129e945597466db8d659889be929605d07c83ba9f261617f87f6a264aa4d15dc09dbdb9ca530339c5ee52ead950c71f7c1c36b22d60a4f90603c7bf37d7af354c5
-
Filesize
8B
MD5b1021792c5c16d0adea23b87cf4cb62c
SHA14f2e5bbedc09d33a68b2aea0eb2087c1067df8eb
SHA256073c686ac45ec8327d0dd19128fa780ee5853e89ecc250360a2bd88dc3f5bdf5
SHA51261e22e46a7078ea8cd52df8810dc2615ec6bdd6b64f503b5a428aef93143360c9bf8a4b769aa1a958713f29310f2309a14966487d9271351de88da84aed527ec
-
Filesize
8B
MD5c1f4535ff30ce1b38afeef45dc365a36
SHA1fedcb935a485ec4a7acd606acbebafb046b2851c
SHA256125dcf418db2ac2d824234ceca8aada62d189690add9e803ce2d15a3aba22b9f
SHA5129200beee3ee1d1fecc3c9d20e5d64c9ebafe51e9fbb38a415b56d506a18890a0034092856abc4efdc9afb0809f03148c8160571822b90a257cc611d538a67e3b
-
Filesize
8B
MD51c7bbee70da11bc153c59242aac8a731
SHA1021b7102601db69e1c937851fe3495335173071b
SHA25645c132f927d1c86f781ca71933bec08c8907675b5cc550cbee48842cdcd8c353
SHA5122656b35fac96feeb1ed6faf60683300527713a9068ab1300a84c0629598aca9dcda7e560b2f9bd4a6fd352bb8991f12fb4a7ad8aac7e373ad78e61e339afd2ef
-
Filesize
8B
MD56d7437b2c348e8adf47b352d0472ab34
SHA1d43fa009af2f56d8177767a18aa1e0cf60ca8d05
SHA256647268e341dc48554257c35b4302d727da4843a82fdb977a57b42cd83b0c7839
SHA512e02ba060fff2746abf84c1e8cfb619a1c24c86f14a01f12f5a90adecd02463eec982655fcdcc03ab0a2f4354c17c2803195436bb050b8ce930099574a1df888a
-
Filesize
8B
MD5d92fbefa7b956f31d4813dc2c0122050
SHA19c782819812495ab9bd8a68c731b53e5a7395186
SHA2561860cdd2da0f30ff30edbcf0b76693aa2ff1f523f79378e4cb6dbfdca512044c
SHA512d3e535bf9cd99d412a76efb51e8eafde3fd48813b9cbfdea862335e84b19e838e761257ec861f736b9925323f98b03b18e3d9a6f5d4ab23167318980f8ca2a58
-
Filesize
8B
MD5635bf07cf245ee0724e00950c08ecc4c
SHA1d4abe53fa2257dad27e16ea22616dd61ec811f11
SHA25682af280e34fe5f31505667ea00d105a7061e69b04137a8a9092dc4d894bb2e24
SHA512340218221fee68a6bd4738895e3e5ec89c695cbb1b5f6b3f29cee5a702c671df71e0ee1b6513fea7797e7a9e9383c63c39e653e69cdd1da854e44ad12ecbe5bb
-
Filesize
8B
MD5b916075dfe3edc788067ea39e46fe149
SHA119732880e49592ff7647714dd4a398455733334e
SHA2568fef211dd97b1cc8a40db12d263f3e218af88f9c03e441479121647266a55097
SHA5123ab04bbd0038d09d131957dbc0cd88e020712c3ee6763f975f0f2810668abe70ac98dc14c501a5b60ab823b79f103f4fdefac168e3ead6f25c96972162b97f19
-
Filesize
8B
MD5016b34cb5a2dcdf1b43686652bbd0372
SHA143b394267ae2ca34e622e614a30bb42d7e63988d
SHA256a240688e3089567f862963c62ea8c5c3871aea572121b491ba8e9c866a026bcc
SHA512250d2b92c3da06bcb042c7f0213146a71c5348f823f8964d36e49d6063fd75d57c2c1b395ed123a52f0db9b2e99d8c8a9167c1056dbbad959e7d7b97e9dcb79c
-
Filesize
8B
MD5ea4a63f64e48670692898f3cdb850720
SHA1daae1b3ba8a3e6943f3164e1f8787d3e64b81a10
SHA256ebc85de8882e4f4086b215285c2b48363cc0e067cdf8ae1e65a638de4a1eb4ef
SHA512268454373dbfb4b614c79ebb5cef3631542fe48c87fc5c36b288a2e6fc9955db7ee06ffec2545a44db4dbce9ed3e318b3a2d9e416fbbe7c03e29398d0df25350
-
Filesize
8B
MD5d45d7a2e634121824dcd705e22a4435a
SHA1a962ec18a5b5d961b8ead70ad6eb49b8cbff02cd
SHA25665e517721ffb07b7a4dc4206d5606b5362d85d885b2c56a825c9ea287473a330
SHA51269e53e6e4defaf55e164c9c797de74444c2e3cb7becb7b0fd7d1e3c3c5b6660e580da360b38a18f0cfacaff339749fe1bf1ad3d50b02bd67e77a77009b1a9825
-
Filesize
8B
MD5121c593039e18a794f459c5d2b0424c9
SHA10b75f50ed0a966971e6b294b0c74de707c518a50
SHA256be9037071838639186f44e5372df42c456ac749e16dc7af24edf46cc8afa0da3
SHA512777838aefddeaed67125fb25ffe84dc29779c3a087cd22df76dfb28f83280f372f8f75073eaf8b3bb14477d289bf096292a94616d98aedaf2076e50ef04ea0e2
-
Filesize
8B
MD5661a4206fb2e2dd8c8542f2ffcd79c42
SHA1f1edfc4dbc55b9dbc99fc85fc5090f759ef6ad0d
SHA25682586aeffeefc4cda996a803cc1daf85eb632a4bb6ffd0ce1e299a84f1a9471d
SHA5123c5097936b17f9a2c7381d5f7e9cb964017f1021d2858b6a3f120f65543801cc58d9fc6c5c74e43e3b41c53f81fcf7532be078d354cf9946f2057a449f0f89e8
-
Filesize
8B
MD528ff598e3d8263055a09d8ce827fe316
SHA160c89cbee02b64c0e348745f057b7571cdd7395f
SHA256b20543cefa5b2c8d9937c35f4c27ab8989e799ea0b78ebf1f14506d4e6d3dde2
SHA51210c11195db4446019fa0e11d9c2cca58acdefcf98bf50408edb73d34f70f99bc47e35fb130b86576d91cba24fd32ad2c5f94fd76b6d57b0ecad73fa7044ad509
-
Filesize
8B
MD5af5b95310f26d7e0de512b7a6d2edb67
SHA1647cfa0f63e2ef34d638c990c9b851c44ffc05ce
SHA256aa39107d12c2b0147d0047bcc0cdcf80fa72e6815c66d5ee0233552332c2daa5
SHA51261b66c146de227fd3086199479555676ac14ffca9572c89913c20af60e8f610a1f9821e8b7cd516f64298b32930cecfcf0a232b5d7503f7229b8214a4119e433
-
Filesize
8B
MD57e025bdd9703b834fba043a08f00c7c5
SHA165d39c547e08287194c08b555de08b7139019709
SHA25628e62468896c272f55afed856dd8aa09b44fa49bfd9775d35e96be1410049dbf
SHA5123aa258ef5881d2c8070eab86f731cd7f6e7c1c30bce3810e0a3c67b34b1576a80d7b7a85bbdeb4e0307fba6fad1fa7ed26c315db98fdc250cb74b69fe189b913
-
Filesize
8B
MD568a11c8d63aeb66ef4636c526b2a2607
SHA110c3b341b562a7d42b4bed76cbde1a545184897a
SHA2561ac0dfe7b0b0b06750b885d04b3709c91128a7a76af96e3e2ec14de6ef9755b3
SHA51299e8c739b7a41384df060af8f29229155dec978cdfcd0cb204ce801edb4826aafded68672e110b6bc4a46342349fce8498f2071235a3e27bbb4a53c895f999c6
-
Filesize
8B
MD5b17985392d068cdd79dc259e1b6132e9
SHA1b45f7c480fdc4d922e3309bb2b0b5b2dbdb72dce
SHA25600dd93c2202206e0783110d2c7bc26b75803794d4bf5e9dc28ba9efd19bdfbc7
SHA512ba8f4c4f6cccb33d6b26560e0c880d4efdb84391d5e705b7ff177d6c6da5902df7e9549bade17618edb6877531070c2bbf29e8e6f8fd79aeb37f810eb47ff792
-
Filesize
8B
MD5e1a9e786c61641bf893e9d11dbece7c9
SHA1aaefee494ab1eb6e80e8a5c1675bae74b20ee2c7
SHA25652e46fc65ac6fcf5952c326bb83cd76fff983a1fda10c0e2cd4359722ba57d5e
SHA51253905d8efdba7119acb822fad5a608800b2af5dbe3db3f545e3a1b5b01bbba0b97e1b8ab576e476f8892c11482cc5a1f520d55339c5b4efaef1c59b699793688
-
Filesize
8B
MD5cb7fcb63dd0919d2b97eff19e815de6d
SHA1c8da6f627b1ce5e35994cef9888968db5e5422cb
SHA25621bda06ff1f9530400d2ab13f03ed1c466e26030a8fadf434c1af77378c73e9f
SHA512ce79585f474e4cd8f59a498d9a2736a83d9ad99b0b1a34a2346d6ac5d0b6d3689a8d14aab2393a792eb28696c5b65ddb7d5447bc3ee9fd08dda2781461cfc64f
-
Filesize
8B
MD5a8535b35c7e465ab1e000532d64919b9
SHA14ab6a8afd99f36f59f8842f93497cf6fcb188ae3
SHA2567e653782f3239fb9214f126a8d8d23672a51d6bd5bafde2e89832ec1fa517108
SHA512c842b419190fa712dea2b4c31b2a129484a1b692cee47b3bb09161fa12afc007d85cd4663d76b364af8fb01c757370a9b2f076769dd31a98690c408eb7fd8aef
-
Filesize
8B
MD5047f4fffddaa056d3959d6742d7c667f
SHA14406d5348ebccdc70c48b75028bc1aba873a61c4
SHA2562b00f0fd455749cd388121378c2c0ad660ca3a3ae690ee20a54e3ec19391ae0a
SHA512df0c7e0564b7a715ef935848a7326a954600633e24dd2be88a247372d10d62f7d6e4f83ee70268bbfa1a2bb9a43197225dabd4168446899675328bc0e1307c7f
-
Filesize
8B
MD5d37445bed0f2dc22239a986b74f7cda3
SHA1d5a586293b6f53c2c181b420148c6c85168b725a
SHA2564a5a7cc566f6dcaa5ec0221938aede273c9e8df27db644d80964a406c0adbd3e
SHA512a20ddec501b0ec0e6fc26e33f7bde573d7436baa85750e7aef875b5619289579ceb07f49506178d838e37b9b1ae9fbce806eae8e0a5e00ae6c6aa118abb5cb74
-
Filesize
8B
MD5abd234343c20d078aa942a8015a400ca
SHA11c75aae03e3abcd9ec592415c42709d433de18dd
SHA25614c172ea52dd5059374c022b7b4f470c353ac57ad6945159db7ffd74c2e32002
SHA5129e1fe01af12521cc4a9c08fb4d4be46c5fe72ca140a851ba0ef31c68034106a95a0746e7fee572806ad67f286705e7c9cc5ba2da71c15066bf5f543d6b803e53
-
Filesize
8B
MD5e44b456dfbd53b3a9b1cb5f2e68b1574
SHA19d80c70fa3699418a2c99d5da2f11ad37887bbfb
SHA2561968983634797abc78e3b277cdc2a7dec8bbbad372203b10d0376230c89446c0
SHA512f720987a107c5f91223be7f7efcef709cf7e85c144442406b2571341374528370392a3a3a6b84c6421077ad4fe0f0abf312c2089184853892f7baeaef60c5366
-
Filesize
8B
MD57584309ec7ee61b9fdb32de5da47452b
SHA1a993773dedaef3ba5dc74cf096a7671ce730a596
SHA256c38f78d92a0767bbf090c10481534354b673380281e6a3625dc51fa821a65933
SHA5122529ca7861bc4db37d9a2026d3c8d73157f35e495965c87dfa43a5c7e967a71b1831a039d4e7d4814db48f9212cee4ea8aa5f579bd22fd68ca616ee4eab789c9
-
Filesize
8B
MD5daa4c79908c1fe2fa8c93f5a18322fc0
SHA189b467f435afcc0d9682fc994a6dc898129fe954
SHA2562a85968155b6538789808ac5908a2a8d4f9a1c1ef19395d8604d3a7b18431d50
SHA512fd3bf827348acdcf1078daf4743cc0976a3914845f42d48eabb6f1e02907e812dba8fc8689ce4dbb8d34ea2b0866f8ceea8e3e90e1e29406107308626ceee35e
-
Filesize
8B
MD52332febbffa222a034e84302aa9fe382
SHA1d3797f95c4d08c5d3b9e81466c5340addd87e1a1
SHA256b3cf310d6a16389fc890c6c43a28692eb251d5565b7aefe77954d4bcf32b57e1
SHA5122448851a16be3b6b0eb429ddc360aa2d4c6c24d411ebde827678559f847f8887a95d6801ab452a15260ff125d692ecd56feced6cb0dd685de9e0cbe8984db70b
-
Filesize
8B
MD51e61d5594c9f3d1df01407c3b2f085b4
SHA1f0527d4ecc0a54a852c2361e29338646bdf89617
SHA256471ba5ca3ae89cade85fd8ac9f8e93c64676f9828dc25e98f60fb4b78a13189a
SHA512103d04c51d3c3ed6b4c3b37f90a76ab33631b693cc9000e546186f8e561e5890d54548df9d895d72760ee1fa86aad23de2c38a71d48a5d1f1f8873b189ed8ed1
-
Filesize
8B
MD5c33394ef280ab3c6dd9b559dfb5234ed
SHA1666e5d3001cfd84e69bda82fd8a4c79d4d5f0808
SHA25689eeb703407e7860ce4d9a67652898c18b813fd22d620c32cfeac47a04351fce
SHA512dea2a954356ca51ff993e1750a68626a7106bd6650325a15b920fb460a2b4991cb5d17ef04b801f57484eec5a7065d9b56318a41756d28a94dd8a97a2bee7c00
-
Filesize
8B
MD591e38e4107278a7de41aebe32820eccb
SHA1118031527b3f7cdeba0c11d911e8b4a14b8601d8
SHA25668e1e00cbda484e2117e58a89686fae70e41cd6662b51b7748fb007295b3ac8b
SHA512d675a74a7a4a4028fddb1876bd5a624e76e9fec9a61f4a52f6a45f8cee1c8d4cc478bdacfb88cde2d385b9d244cca4ce3ef294ec3883a3da0862882cef51d34a
-
Filesize
8B
MD593034a545524c0ba9e7a0d365d6fff8e
SHA144d0a1378533377ae286ab9a29ea0097e291fba7
SHA256f7eb7c8ed548a6eaf159502b09eec6d1d8ecc9603f900687b3e24cd378c6bb65
SHA512fa5d8403693bbc780507bceb784373ba7d3ddb661fd4f08a91ef60ea01eccbd64591970f628c52a89c61f926c77ea0fe16c9b66a789a68ab2c0916eadb6857f3
-
Filesize
8B
MD5b86778270c92818eb9cf35b698201927
SHA1a4d9e8dfdb4bacd97712e966c1b9e0de52833de3
SHA25621dc7b506bcdc7ed9e018178f1e8326061ea53e60300e3f549436a99fa91dce4
SHA512be7c148eaa9a476907eb371df14037f65d10593e369439f1c54b2cbed03b2f46380b7a08901271a7d42fc2f328c1d2ace8dcaa29a476dbc456d5382d9d58525d
-
Filesize
8B
MD53529b4c77aa82631cce756053a9615fe
SHA16a9c355005ba229755906d32113eff6fce31556f
SHA2563a10ff4793d7575ef9f18b66d84f565c1ff5bb625ed386d068847e4377ca52d5
SHA5120b7d18df2975b7bc41f7f7d8b2b090bc5b7a9181c84825f6a91f900f1d00e7e79bc8f5c8bca60bcf4fd46ed77e1ed971095114fae06d5b343bf38f8ab3d626d3
-
Filesize
8B
MD512e94aeb3f005e055c4fe79852eee51b
SHA1c8c29b1514dd86024dabfd5722556d69237de196
SHA25679cb06d0fb707ee7161b663a95910c23c9736cc8808c7b29d8caf71b1e1cd348
SHA512c99162d468ad763f975acafe807f0fb91f869fb1a263fc8ee8a96aa764cdaa194550f4dcb57d9a987ea463e4fecacb5808831c4893e8e916a940cb161183b94b
-
Filesize
8B
MD50e51a8df63a4baa6e867c6dde2099b7d
SHA102da08637424551f9e8e0f1914cff91e72e85bf9
SHA25679c1227cddd32c3918cb5b9bae1eb032fb3005c6993cb04c86a361633e3e720c
SHA51262aeaa99ec899944676163eeed51d2339e846b726717d2e4915b75afbbe69a357becd9113025d8634b3f4eccb811ed619efee51d781ca6489a30a8af8fd22948
-
Filesize
8B
MD51a189c31f828163b937a31aff1fb55e4
SHA1904d9013dcb7a8753dfc2ee23e01e048212847f9
SHA2569904d76ceaa8a8ebc82c9310ae90b8eaf3d4fbfb5956af6461929960892933eb
SHA5125ce20ca9ec79e15e09769bf3d04127e9cded220b6d2d6fff544579b122a62020de37937c8fd0de4bde3b8a52c25ed113d2a78b7312f2ab300c3cc1707c1d701f
-
Filesize
8B
MD5f65e1d6b9fa1bf376726feb806700526
SHA10ced2015f1ad5635de25ba4843fa9443decf3158
SHA25666049b32822dcfcc3e2db3239b7850e018d91b9d6d36f503efc406db71e8ca88
SHA512f53d61cb7b15f1ee7eb56c34ed41693e6d182c62d8ffe394fc7fc8b074471afd4596c90b2e352125fd3b58eee809193b071cd72f8db769ca932e1da29f9140a7
-
Filesize
8B
MD53ad93220ce2331a066bdc0f18d26bd26
SHA1950b30716d0baa912c895b7e2f4d131146e057b2
SHA25679c77427ff968b3539bcb9234f2578fe3200d4a5ddaaeeddd2914aa817ba1967
SHA51266fb670db54b433bd73b34fb8b482f312ac4044f619f1fdf717549dc2cdef0737d8bba4114ad4e3885b77f11cbdb54ea2ce8b98703d63ca78900bcf2e40dc78a
-
Filesize
8B
MD52977da897fd8a7ece610001f6df93961
SHA11bf7f6c6764c033e19a38e2e73f730cf25c18e36
SHA2560ab31b54e1706b11fb82f369504d436090e7b45741fb94391375cb2e6eb43df5
SHA51207fef253230fcf262c2ca18f7f3096863b76dbf2ed9e0cb2d80105fead4653bef1d7487e378aeb31a6ef5e85d8d8492134dec42b3daf04efdcda596502e67f85
-
Filesize
8B
MD5562b31ea623d7a24869155621efb6b94
SHA189e97010cafdb11b1ff3616b0bfb1c3d0d56a4dc
SHA2569e71fb94c6115d1ec0d090a86baa15877bfcfbc0df023afa2c1220801dd79684
SHA5120e21d0c6f29bdd197eb7a393bfde5f8e3b0aeba316e3cb015e561e3b389c8b8171f5094ff250412b75eb7d3ff69af0ba15ab03f769f6ab32237d7893c6462dfd
-
Filesize
8B
MD5dce93f52a141100cd1988e2918faa416
SHA1b096da4946796455745a6644162929ce11d1cc11
SHA2567a3814da8d43fdd1da30fac0e5bb14bb4c586d08aa8b87f886fd363b829dd4a8
SHA5121f2c329c391a0d142d924a25674776c602e9176a029b0f48802f9f3bfa482067c2fd479b4fccc76564675c370cc7dffb37d69460b9cb7f9cd26cc517d0563b19
-
Filesize
8B
MD5b22b7247509bf2420bb9bd17a7dc38cf
SHA17826a97c623fb4ee5d9d3c407d0ee3f2d60603f8
SHA2562fc7ae8d441b3286e7e218f36860306bee3a3de0380d36c4ed120edfee14c6e1
SHA5129d9b5b32b4b7146db2a7b4b5cbc2f9a9f957c1a7106bb14e8cfaa1196cca1bfefedec2428bf17d91293e6f517a81737bc0a2c594455a624256979c8fd9deef02
-
Filesize
8B
MD5a6cd8cf3a0bea4328755b6f91b4cd9ad
SHA1c1ef7baff39f015d23f4c64f3fceee00137a5c0d
SHA2563581ef002e7f886db7d06185b56decf304645e3143cb14c6650eddd133b08e99
SHA512d4760a5408266c076ce276dc241e4b15030bfb2a66c9c5d218c39978e8e3bd5f7d5084e546a4688b94c29e407a3345ad3b84e269ab52f965285be7da61380bf3
-
Filesize
8B
MD5c80e8e15c035c598f287f68ffe75da52
SHA161f2e0357ad7678da6bcaa9705edb821b970fd36
SHA256e65813af6fc6f88eb1d401f3fa453747476cdf241477b189c76cd63c92dbe6c3
SHA51233d018efdb161bfc86010a99b64e2863d6dbe383dc262f979879b6c98a335570b60015ed2157ed5ce5518df41ea2183162b9edfb15452a3e66b823c9ab573369
-
Filesize
8B
MD5fce727b828e9c32e5b1a2038db719f01
SHA1e09301118bb19bddd83644c41abd096b8c5c5921
SHA256599dd74932f8b721f3c3e3a827465a91ba6a153969a248b4665f753cc8a54a3c
SHA5121d3ffb7ecd4e248e3022112e07f4e0270c3300d90df76efc6ec87a92bdb456517b1819d4e8931eb23df78905f62dda501df9f709fb710f88ea019710b1d019df
-
Filesize
8B
MD5d5b388ecda0e17df747e104dfa1943ca
SHA19d4fc7742d4b7a1b5b22e41228be867c29937f34
SHA25630945ab7eff84a6792b518d52b80acecef5e77207693a7961e350a63155b1549
SHA512389fc4acfce7a3c2c8089696e726142be9f8660c8869ab1efe0e30c5b10aad140ceb01ba84e912e3f94fc5d395a354fc372683914a3d3ee4317d9f572868537a
-
Filesize
8B
MD514e407a2b225903c2e5596293479ee36
SHA150c4a5a63e164526a6fad5effdcfd5061c0f8c1a
SHA2568a74faad07c3e3cba2e42fdff462f89c931aa65a61819e91a0ad85338005f5e7
SHA512250c7f9b0695a707747e31903cba21f6282cb64637aac7618f216df02402f2eb685bf4def51e83cbaa712484ad8f66de5d221352d6ae3a71daae92b97148be43
-
Filesize
8B
MD5f0f15d8498d0b224b5b0e641848c6db2
SHA1d03c3b734112c93aee8e48946410f883b6c388c0
SHA256225cd1331f79929d6980008d84e20bfb6f3447b660fd1d4470c1758b2caef8ba
SHA51259efd60015c8e5bb1042d3d48cd2b30c51f7b141524828675d699d9f1a8dd776d12fd9ae0a8057541db180f1c77d557dac84858ebabdb82e0769381cfde672ff
-
Filesize
8B
MD5a7d52490dd78d5411d1510c7d90902a0
SHA107622f4e5065ae9d568e6fb284bdb130190e378e
SHA25603f7c5ed1dcfcbc10429d005e9b6bea8b78edf3d67751593579027d081d33041
SHA51225b97f60c40b0a48ecaab0005043a3b91a2ebcb0e62830445a09f6528727c13821365e7ed5cdd8c4d7c6b54402b90f517554bddd0971592412b3b3284cf36493
-
Filesize
8B
MD593cf7ea7ca104970b023abb3bbf5adcb
SHA1478c7c3b676779be06beaccab70896e806b03e62
SHA2562d3371b5887f23d5f3117bc0dd1960f0b29a1af4e385633a706c33064b06e188
SHA51205396da3ce5f5f39b21fc585363d9e5efa7887c0281dd8812e21388a68d3c63fd810dc2bbffaea0119e10c78037554a61cce062af934087e0bb0ba1a0d5da165
-
Filesize
8B
MD5072e50f2237dee7829ea3d98a5dc5fcf
SHA11c350966cd809c9c901f8fc7d15b06601edcb326
SHA256cc803b10b5d3f8ef263722644af66e10a7730afdf18afed9c9ed42144aeb2aa1
SHA512486754b56050786bfe80fb345084f1d6812d02f1a22cf92c9186fb890f5a649d1096789b1ca049ff970ad912acb9b3717e19c12cb9ac717c5b6c07cc0e75b95b
-
Filesize
8B
MD549b2e0a288590dab8eaec2180534243a
SHA183fe5bd64e8aeb9da46c0ea450eafc040ea3b463
SHA256132ba7ceaaa38c0dc8f8ea386a0e16cf43ccc9c11b955f161982c859fa15cf49
SHA5124a7409df45b736a2e3f8a7719b1862adabaa183572a5dff88b27fb1ab12f1538dc9aa5c258528c64b79e299b1c2683b045cb9fc4e13bc9aba0f22dc4c430e9cb
-
Filesize
8B
MD5f55affd8d2b1e7591d39d44d48ddec2f
SHA1b10b8c2cb20c06fd301931677ac9d73e3bb7b99b
SHA25628ccfc938a815a93bc3aeed98091bff0e91a602029f46cfa2792db6e43287bc8
SHA51242fbbfd8641195baef3c05fcee5175d5b84b32c9dea5a613a0b3379511a859fb140b6a92a124cea6ae14d80fd83a9ec8b46aeb1cbac86455df990e6e0b2bf171
-
Filesize
8B
MD59714d2a3aaf6e01eeb341aaed12918d6
SHA16a6eac1fb2bb9e5e88d260d021886cb86ca34ed0
SHA256921942ac1df7e157f656209bc36956771adbb050345dbc751d8dbac1a01126c2
SHA512a21d5c6d0b451358c0ec63714630603e3dd86bebfcaffd412085b9b477bd7af36fb7d2c2fba60e888397759cc7de7dda55f13b9029ce887c0113fccb5fb84456
-
Filesize
8B
MD5e185c5c33890e3788c9c9b4d8ce9bb19
SHA167e3f412b283d62a5377b29a55bea284cce67cac
SHA2562e31cea49f0268f7e0e52252018e959a0ff6484becf26ea35a722f82d38b9ea2
SHA51263e9abbd2ba7678694d3b80f921cc083348be5c669e4e50f5471401806183f5d0adeedbf9b3ddd597e4720622cfd4b1b5ccd2de7eb4a9147d002bc3304615617
-
Filesize
8B
MD5c3f124b92cab5fc2b6e2a35bef7a5519
SHA103dc2b71cdd1f9d206c05821d803386b37dcfa39
SHA256b6009353b4978bb5624f5cb7c8b8706e0005252516a1127d4d80dc4a5580c883
SHA51231c7c94eac12e9d7b71900222b3c0aca1706a9edbd1824ab512467913132c7d19a7d905e611e0bd87e14bc71c08939b3091230daee29945c9c22cd0bfe842c4c
-
Filesize
8B
MD5621bb6953693324501be527a8fb96b9e
SHA19c1ebddc590dce2cb100711c59f2391c03171049
SHA25688a8e539146ced4e1cf01cc80397118d58dde75cae8922ac013bc6cb8cd2c311
SHA512158bc71061c35a25a10a1831853cafdb08da88cb4f2ab37b11c54cb1865c3cd01fe1a40d5f18a8a97e052eb351f19a1a8dda256c8acee829ab2c26bb3692b04c
-
Filesize
8B
MD564f70c5d32b2e9d4092b875d463506ca
SHA1c12d588ef5bf8319501b5c31e618b1ec3ec58083
SHA2560b50335def47db10ee11c7d41500f1a2f3e0f445f39c28db52e688c33954a4ac
SHA512322f7ffbc1695d73648d043a88ed8571fe4dee261b791126c2af361cfff9c49f2c8929b72d9257d8541a08e2ab38aba610f3bd21d33a1b0850d9a6be8b1bd52c
-
Filesize
8B
MD5aa3aa3b54914094b9740ab41f85f8bdc
SHA191e02d5d6fa8ded0d7dde6a2737ef23a0a449b2e
SHA256e37f605a2bdd780b1a3332cd487cca0aaa60d842b4bfb1f5db2a4ea9e00faf3b
SHA512d963ce21280bec5816e45b153dfab69952f2ff23d6f3b376f0587e6b7f5e3060c9a9cf62e63d4cf00920ce91c049a0d062ac81fcf6a80dde1b060e263eb6522f
-
Filesize
8B
MD50b50deb8e3969f58b2269c3d3851fa6e
SHA1af4339abecd00bd88535b11c80477f22a8c66cd1
SHA256e4f0fc8e8c9dd4303a2a29bdbb3aee00030add4cadfa50dce5e43591c33fd9b6
SHA5127f2a45ec88156a81727c7cc5c439d2601557ba44eea97602886eaa07267f41cbf4e40d91d68da8e7aae35242c71e5c746ab0f59a6c9587d11b8f2d2fb7d16df4
-
Filesize
8B
MD5fc60da2926d871a877f7929ff6a990f2
SHA14a907f0d47e1e018ec99af0b2547c92d614038b6
SHA25646b03a38609a4a9cc288e8e89296b389c4ac5cf0fda3044afbd91d05536be233
SHA512a170e4928464c0fa1501ad0a8f3660effcef9c91651df676c5d72a6657ea01f9226d638a8971c0b6b10edd104a1e81834de420c46180637e4d2c39d46b623cbe
-
Filesize
8B
MD5ff851df73e1ed911a3a75c0275b2a00a
SHA19c36d5a988b9e0d3994cc1bd775498f90abcb1c2
SHA256e93b5610fa866ba1af275c8227e9be8b56ded8ff6d561d9c1f2fc4eba4c95902
SHA512443647976f3e4f749af0bbf8d01ac9579480b466b38563ff27a3ee3c88be8c6a7b3a4f5190076e93796a8223895f469257839b2b831f3a49398874d73b7839e6
-
Filesize
8B
MD50677936e0c024817006cfb27cd29aac6
SHA1b7de5cb0b11e5ee1a415fca1c4e7e4be04cb2a47
SHA256f7de9b54e035c74d7334648cf13527ae79ed616d4e201b7c769eb13e31914a14
SHA512730825d626cb4189030f2c2f6b72cfaaacf3c6670a6033391ef6bbbc57127b901ced7a82d0825a90a5e4df9a4a7ad9092d3c04ef63407ffbd595f429f2416792
-
Filesize
8B
MD5b6fc00a0df829e3bfe9b605a69103e21
SHA1c6aab1c3c061d40b4cda521e7a83eda37dd5bfcc
SHA2569e8e1c17f6a2cf22839b486be057a68f0c10e78abde95be1350dcbb1fb7d82c5
SHA512d8eeb2e7c69e1c7b16927261a058c50c2e7d5b61ea3c3422b18bceda5f02f56398271d03a77056d0ea659a381a5cef53511a07546fd408ca8d1e6873935fc743
-
Filesize
8B
MD53d9f8102156f6f285a784f8a452a598a
SHA19a58d3eb35e70023b67558979f83700daec0d6a0
SHA256b5cfe93bc7b5764d2481744321ffd874aa0942ebd0658683d6236c294f9792c3
SHA512e03dbd9de07481393dfae8450cd3de381a4d352ff5a155d57cda00f7e753a93719c084e1013df5ae9dd115913c5b208d4c6ae1bcfbda37e00bb96ef62155f74e
-
Filesize
8B
MD51d2947a80cfa9f8b105795c22fb292b6
SHA1f8287386063d9ca8d43f7279e71840120c67f07c
SHA256781eff674e0008ba7c430b9f816a234d0305b9315f82741b312eaaae82af0f5e
SHA512b33f6787debb072171fe0706d71d2a47be07a30c8019e96f03f7ab800c9fb3080a9d9abd0cd0324fe6cae0b0b05418a0454a1eb0aef85339f0167f69f6ec5722
-
Filesize
8B
MD58cf98b7a108df51a089049f8eba0106d
SHA10bf2d44009e6573bab889ffa07c72d4b5c7d24f6
SHA2565b1d25d925cb58e6b80a88c3900877c0d5e027d19a5ac644f7bfd8c7cd02ed7e
SHA512bd493cda00c1c146e71ee5d707bbe6dfead944abfd577df504332634b8e27cc04e2f008ce8fae6a56e59197e6f45a633e18208ac6080b09868e857879482dee5
-
Filesize
8B
MD59d7d54302b855ff83e84a769205562f7
SHA1d905b1dd5a883f1940ea883017328b08167ddea8
SHA2564fd96c662da21bba4d0cc2294d8208097fda58ac4694cafd3a47a4f1e5dbde14
SHA512f832c2a0b18e3355f63de08de345bf1df653523a79bb092725f06551c89c8483b9eeaaff5d234fdd90b9c50555b20cf9d35eb377173d344df4249c188740ea54
-
Filesize
8B
MD5af8fa7c8bde4a0bc0697bc62196da6a2
SHA17f7ac1fcdad5a8d451fbdffb0320f614d83b080b
SHA2568fb379ca54afff2829d17e1441b7d522120e794403cb1465eddabbc878aafbf0
SHA5125d03fec62efd5468aeeda4ac3a96b65fd46cde53fad9e07a5cd6b48d14aeb1b31e4955ee9a88b7a3257c5d1d32914334b612ae625bd4d7c237d601dd50701d43
-
Filesize
8B
MD5af89a33c4f72681ffbd2697ee3857eca
SHA176e5459d6392860b45403a94ab3d99f4f37ee15a
SHA2568e5bd0e0ba9c4e4b7cf816de48118965dbd7a03f3c9b285a8b145833e3c9949f
SHA512fb5ba4d3fe984fe6ecc3457cab229b281cb4613c46193be05b6b1076314f0739d74854874d74ae927cbd79973bea6a8a31d3f2bb5b62a4e6c350495134c96172
-
Filesize
8B
MD5e42357d11f8c1705748dfa39fed5077e
SHA10d5f0ea54f28f26b8a96ba85d84bf599055d00e3
SHA256cf5513b47721e913c20c839e8c9931235d47b26a4562c30acc338caefb33edf5
SHA51259f306e947bd6a0251a546f76282a45b110a47600cc6d0e38d17303c1aec238e6b3b9bac24ebd2e19b6708d7138eb17894ef28367f400123ecbabccf17674ce7
-
Filesize
8B
MD593cffb3ab1758da09330cc4fd406b0e6
SHA1a72304db3465f475aa0d9ec2b70a2aff4d091602
SHA25638f95ee94cdfd1b69154f255e739fb72a14bfdbeee761ff39ee7cd038da9d714
SHA5125ec9c3a26b71c499aeb94c3cba9e0ec99284ceb9785e169ea3bd2f0cba71e8ae39d4d92b6935f42b62c4d42b9abc4cb963c0dc89dc11505194cb4f0a738f8a3a
-
Filesize
8B
MD5b8cdda0f45b3ed950d1e498bf23cc7d4
SHA16b6e4f40a836411e1025981aed57583e7c364be3
SHA25612a92280fa70f9c0cbc8804369cbea914061a8fe9455e88c19e91604955a6591
SHA5120c3b8565f4ed46587679bbd80e20f7539c0d821481f98dd45aeaecdf5b4ca4eeb7bc5e06019fb8de618279e68aeeb92706a918ed53df8088916e064c3becd176
-
Filesize
8B
MD5e8a81f5bad780246b99c7b4abc8ffd41
SHA133a090293ba07da525987445c1a7e5f8ccaac610
SHA2567b7c9aecb0c49e0ebcd6bdec5c834bfc4dbe8d979a8e9dac4b94cf64f8518424
SHA512a1462fb5da998847bdb47a833218b6526b02e9066a12ccdcaec0103614372c316ac947299e22149b6ed4a9d5d26044c7b23a03f918e516f9a2c27f5170c04be6
-
Filesize
8B
MD546de4f19e26c2cb5d8bee99c2c63316e
SHA127ebd2aef53ea4e624e2f5e66d1b2b2eff50a0fc
SHA256fa37218dea0cc178b7c2304e608ece3f10c939325e18df6254167627d9a2da68
SHA5121577985b92c21e5faa703ec2c5a8c37f263e0e38304fe6e6d8b9d34dd5f188a64bb7158cfebe88e92ae092c16d3b0d5acae174bafcad43ce2d5917e510a4361e
-
Filesize
8B
MD5af633ffc59c8cf4d4380b8a752968a2e
SHA15d636ad11c405821b003da8fbaf209d8a246f472
SHA256a1e58943deb5213c68087dbeefc6eb53b7d4b2a44897c965ab35b1595d5fe6ac
SHA512898737a3268262a30b8e4a025a5f881da2383718ef0bede18bd3553c953c338767327204f552fc30f2c813bb7b3471bb526c2614a7cceeab9f600dc8df5976d7
-
Filesize
8B
MD54e92a09272cef968f4c6e57ea7cc1571
SHA16313c12c800cdedcc4b62f099bf9e8529720cb40
SHA25649bb08ca4c2211b721e825e5ba155b4b43145f098a5e75a55cfb5b0e537fe5bd
SHA5129530c2ab31bd179508591565b63b7e4d351a24dc875755fb908e785d0caab6c7a6db3b7597e8a2940eca581e25c8ff61b49fd2ab88ae91da78b038069e526442
-
Filesize
8B
MD568447a0868feed8e251220f61582569c
SHA1a11e52f16944ad152b69cddac1400224ae2dba11
SHA256a8787f841baf22b6b9a30036b36667a9eabc306f37c6eff561ebefc8474c518d
SHA512ce0b7f95425c6f542ebfb9d86a1ad676a44e9fef3ef119d1e0bdf7d06ff734463963054ffcf400e6f02da161eadf03559acd713158cb7054e884a277cf1910ab
-
Filesize
8B
MD54b83055bbab0c5cd36de2db28482c4a5
SHA11da459f8b7797f57cacbf2b0894610826dd21b18
SHA256797247c2d100f5ad878c405cabffef8d8c83e64ce8dcbe8c9c84ee182facf88a
SHA512c83c3704510ebfef6955a0bc0826e904d0796a89ff29e472bd8958dda052bb6f893653d9280549fb8adc2d3da04fec0e538bb7ead4e180be87344d0c570a682a
-
Filesize
8B
MD541037df55af19f0562fa479c82c4c115
SHA1c86888253420a9964cef9d6ce3cdfe6b63afc209
SHA256db1c5fef5b3a006cfc8362cd405c68683620616761d5cc5a1c1cfc0c540698cb
SHA512e1af58412dda6865b71e1eedc4952d18629c43fe01c1e9abbd76b0f43554d0b874d84cc30a118c71e0746a71de2be1c6660e12cb759343053d77e88dc114d422
-
Filesize
8B
MD5123bc4569f88e22a2af5a0995ca49f68
SHA194ddf43ed72735221df633e3cd3f95b859e453c2
SHA256ff676bc8d13d193981bb625953138f1e93e6fb65d1e9ec56eb9fa3b4050e8ac0
SHA5123b29d85583acac5523d0fe70ba9f248ade445e8bc331bfdd14474e40ea6a0eaf9d0723da5fda6e2cf180bb4e88b7e06ca375b19226700e2cec806279dec93aaf
-
Filesize
8B
MD5fc2a23e6907ad5af2ed5a9aa30329240
SHA17c452366f7b193471bcb2995097e3097e4eae8aa
SHA256b6195efad0b43c0b8965e678cea668c084c84b00ec5ab4447d750faf8393f92f
SHA5129ce1d2e8bca40ece1ba032bf6aba07eab3ae2410694175497056fc4dd43c3c331e60d28baf5b3d549c988cade0b94cc485218d773f75307e2d13e5f527debabb
-
Filesize
8B
MD5c62a05e7120f89e1a80f3d5d8b8fd498
SHA10e48f5e8efbbdd5c6eac1188f33f4a4ab1078e55
SHA256652a4ac3e637df49b762f719b29fa75f47dedb851f9a8c5d112c527b5a9113f3
SHA51295088f4576b8609bc04fa7ea7bc3c4bc32b89d8c34363a0df910edfdb8dc1c30e61154572f1606b9cf1dd2564b0d1d5a1f0bd76655e8404a7ff7f7aea201a069
-
Filesize
8B
MD5a4e807dc241cfa5586776afd95b02dbd
SHA1eff97d4e5ce5c2d04049ced85646d0cf19b319de
SHA256e88753ce3450e025831a012a1b6995ecb234e1fea65ee21e807d5ff71d467aa6
SHA512f0077d0c10c2f6001c062d51e1d7c2de5368f6bd366f84960a0f44e33ae71e44fe7a737d3a62d16bc56530b99e083ff4fdbe1c4dffd78e5d4d414eee67ddc246
-
Filesize
8B
MD5354c5917ab5d0e501e5bbeaad7217ad6
SHA1b69d6d238ab09f9ed5d5c30051c032ab69eaf417
SHA2568f467393ba5fb5c4d094d66823959d83a4b19ac5031a000692c0b054dbac11ad
SHA51275accebf65b4da14dac0e36427021d4cd3ba9f855e04fd446709465193d67df64f0ae89f21abc84c202ba16e7be1bbe9dc7249164be48efb302c6108669a2de9
-
Filesize
8B
MD5e59397020665cc5f9e1f9237b07ac72c
SHA15b67c06dd3f9f83c941227046c4f7b56af460090
SHA25605411a379ec60e43ae84182ad1cd9426c34e36830324651e71ca0516f654bd89
SHA512320a3a409da2decbb42db4300cd69bf78013c7f67f962b4f2972a801659a9c8f2602eb1390436c7fdf246cb940106bb2f3b12673ddcac8e3497a8335627b4433
-
Filesize
8B
MD5ef44feb0beb35fb89d98dcd376effa2b
SHA17f613fb9464ebc0c1d2934f627dbdf7f66b816e2
SHA256ceea3d8ad6cca431e6fe36141abbf02f0be7eea60e76932c5931d3a659c288fd
SHA512711c942ad116f63d391c88a17a7d23dae570fa17eac0599e8de46864f964d33fa2c6da33e74f637bb969635c86b8e47e7f9bf70ca62c2e328a34c97924e255ba
-
Filesize
8B
MD57507027bf495cff626513ef18a82c0c9
SHA143facc8cbbd0391d01585a61e8daef75427a7d51
SHA2568ee8270a22ba916d4ea936b572dd855003a91c4416788e984eb3ea8e9e8eb49e
SHA5127cfe5ee78b9873002d9feacb31ab4d7964c8cec4f4ff96dbcd4e2261a67e0f2772a50a6cc705bff9e69f3b09f531ca8e189f28e8f75ca8549077ff627f343b76
-
Filesize
8B
MD5f31a08925d4ff6e40f3309d6273e029e
SHA16d5cacbef0aa90eeff87e7741e8065c0de3e32e6
SHA256c889c6a71c18f73508993e23b5808f0230d2f24629ec3d048590f4c6422ac721
SHA51266bbd3bb480f19b8ef9995c6723cda0c5dea52d1b8e74974e50d0197372e73a84dff3dfd87dbf47cbe198309648083f402e0f593fe1b939b9952369c3bae2508
-
Filesize
8B
MD53c2588cbd3261fa29635acfda0bc9a2e
SHA1e043b52336b4a92d92874e9a4b6e425a22b9de19
SHA256d95e49d868245c8a6a01ae31f6379f363793f8582828327da6662feacc853670
SHA5121bc6b7e5addea79b96bfe79b7f7dffc8f611d846f5ba04491876bc2438f7cf3fd7a08e08974ac14453206bb8fa66f47c5d7cc3dc7a666de9cab91f19e2e78fcf
-
Filesize
8B
MD5f026adeaf7c17f312aafef5649817876
SHA151678cef33854f10923612412c7eb1bd906e2260
SHA256823c6554d8c588aae643d7f317d37bcc3f854c634d7a51d18409f4271f10950e
SHA5122bba9d2f871bead9768c507735fe2caa20c0bf5de61be295b5503356b20fc920d684c7d3c7621ea0ced2bf9fbf3027150be20bc732d7c5fb2d53468fa03efd37
-
Filesize
8B
MD566ff17eceb0d6b9e38f271de775eab85
SHA132b438f045b6729a51092e8ecd0f33ea0476b41f
SHA25609589f8d42d5be7a15fa4f09e7e8c44d291fceaa3d976deb036f8fbf17f4dd62
SHA512b0205518ea930dd2683b8919f56758cf32bd6cae94c9b9f3a88b8b68e6e6b589ba3f5f5bac698ddfb1b3840ace0adf7b6c3cf2fc7df4adc53a8c29d8a957b2eb
-
Filesize
8B
MD561152021df1327ee049e55e7b94ac02c
SHA1558cb8f9b31b9993397564acf1858a44bac8ed99
SHA256e9095d2024db9c7802a600c7d2a9d30d0c270aeea392719e5d3d3371cea0c0a2
SHA512116d3451db959355ed72197ff5c724d5926b02932a08ab520d11a30d5cca20709a05063215754c62b38f980b8189e3d20fefe323817351dbab47525c8df94449
-
Filesize
8B
MD5ee63cb01afea6677d90677f22ec3709a
SHA1545025b5510f0ba57b97bd50786d63f354076e01
SHA256036a5c3f3481fd8d19f5b6dfcce0f5e9caa1979cb9d86b23fb3ae2a1a759b603
SHA512b66df99f42d449fa9379945b17ee5c4660c6642e499336f089ae1e7cc5c3fd6caac286dbe54c03954bcac4521b49bd97cadd4b8ed30ebc154325a3115a743fcf
-
Filesize
8B
MD529a88a25bb3a6e7f487b062a50be9fba
SHA16b2e08ae3c60bee8dc33545d0889d8f35dfc9fe1
SHA256cd78461adffa0b26519d43735f456d9cec95ade512418bd73bd00b30d6d73df3
SHA512ed2eb146a867b75b63d4b3a19b2c843f3676da2c43c5d09aed332da739902cece0b9942b2aa9ac08ec93a096ca7275447acdd41424f9ef3aadad9c1e91df66f3
-
Filesize
8B
MD55c8af80c67893a2943f306bbec517b3a
SHA1eea82912e55251758e2d21b163cd3d38a6581aa3
SHA256116750fd9c623a9d21899474348d426c67f90408d1eaf14716aee43e4fdfcfc2
SHA512e59989ee62e6bff90f9593f0e8940f29288f04bef2407650a0bb73339b56a472650f9b4121f0af74ef097b186820ade5fb92c42944a8f795c02b01929a6994bc
-
Filesize
8B
MD5639d35417d4f1dfe0624bb0071512b93
SHA1a61ff5d798172a92f7e0d2363d4172f469132f05
SHA256f693f00240ab3a751a663a53597125713176a0f997bdb91037b869659692a070
SHA512db6e4db2ebd854b4c3b2dcb57003e02dadc3b3a4a26868e25ba40757f4d6df015081b2be91e0658e3a8ffd6636e642ee921ca1c7a2f0e117a74ad80601d3a773
-
Filesize
8B
MD5c7b8128031ad614739d2f6342825ef28
SHA198209bab3edad84d8b84d8a7afbd646b5aaa9b64
SHA256304b01cf04a0fb19005071fbd13e8f98f7990dde2ccbca90d2999510bafde0ce
SHA51209af95d1345d119ffa799af145b033204758decb7956baa36f69c1f73050c62ee57bdde6837696adc45efbf259dd243d04b37978f2ad347b9d13f23c30bfef1c
-
Filesize
8B
MD5df6b3a0304d6c392dbe82f879c24ea73
SHA1d30f9d8143050a9f6a1c6ec1532c2250e9a9ded6
SHA256fe68866d4d9d07696b3638beccc2054a5f2612fc39abb87dae99f3773f6cbb65
SHA512483403d9c10d27209e201bbad65914a8cee8d38d35b7ad412f6a5d72b34e310afdcb02a2ce4a5ac2bc0a633e38fc3233f860d04c4d7df9ec59c08600e7d7bb8e
-
Filesize
8B
MD57c1698ed6a5444433eae975c775d6169
SHA12f3abde62d703101622e7f79cdb5fa422fefde69
SHA256676a7d60b32670430a915ac0d0482dc00cf60c2fcf967cad837db2559445894e
SHA512ae7ebb6b712370bbad68c1f9e4688d11c1d193783b09da15c64a492ff6d483c18aa14c8ab41d34627f3049a2ee9539c271da55ab0f4f80c07ca393761cabc1e7
-
Filesize
8B
MD504f1d0e4955d3042f14163bba4b478c6
SHA1ac8a160a8fb50732eaf11ee52d71b65c35961028
SHA256facb9a665013c03a58d4d4a2f4e2c5c322f374f472774d76811ad62cf96cf97e
SHA51262a3c6daeb2b61c2a9efb3ad16d4ad51838412b9ccd94df413d673402b0c1385f4303abc5bf09ae03ab2632a27d5064323d2631e912a5c4f54eb69e40a05bec5
-
Filesize
8B
MD5e7eaf17564c44f9971c9cdff09325090
SHA1f446f4ad2766be221f259ca4eaf7f1e29dad0c86
SHA256c405516b312d60e927731d31ea2c8138d753fe668856fc05c9ff0e7e977b136e
SHA51282aaea6bb2e14c101d4e2abc4b8511b98c3a04f313be83834ce3cebdca9662e767350518d8c2983f139e1ae97140b1f25fd23573d63a9f3d39bfc58449d5388c
-
Filesize
8B
MD594d183757d99b90cfe4b4eea49d72145
SHA1821f024e4a77bee1a92600faa365bd3c83e7e863
SHA25682ba86a8e8a659535b61a055ea32d693d809f161894f2deaa7920fd3b2414594
SHA512d38a4c476d6d5483cdb6495e41ee3ddee3e0528de7de64d6f4e78f5848ebf6a1a8c9b98e98ca7071c1fcc429cedaea22aec870b43cae4b95b1cb72170c561108
-
Filesize
8B
MD561d5e6e727adf272da08931414b56f87
SHA1ebf22b4e42aff0d40922f7bea52c13edc558c398
SHA256150db140382ae2435a6b874e4a25b5f9ba453606aed2342f5fde1434c987e6d9
SHA512f3489882595ce266606351307c323635ec1c85708125f7ef40e8b4cfc1e175635ea2b0d83c6c7709763953a47c7a1a54af6c5c62a5d0bbeb6344f6c587fbf966
-
Filesize
8B
MD5b6efb3b71ebae8219bab02dd019e5a1e
SHA176072251f63c312ca8461998918519e12943beba
SHA2560fb63de1d87bb73d77cef5b5f5f33f084307c1db038061aab215853dedd1c7d2
SHA512122b0dd8a41b295df7d3b224e5fbf6ceb68be023936c5a5e605b47ffa5ac3bc553a8323a416158fc553890f9d927fae330ab962a36815e92b609f480776f3b81
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
2.2MB
MD5bf3f2215dd6e53a9b5ee3522e2fe3121
SHA1cebc14da4c2d9087047ee323bc34852fc2e73360
SHA256cc3c69f92b5b1bdd604f68b17f19c237df1296853cc1feb501133d8f482210bf
SHA51209646384cd58e4c8f81d36f84c62e22bea4baaa59d4db9a682ac06e90217130408d487008103e47f7d03ca3f7d845a255d7e4ad161c530929280f9967907fd38