Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 22:59
Behavioral task
behavioral1
Sample
3c248596eafdeccc28d983809fea4c50N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c248596eafdeccc28d983809fea4c50N.exe
Resource
win10v2004-20240802-en
General
-
Target
3c248596eafdeccc28d983809fea4c50N.exe
-
Size
103KB
-
MD5
3c248596eafdeccc28d983809fea4c50
-
SHA1
419926202214ea9b384e81e3a928355bb7d5567f
-
SHA256
bff61f7099b4dfcb387988e27831eb592918bfc32af9b8427c37cc21b7289f90
-
SHA512
9afb84886ccc1fc569b040678409b3401f6030a4ef6ee25d2f3950a7ead005f726d4f7addd411bcc1638342203c8a987f3c60dfad7d9e8debbb83bd22b2679fd
-
SSDEEP
1536:CTWn1++PJHJXA/OsIZfzc3/Q8asUsK8/8TTWn1++PJHJXA/OsIZfzc3/Q8asUsKy:KQSohsUsxk3QSohsUsxke
Malware Config
Signatures
-
Renames multiple (4783) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 696 Zombie.exe 1044 _desktop.ini.exe -
resource yara_rule behavioral2/memory/3652-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x000900000002346d-5.dat upx behavioral2/files/0x00090000000234c0-8.dat upx behavioral2/files/0x00070000000234cb-12.dat upx behavioral2/files/0x000200000001e55d-15.dat upx behavioral2/files/0x000300000001e55d-18.dat upx behavioral2/files/0x00030000000229a8-24.dat upx behavioral2/files/0x00030000000229a9-25.dat upx behavioral2/files/0x00030000000229a9-28.dat upx behavioral2/files/0x00030000000229aa-31.dat upx behavioral2/files/0x00030000000229ac-34.dat upx behavioral2/files/0x00030000000229ad-38.dat upx behavioral2/files/0x00030000000229ad-41.dat upx behavioral2/files/0x00030000000229ae-42.dat upx behavioral2/files/0x0003000000022923-52.dat upx behavioral2/files/0x0004000000022923-61.dat upx behavioral2/files/0x0013000000022943-65.dat upx behavioral2/files/0x0003000000022944-69.dat upx behavioral2/files/0x0003000000022946-75.dat upx behavioral2/files/0x0003000000022947-79.dat upx behavioral2/files/0x0003000000022948-83.dat upx behavioral2/files/0x0004000000022946-87.dat upx behavioral2/files/0x0004000000022948-91.dat upx behavioral2/files/0x0004000000022949-101.dat upx behavioral2/files/0x000400000002294b-111.dat upx behavioral2/files/0x000300000002294c-115.dat upx behavioral2/files/0x000400000002294c-122.dat upx behavioral2/files/0x000300000002294e-125.dat upx behavioral2/files/0x000500000002294c-131.dat upx behavioral2/files/0x000400000002294e-135.dat upx behavioral2/files/0x000500000002294e-141.dat upx behavioral2/files/0x0003000000022952-153.dat upx behavioral2/files/0x0003000000022953-154.dat upx behavioral2/files/0x0003000000022955-158.dat upx behavioral2/files/0x0003000000022955-161.dat upx behavioral2/files/0x0003000000022957-165.dat upx behavioral2/files/0x0004000000022957-173.dat upx behavioral2/files/0x000300000002295a-179.dat upx behavioral2/files/0x000300000002295c-185.dat upx behavioral2/files/0x000300000002295d-193.dat upx behavioral2/files/0x000500000002295c-197.dat upx behavioral2/files/0x000300000002295e-204.dat upx behavioral2/files/0x0003000000022966-218.dat upx behavioral2/files/0x0003000000022967-225.dat upx behavioral2/files/0x0003000000022968-229.dat upx behavioral2/files/0x0004000000022967-233.dat upx behavioral2/files/0x0004000000022968-239.dat upx behavioral2/files/0x000300000002296a-240.dat upx behavioral2/files/0x000300000002296d-252.dat upx behavioral2/files/0x000300000002296f-258.dat upx behavioral2/files/0x0003000000022971-264.dat upx behavioral2/files/0x000400000002296f-268.dat upx behavioral2/files/0x0004000000022971-272.dat upx behavioral2/files/0x0005000000022971-284.dat upx behavioral2/memory/3652-967-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x000300000001ff7e-5442.dat upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 3c248596eafdeccc28d983809fea4c50N.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 3c248596eafdeccc28d983809fea4c50N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\PresentationUI.resources.dll.tmp Zombie.exe File created C:\Program Files\Internet Explorer\sqmapi.dll.tmp _desktop.ini.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\messages_zh_TW.properties.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Calibri.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcR_Grace-ppd.xrm-ms.tmp _desktop.ini.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoVL_MAK-ul-oob.xrm-ms.tmp _desktop.ini.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_MAK_AE-pl.xrm-ms.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.Win32.Registry.dll.tmp _desktop.ini.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTest2-ul-oob.xrm-ms.tmp _desktop.ini.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365EduCloudEDUR_Grace-ppd.xrm-ms.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_MAK-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.scale-180.png.exe.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Reflection.Emit.ILGeneration.dll.tmp _desktop.ini.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.Cryptography.OpenSsl.dll.tmp _desktop.ini.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019VL_MAK_AE-ppd.xrm-ms.tmp _desktop.ini.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_OEM_Perp-ul-oob.xrm-ms.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_Trial-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe.manifest.tmp _desktop.ini.exe File opened for modification C:\Program Files\Common Files\System\ado\msador15.dll.tmp _desktop.ini.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\vcruntime140_cor3.dll.tmp _desktop.ini.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\MSSRINTL.DLL.tmp _desktop.ini.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.WindowsAzure.StorageClient.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe.tmp _desktop.ini.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\PresentationFramework.resources.dll.tmp _desktop.ini.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\PresentationNative_cor3.dll.tmp _desktop.ini.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019MSDNR_Retail-pl.xrm-ms.tmp _desktop.ini.exe File created C:\Program Files\7-Zip\7-zip.dll.tmp _desktop.ini.exe File created C:\Program Files\Common Files\System\ado\msadox28.tlb.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Collections.Specialized.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Quic.dll.tmp _desktop.ini.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-stdio-l1-1-0.dll.tmp Zombie.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\sunjce_provider.jar.tmp _desktop.ini.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue II.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Trial-pl.xrm-ms.tmp _desktop.ini.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019VL_MAK_AE-ul-oob.xrm-ms.tmp _desktop.ini.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\MICROSOFT.DATA.RECOMMENDATION.CLIENT.CORE.DLL.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Windows.Controls.Ribbon.dll.tmp _desktop.ini.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail2-ul-phn.xrm-ms.tmp _desktop.ini.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.Principal.dll.tmp _desktop.ini.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\System.Windows.Forms.resources.dll.tmp Zombie.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\dynalink.md.tmp Zombie.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\ext\sunmscapi.jar.tmp _desktop.ini.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\GostTitle.XSL.tmp Zombie.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\messages_es.properties.tmp _desktop.ini.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AuthoredExtensions.16.xml.tmp _desktop.ini.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp3-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\EXPTOOWS.DLL.tmp Zombie.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt.tmp Zombie.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\ReachFramework.resources.dll.tmp _desktop.ini.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-crt-locale-l1-1-0.dll.tmp _desktop.ini.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019MSDNR_Retail-pl.xrm-ms.tmp _desktop.ini.exe File created C:\Program Files\Microsoft Office\root\Office16\MSOADFPS.DLL.tmp _desktop.ini.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\vcruntime140.dll.tmp Zombie.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\bn.pak.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest4-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019VL_KMS_Client_AE-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_SubTest-pl.xrm-ms.tmp Zombie.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTest-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Drawing.dll.tmp _desktop.ini.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Globalization.Calendars.dll.tmp _desktop.ini.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\ar.pak.tmp Zombie.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\fonts\LucidaTypewriterBold.ttf.tmp _desktop.ini.exe File created C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_LinkDrop32x32.gif.tmp _desktop.ini.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c248596eafdeccc28d983809fea4c50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _desktop.ini.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3652 wrote to memory of 696 3652 3c248596eafdeccc28d983809fea4c50N.exe 84 PID 3652 wrote to memory of 696 3652 3c248596eafdeccc28d983809fea4c50N.exe 84 PID 3652 wrote to memory of 696 3652 3c248596eafdeccc28d983809fea4c50N.exe 84 PID 3652 wrote to memory of 1044 3652 3c248596eafdeccc28d983809fea4c50N.exe 83 PID 3652 wrote to memory of 1044 3652 3c248596eafdeccc28d983809fea4c50N.exe 83 PID 3652 wrote to memory of 1044 3652 3c248596eafdeccc28d983809fea4c50N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c248596eafdeccc28d983809fea4c50N.exe"C:\Users\Admin\AppData\Local\Temp\3c248596eafdeccc28d983809fea4c50N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\_desktop.ini.exe"_desktop.ini.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1044
-
-
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD57ef24d078f90f0224fdccc6f88cc3c2a
SHA17687ff36b34b1c0c33222fdd295c70fb2edb356a
SHA25690789ac3f7c294955ddb33d50240eec8dc6b2aa68b77899bf7b8324c557576fa
SHA51232cebc9b6be2d0f21d28b7bafcdca3b58c0c9cac4ec41462f0a238bdc38b314e1592b5351ca308c0585f681c7a8e498e99f70f22116986867e97e02ceb3319c1
-
Filesize
162KB
MD5b9e4fb4be359849008a05f9ce2a16648
SHA1343f42559bbf302be9a1f75e41b3ae3ae620d993
SHA256e4d0e5d5c6fad53de54034a953186a61ce306054da4ce17c12b193210b9e240d
SHA512fe52bbe71f1f8410a87d427d56ef5c7cf8f4a1a557842fd6ab756443e4e95b00c2416c4fe95f1e7cf237a1e0f059cbfddf89542a49c74509470c73f7448b3053
-
Filesize
52KB
MD5cbc8bfa122e59b7ad0abcababce0867a
SHA1ae8e9a39364c0f6cbf1d13ec6c3773b7c0255879
SHA2561629f18397d9f067231d22e7b9c4b183a478128da7ee63c1681f8704f71cd242
SHA5123df254427965a4271204083931f19d9e3cd7b3e556378ac56d7b899fd31064604dd822fd9469661dfb2c6f0022ca4914dc8a2ffb3af7a30309038881e3d42c2f
-
Filesize
118KB
MD5a1099a0b93feea144945aa8e9f486cc8
SHA158a55a8ee0cde3d7b92ef48f0bb797b3b2c5c822
SHA25664e4b358d2ed7808227cad10f7d0a85362993736f54bc0ad26575e49ac99fd13
SHA512cb81a0366906838334a75f6bc834de782be5686b606279d4b4218bfaaab0da80d7732d0a896433c94530f1caf369924af59b6c790cf90ed8b5eb9ef29db53905
-
Filesize
1.7MB
MD59266c5fdd42a567b3ae5dc7d725ecf0b
SHA1a1942afa2043d0b589693747ff130cefadad5e56
SHA25660eabcbc4bc4e0f7f025fd137efb7a188df262fb8bc93b29813a0d3d425ffe04
SHA5122921f68808b0ff3e17cce06415aeb47224edf3044836390122e493401f5a0a8e23c0cd5ee1e7c43583bf539de323be78537566b6f031d2156fe66ff9d0c567b7
-
Filesize
1.8MB
MD5b3be7366b4f737228eef99c769b406a5
SHA116d5aa31ac27d9b4bc3316b1ef5f0ae9abb00117
SHA256dfe5e1edf37711b1c97598382cdf36f145a4bd81b1906b0e271d20d7b361c576
SHA51280d82d0f34823c4e30fa935971a7f7d92e3536902cac83bfb1be5cfb2dd7fca076611ebc0552cc5db71d7ff4681f81c32b39eb1810b20ca04d4865925ce739a6
-
Filesize
597KB
MD51b3b2de964f26bf5606d3a661111c878
SHA10c2b68955c0039299960ec70ff302a1da6fa5e36
SHA25629350373e35ede9346974cc066679d79bd1c7d4a8bd96adaec527266cb52bd8d
SHA5129ba25fd56fc5f5767c4a6f86d4d8143ea0f27f181a53a2e436922b4cd6fc1361345bacd77e4d9212a0df1ef9e77293489f7f9c97fd6f388b55a439af917fccb9
-
Filesize
242KB
MD568b909357f398807566df85d67d75283
SHA18f233c38ea5ea57aa0e6aebf9493be45620964fb
SHA2568d27f238ea11a3098de36e30b88bb1dc70eb0ac4b3224150168a10a727cf96d0
SHA51217073f15c9778b46073728f7da25ad9b858db072d94bf9841d196e3c3570be381e6755ebec88810fa0b59ef51f2e5a8b32eb67f18ffc8bea0bb49e444dcfbfb7
-
Filesize
980KB
MD57a8c49cceac0ef9a4fb9a7d735e66ff6
SHA1fca96cdf69fe41adbeb22816ee4502ccb6d62439
SHA2564043fc4843a43de6b802a00e33b2c4b1de17edebc732b386e630f284f5683342
SHA5123912bdbb93c95eb8aaf5596078f8f6964ccd2633473b94df04f02201202952f309fa9553280efcaaeb435d3683fc072fcf3c78149fbff6965577c6d8139a4187
-
Filesize
984KB
MD58534ffe96e82988eba921413a9ea8e98
SHA1c96bce3a2184cbbf231cb98073a164f065b23f0e
SHA256542007f4ff2b5ae187e8ad39ae8656f6277fd62b9c36d7750c0f836a3d696e8f
SHA512521f1ee77a08a1ea84e6390d705998b50a3b30e7cbcb5b9342820e1187fbbef6a54a0eebd90d57aeb8f3c8e04febf6b74e59f57e717c615f2c19721b941721d8
-
Filesize
737KB
MD58fdcb655603b9dfad138ba4b5d3c2123
SHA10e37a44963ae2d9f42a96f755e792838237e3b53
SHA2561169c81f3dc7d09de7f2e8592a3fe777254ecc3c86ee6982516bda5c5291d2c9
SHA512e2aa653057ef45da825c43d93531d66e7e47818cf785292b95f6ca5afd8254d3c3daf2aaf36b3e8f00b3c0afb07f028f3a3c6575cd078febfbf7d1d871f03eea
-
Filesize
63KB
MD597357bb72e484778cca12815a6bdc6fc
SHA16fd3c23e6d59ea2020c9688520707ba292033c5a
SHA256be2909f3e786834f2ee50ef60ae46c1765e8cf52757eefc820938900cad3a4f7
SHA5124670235379b2f6f81299f9ee17df4d0ec790a6a8a0b91b3e04d7a0a111d6b3f65e88339803ce8726b2689afe6a835c31cbda863ea6e226876c36ec2c8c99fced
-
Filesize
62KB
MD55fb1a9afa6f6333163d829dabb4344c6
SHA18bfff8114e5f8747028b788084778341a7128f7b
SHA2569eb591cda1c9fa51c34408de6debc63e07548d3a524a49f65947f21ef2da96ae
SHA512dad420656cc8157b066300bbc040f934146ba3d4605ed9d8fcec75642d2d9a92d2d5550daa45d3ec6e73527825ebc326d9e379ae2a165a6a4b281a75ccb37551
-
Filesize
64KB
MD50e45d60dbb660b07126c9bd730700708
SHA12cb943abfbe0ac2c8b7c06eb956e744a3f8335e6
SHA25679b2b2955f9954f8cbba2c38f697687ab5d9b2c2c666a20cd971775e041194bd
SHA51278449bc2959b930edf7f814552424d24b8cadf595e1ac6174315be180e6f283473e3927820251c5c288d0f8c2f08f57001a3874a8e8ed33a8e8856dff256238c
-
Filesize
65KB
MD52539e481d01b9d39e3a02fb51c50a007
SHA1f713db953bd9a02b4e5d18fd1aa9db6bfdc6f7fe
SHA256667ae80d360a645dfdbcda3aad87409dec090ba0d2ba76a545ff3fd58fe2cc36
SHA512885c6954fe1484e4541aa851426d4f218f39149b21050c1c2d6573f07a7e4ea5fbf3fd5ea074d2c272ab6578f779ac0fc238d8776ec77e9b05a0d4c6df6fcba3
-
Filesize
68KB
MD5890df15fbe2cca4986544ebcab1c43ad
SHA16ab2533615ea7a7fb8ed9e4f28d976743a76d875
SHA25677a4fea3d6865a185fe1bd0f6e87be441465908489acb86e6122f8b3d9b740f5
SHA512c488a3660610ebf38121f45559f5e8da4ebf6e7dcb3fcd0242065fcca44d85ea2aeabdc66a505629e36b5ebc35ebb6f5904516629b3a7e46bcdd4ca4ef4c7946
-
Filesize
58KB
MD502ed6f7025b88da3276956d347da16d4
SHA1fc1bfbed056d4d031719adff0cff983021bdb801
SHA2567f03ac59bfb15bc6c2b7d6750cc5d9b559b32389d4c07c11dc678ccb59f3163a
SHA512512ba545059f706cb97f915bef38966791c8913d6bbc2d4c23134d1677567f2ea73e21dc48da84b3b100b5e41bf2c0b66b7a1c434747dee176c648a76a88a7dd
-
Filesize
62KB
MD57e0ff5ceeccfb73f0356d3661621ba85
SHA179bc6d50e1bbd82bb5164f37b023e26bd956476b
SHA256a5bb4c9b1451e778a04209345a1e186ddd7b1cc768cffc605f95b22eb15d6583
SHA512d944ff665e739c5a51057385e5342759df4f9ae785658dde3888bf528d563227b7c8d29ff74e3df16ecf967896e089defe883ebf3021bd4542c226725f564ee6
-
Filesize
60KB
MD56abfe55ab0c8413791a40ff5328827a4
SHA193ba233ee3ea3de1e718dba814331702193df704
SHA25687443b8255a6097ad1eb4037ee7cdc42ccbb7d388282a0d468a122912b4181ce
SHA512dc434a3ad85e995306d4835535a963cb5ea95167e5bba0192768831529445f9ddfe2da59d8f3e42b0f71c2a4ba6f7a1bfd55f9f6338066ebbc096057aeb2c843
-
Filesize
58KB
MD5ec5ab525d8b2616536771a865860556c
SHA115d8f1df4493e307f2dfd193b5cd1e39e1c3e09c
SHA2564cbde49562285f0c59716b4674fd4a127d9d1448f402dca9c0d4321d56c98cbb
SHA5128ff2f428a4c28877a4a63b7b81b729ad477925e53410d773428a0bc7c84e9f1b1e69e33d0b8f5ed4840491a1053aaafba157c7a1748efa53c2ad4db7859c30ae
-
Filesize
59KB
MD59cc84c6c15f1083b37af46419cab543a
SHA14cf9e209948357a377d4486821c8bcefe7a22a71
SHA256b50712f9b413593b9b7bb32f42a94913f198ce87bc00231e2df98706c6921450
SHA512836763d262aeccd8b94922fab08f9a2463131bfa590a9f4e7887875a1aea9a9ae590a98db1592e64a7595e769120553fe323f7df7d5ff01dc2935e105b550a1a
-
Filesize
58KB
MD5ee918b2580442d88c626144b6693a199
SHA1a550d2fea0309d21cba26a172e16eaefde0aacea
SHA25654b404d6ae9a703cf1cc9045a8c1fdcb372a2986d309dc4af320d36ada09b926
SHA512a8f2f0115bbe9cc6a5fd29e41ddd2a2276297e6db084587d1144f039b8eaf07149435bff202c5afd543d4c514c4ae316dbfff9a1992e0be8a2f7cdc0056cb815
-
Filesize
59KB
MD5c69f5b347fe5d17915680110b35d709d
SHA11ab498492050eb3b99ee000ff6a88098ee3d7649
SHA25630dcc51516ec6c1b87c737b84a6b6a3d590c756dcd90617010d3ac6f84ebb3f4
SHA5125bb2d33fc6498dfc55bb613203f939260126890a7bbf09641fb3d53d97a56eb23f0b8a0288641e4b186ec3e4dd814c75a0f1f1d2a0fd3ae4adafd031470cd4fa
-
Filesize
49KB
MD5ddd07544e77fb06186a8dd6734df2d6f
SHA13ad2d8d1ec762ef15f8e4fa466e521833c040a20
SHA2568deabb3431551cfb24625aa963a14ade750f9417ab8f231f97a233dc8660ecd3
SHA512e24ce5a0a835fb4b4345bcb51b1d54a56248cc1e58c8b64d4d4332ee5a4de88e26965c37bfc03baae34faaf267fbb4d6dbfb0eb28bf1510c9150ac9711627a2d
-
Filesize
61KB
MD5c187b0a4a5464576d91b165ed78ad127
SHA14fc526d7436330e70927a6b9c72b6f3b1990675c
SHA256dd6539a30abc310843b7e86f6054ea93eb5ad24c181f3c600a05af1e4f493eec
SHA5123c4a9d2701cbb61471c03d0e825ddf2b3b7f0ffd1627866617c23c5efb1f5ebd991c0b06b447b339a4e4627eb3f5b364cb9c683159da9162b59e797e83e8000f
-
Filesize
62KB
MD56fcbcb5491254b93e3c1fe8b8f00375e
SHA1fe1f939e31900feacdddb0aa0f4e5dc8ee856cf9
SHA2568ecbb1918e703307f3274df9910368457e383a8475030c21223d85104f5069aa
SHA51252bbb8fe9cf43961a933106d5097fcec736296cb64d4f21a2d129da4a28a80e0d764f49b5f156c2f6a3a5e8fa6c5481fbf02c3fc020b8f07a1acfe7cc649cbdf
-
Filesize
59KB
MD52df602fc36715cfc2c875bf4de148b00
SHA14483a22ea239f9949080895096bf30bceb0c11ff
SHA256c6c98b3d7be77a29abbfc825437536fdab58f8512edc9decc30f32615e417f23
SHA5121e08382c3a44c128a579e5f087aacbccfce6699c1d21444b2be302e171d8d8346637db08d9ce4ff61ddeebe3e596e6952e14fc2f0a1201a0f30c8bd7859e03fe
-
Filesize
56KB
MD53ef73e198106e81f0396bb0780bf0b43
SHA14f65f5177df53a2b010b9d95c164c78cf8571945
SHA256d50bf84b8876f8bff0253e5876abec5fe37dd793420188d3c9e94809c0bd0675
SHA512457bcd3894d2a8cdf7281cd752f15081ab3ff420711f26c330bb2656768b927c7cf9d8e06388ac2a021d7fdb0bbc5e1eb10f14f6710a49703c54d908bb67691b
-
Filesize
70KB
MD56177939b3be515af2909febda0052aab
SHA16e456fa6b595532cf3cbb7c14c22865f54be76ce
SHA256eacf1a0a2e0e26783e536e6bf3506d7942b1a67d82c3815ab0d222163395b11e
SHA5122a15761559c0115ac9aaa24ef6916e9929cc3b5c844c08239831e44c87b4e6cbf31954e417e8808b336ba3edc5e8d8fd9fe668f5277c96461e3364ad4ee5dfb9
-
Filesize
48KB
MD56fddc95e9d8f5cf5c1787257bf32a974
SHA13e071075a6d3116e4a75489508b8e3eb29652b67
SHA25698a77965d2441d289d02f68aeff1fcd82e7b11e748658bbe53b5451648fd88e5
SHA51230be3179ea254f2bb57228db4243e13ffcf2fd8767db3891fd6623e8b26f816903794fb3d294c88125f1bfcdabd7d75b3c7396b641d70baadc537e0524aa225e
-
Filesize
52KB
MD50b9c320bdd6a2949a9a115be215956cb
SHA14901fee68571be2793078efc703a2754c33ee7ac
SHA256579a90718acb32528c7cfd0fcf047c6c9a6dbba41592dc8de6b6233b30e6f9d7
SHA5124d1fe1e60fed20afeb57c2fc22cb647a516c32df03db27f41580e54dc3985dac7d63087a5376cf77307b14cfa40070a37a83b667f3d59cd0221d5b97dbf88481
-
Filesize
70KB
MD5f1681e5a8d681c56e1b379a2f5bf82a2
SHA1ab9d0b671d516b61708d1cd16fbde97e7602d6c7
SHA2569e899588ef85d670d60942f4cb3075c178c91889b0b429c31dbb216437e7614d
SHA51214dd692ac8af8fc11a02dceeebf30415639aa1a5b588b4b2a6f221377c22f357bb2334a71e020b15648114bec098a735d879c1ec3265d6fed98f169479905482
-
Filesize
59KB
MD5cd7a8df1a20a6653d9bf716c6f1a5f0a
SHA145eb8452d5c9db7917809b0053d6ebedaaf9181f
SHA25684f87a9e0cb7192dce949fc13effee942b0c1c1c0e8b6e7ff6c8d51c82b6f2ee
SHA512aa40d344fcc2ecf13804d9c576b955c7de9c607f7a3726ae40f4550b94293a9d7b8705f5d68b439924aa40e4c8de8ab5fdc49bbfb048925baf7d3673ea129585
-
Filesize
61KB
MD5d4e5e7f4a29affe57c1818d8fd45c0f1
SHA1106f420301f71e09d6aaf21afd97b7142238d16c
SHA256cd501822c00345a7fd2bb6b1b259df90a02601479977a5ce189a0d550b83496c
SHA51207276a8b360119d85098510d985d642a43cf4be73cb5e1f884c35520b605b1b5113f070769ec520d239092f9dca4377fc3a5e9d329f0db6a4e386c812145a0a1
-
Filesize
62KB
MD5c075322ff41ab50a75b17727156b6449
SHA14225670711756656a5d5265cc072c56b0e147748
SHA256465e17f0d3d8ad5a455721d9efb24261fc3feaa8330056f9fd41c948a07f74a4
SHA51214450a25e171705da6dd24cba25451f0f1ac1c87fc14d55a48bef3e9d23b73803e75db31b9f37a823fe6b05b50bf939ffb279378cd98d682b7cc16ab0ee1a2b0
-
Filesize
65KB
MD538fc5ceb2f7bc12c9772a779d0ecc730
SHA111ca5fd7d99ce5c3196d8d1c0c0ca3cebdd03ab8
SHA256e7bdeb256ce7f6b2690451fa8f6b24dccc3abe0ea28bbc6195f55be51f37adc1
SHA5120ad3dc8d4bdb840df06be3037b1a45a35fb1ae15e1a52b479ddbe17157235a695a26832966206cde21b3ffe8ad766aedaa823c7d1c346d64bffa66fe8e12bb77
-
Filesize
61KB
MD506e3434e285f03459f40f08e03539020
SHA1988d4723570e82b0c09c1b100d1f6e8db36efc4b
SHA256c82392c4701409b50e0207b73977168f01b14b115724f23bd612117525a08e25
SHA51254ef3c3087f69540ac8273aaec879c51590285799a0e7ba26c342a5460699f0202cc3afa6895eb758a68cbf571bb5830caf54cc8f30098c70cffa9a25873a623
-
Filesize
64KB
MD5a2bf6b6ecb2b07b26153ac8bdad70b67
SHA19085db1dde91bd1b6432330088eec68dd7f51c19
SHA25604b3dc02ea1dcd3728923b835ee4d3620bd9fe215c923abb379ae46e62ec6378
SHA51287c6dd6283d595041c4ae376cd5751fe694887c9a875984ff5f50fcfc485c1a0f96a01dd5d4a45e95dda5a29c533411f8bdfa971cf17497fbb4ad95131ae6e78
-
Filesize
63KB
MD52b6f9700cca669e2ecc93cde3d7db272
SHA17019c105e9ebe8c8aed3fe1948edc81963d196fa
SHA256504859488d7250c665e5230159bc7468e42c29172176db7ec5f2704d919ba720
SHA512b76efbde63ba2ca75413ac4d54dca5a51eebe238c64b6ce02c0165479db221ec5f25adc7d54b10e07ba543db316bb0de8b2110dfa8c5ed2957f6115e2a73fb58
-
Filesize
61KB
MD51cf135107ecec4fa901faaa1f32ff120
SHA10216288169bdd78b09c7e829f36ecd3f20e0d48a
SHA256ebf047f305c950130bc5df6393dbe35770ce36111fdcf4b716917f83ccd231b4
SHA5125a665b88ac3283d325bf94b12b767e54f0329e2986d8e5cafcae20524592223a7712ac12834a0706a1069bb10bf96e0654c1a441243e1a06083ee37666a9ce11
-
Filesize
59KB
MD5cff1be889429d7e17e37801da2ed5b3e
SHA13051ed9f905b357cec271819e4d2362a487037ea
SHA256fb9a722919ea0476583afb9083e962a3497ddca7ef74424265ca3497f6564a25
SHA5129389a83130b9882db2f584ccb9309566b53e6b02d805c119cc645fc72e7091b7ceaf45fd20b6b080ade068525803ca6254e0bb17fd80663658d468e309d01472
-
Filesize
58KB
MD56ac050e373d483eb088ef4efb324c346
SHA11553aa7d5273674320ecb4831651b31735de485d
SHA2562c3349331026b1f4dab9f7d48ee5123cd66b50c15c4e526785307ec4f847e226
SHA512be93cbedf9d530e7a8c0d77a60b1c1b313387de2bc28f36db8d26b722daeff8973d0e3cc55111d87f41cb3762053946304841d0c5b9bf8edd7d8dc813264367a
-
Filesize
58KB
MD59dc35802dc9ff212b548c1784d67a431
SHA1d8bbd6924b0d753a70e8296bf7ca1040c9c29ed1
SHA2567c835cf9dd486bba271dfecb4b1669da62e0f775ec8de707c6bf27d26ee8d04e
SHA51242ef45e8829ca85b90b951c03863cf71cca7b0de7a2dcd409c8f06d74859768127044ddc77d9bd254876a53b4ca1a3a2467ec78a664ac8d2770879dcefa5dd07
-
Filesize
73KB
MD52303c6bf4d42b164a09e82341825ee50
SHA123c213a52f50cf9d0a3a10dbd1577f08c5145ebe
SHA25646f963e2213f21262c23043e0cc053edd5835c860c176813a6cf608d2c0c8f0c
SHA5123e1138877b38f586a523b353ee7d3ba35ba84e9824774081c665862dddf1ce9500bc449d31d6299fed3e93aaa45460b3fc4ec5aab158f15f2e7d0dd2a884bb86
-
Filesize
74KB
MD5e3262a1e60564cf075253cc391384f3e
SHA16c92d92fc0d7803d10650834287c45e8658ff24a
SHA256a7c48e0f2ca25d1d0ca60c2714c8071d6fd4b057288ba3679cf041720dbeb227
SHA51207d9728bd8b86cdc25ee04532113aadd4c2d2a1e6aff660ad05c2aab5dd3c4148327ef7bb7ce93f11c5a7c858e796f882544c3433829312bee076a2b53cf2408
-
Filesize
60KB
MD55fbd7794e59c4146686cba8f9a2b1b39
SHA16b7b4e8033529159c697ec5f39ad01583a7f6b56
SHA2568fb8b27e12f7a948fbe2ce4bb026e21c2434339d823e70a8c99aa52c5fe4c960
SHA51264ad4f120b3d16cf5864b7f9cbe9634310847ddef91ab78e1d3d247c56363a17ead1e0a181607718497e18097c2a0f5f50ffef2856a51fe48ec11ce20e6b2810
-
Filesize
62KB
MD52f494e6c36fe75a2b714c20ddfe62050
SHA10338345d67d03ed0b4f340136b5a720f944e64b2
SHA25678834eac0eea788c62c42ec3a813021714342c808550aff29171fdc6b391cb82
SHA512dc9139e922737f411257fc4a762b7eb5f07bbb9b1587c9f01a769838d1a200ac6dda2350bbed4dc4735862dfa9c9297d21f911a9a869681b45e7ba53d9b58b13
-
Filesize
64KB
MD543769afca11fa7ea9d95305cfdf7eb95
SHA1c63ca9adc7363d0ebc3a11bcc8d14da3a9955d2e
SHA2567692ba0b89fa8159b017a187fcec6c7d6c194020bd7cb362b2ffac52882abf1c
SHA512c4cf6318730657fc74f3aaf2a87980bd9efb06a3a5117c4748a73384a4fe5ad3c80819219227f6f11b0585b8abc8bc1ba6becc5d37156ae404f3fe24a0df1438
-
Filesize
58KB
MD5fa13026fed298c6109575114cb2d2b57
SHA12a4e7b5fe13d895692ff5d7362f4e5a2cae52b1b
SHA256bb67544e0ee6fa47576008497399831e7fc134afc4a39839da74ac420d2b78b0
SHA512cc16d261c78f9e830ff492ee2a39f2a6e35ba652eb1158961a822643830e19ad280ab1ab0923f97594bbc1a3f6854247e6e3ee63cea77f7dcc36e73a42b71aa9
-
Filesize
63KB
MD59544830af2cb485960c375378e3a681a
SHA1a6264d874a4f605389a23596bf7b790ebc423d29
SHA256f7bea3d47e51ad6840e62a79c48477e60a8be0f5af78c1fbd21f63c057ab80d8
SHA51256d6c36b0ad43b4f90595fe1be4ac7f0e3905bcd190b1c02c65f2f82a203aa68f1c81f11da2b57bb6b75d8277967f30f7a6e1583c4dfa5a31c0f229ae26927e0
-
Filesize
59KB
MD59ed0c02955f67eaf5b1bc316fa28ed44
SHA1989051d6b2c78ed1fd12e16639ea19e2ef70c34a
SHA256f61adcdb1d18652827824364da3f2a3147e449d87e718f063583c74d02b281a4
SHA5121fd29ec97c8e55276bce4b2c0efd06c8f3caecc22161a917ed07c41d28507bbfc737f7ebe6a8ffcd3637541126ff4a340dc858bf504b4a75cbc7c70a3af41d6d
-
Filesize
72KB
MD53e1fa2e6e3be97f667170ead318e1f93
SHA1bc41015d8554d73f8d6da65f6714258d9424ad13
SHA25620377fc9420393bb9a4b176efa39988688b887a42b9fdeedb4ea394420518de9
SHA5123eed32bfbc033c3dd137e950b966398097b0b7fcc3c7bbff9b30978ec62d26630d317ccd90aba04aa96f1aa1e4744e6052d914de1435278e29379acb374fa7ef
-
C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\UIAutomationTypes.resources.dll.tmp
Filesize67KB
MD5ce0c50dad5d574f4d3dd2e4bc0f3bd8e
SHA12b47faba05a1c3a87377be48b563e05b7aad4430
SHA2562c1fdadbacd9f8feb2093024a62ae8a885f046f452328c9b9193c9138052e345
SHA512ab50693d75fa115621108d20647d5d3c48d60ad5ad0c020733a55c51a9241fed6e1445a1bd34bab87c86f2657fb424feb5ed70ab5df4fea7a6219ab3926fc4d9
-
Filesize
49KB
MD5ec2f71878ad630b3e9f7c4a49c6dd5bc
SHA17a2b10d54e283881e5aeb9b1e26fd8b8e7b6d3b2
SHA256a191e46e567f1407e31aafc6ea20762ea28fdb2b2ee337e195a1bdb4c6200c83
SHA512ce6c45f6146c22fad1b4c7fda740d5915c89b6a7b28bf636a5ab8fb10ad43b81252e733d3e190c7b71175fd899a990fcbeeef40e5ad8a92e1461e4b531d56d03
-
Filesize
53KB
MD52e58af72076bcf5906aaab54e2408cab
SHA11d6f63cf003f8e4d837f0f439c3ab8a799840010
SHA25631fefb379bfc5cf609ae699fed9473c8fc7ab4fef3d7597ac3e9dd2db645bc36
SHA512e383fbf70225acf670c39dd7d83e8f9168813410e7edb5376697935c191c8335ecac11384949a7667ca483e32bb46f3a96d43f8b44899ba76d02b720a1504f77