Overview
overview
8Static
static
6@创e下�...��.url
windows7-x64
1@创e下�...��.url
windows10-2004-x64
1PPTV_Android_VIP.apk
android-9-x86
6AlipayMSP0...24.apk
android-9-x86
7forqd1170_141862.exe
windows7-x64
8forqd1170_141862.exe
windows10-2004-x64
8$COMMONFIL...us.dll
windows7-x64
3$COMMONFIL...us.dll
windows10-2004-x64
3$PLUGINSDI...ad.dll
windows7-x64
3$PLUGINSDI...ad.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...us.dll
windows7-x64
3$PLUGINSDI...us.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ad.dll
windows7-x64
3$PLUGINSDI...ad.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...og.dll
windows7-x64
3$PLUGINSDI...og.dll
windows10-2004-x64
3$PLUGINSDI...er.exe
windows7-x64
3$PLUGINSDI...er.exe
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...me.dll
windows7-x64
3$PLUGINSDI...me.dll
windows10-2004-x64
3$PLUGINSDI...00.dll
windows7-x64
3$PLUGINSDI...00.dll
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
@创e下载┆9年绿色无弹窗安全.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
@创e下载┆9年绿色无弹窗安全.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
PPTV_Android_VIP.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
AlipayMSP090_PPTV_V3.5.2.0424.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
forqd1170_141862.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
forqd1170_141862.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$COMMONFILES/PPLiveNetwork/1.0.1.1919/$OUTDIR/GdiPlus.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$COMMONFILES/PPLiveNetwork/1.0.1.1919/$OUTDIR/GdiPlus.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/AsynDownload.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/AsynDownload.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/CommonFuncDll.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/CommonFuncDll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/GdiPlus.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/GdiPlus.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/GetCommentsInfoDll.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/GetCommentsInfoDll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/PPInstallLog.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/PPInstallLog.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/PluginInstaller.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/PluginInstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/mframe.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/mframe.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/msvcp100.dll
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/msvcp100.dll
Resource
win10v2004-20240802-en
General
-
Target
forqd1170_141862.exe
-
Size
14.4MB
-
MD5
9933858861d5498455bfab25258efce8
-
SHA1
cf1015b9de69f4690744c8cf863a49382a617b0b
-
SHA256
72fa08b2b85508bee44c6c8e0520502f1bff3b26ab532c0d34f1d1eb06869b44
-
SHA512
0277a622c2455ae447d679a2bc040419b7b1ae27303619035019f769514f6e0984f1c9cc43349899baca39313657c26f03984eea182b484d9278ee54b131179f
-
SSDEEP
393216:LUMVtJaxkTiqHhPcV6T5n2u+1+uGeKOa+2t/Ae:LUMVnuqHhBGG+EJ
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 7 IoCs
pid Process 2408 netsh.exe 3044 netsh.exe 1704 netsh.exe 1408 netsh.exe 1960 netsh.exe 2164 netsh.exe 2764 netsh.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\PPTVService\Parameters\ServiceDll = "C:\\Windows\\SysWOW64\\PPTVSvc.dll" Rundll32.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PPTV.lnk forqd1170_141862.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PPTV.lnk forqd1170_141862.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 8 IoCs
pid Process 2816 SkinConverter.exe 684 firewall.exe 3020 hwcheck.exe 2588 PPAP.exe 2548 PPAP.exe 2920 RepairSetup.exe 2888 PPLive.exe 1668 PPAP.exe -
Loads dropped DLL 64 IoCs
pid Process 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2588 regsvr32.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\PPAP = "\"C:\\Program Files (x86)\\Common Files\\PPLiveNetwork\\PPAP.exe\" -background" forqd1170_141862.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\Documents\PPTV\PP年度必看\desktop.ini forqd1170_141862.exe File created C:\Users\Admin\Documents\PPTV\PP收藏夹\desktop.ini forqd1170_141862.exe File opened for modification C:\Users\Admin\Documents\PPTV\PP收藏夹\desktop.ini forqd1170_141862.exe File created C:\Users\Admin\Documents\PPTV\PP播放记录\desktop.ini forqd1170_141862.exe File opened for modification C:\Users\Admin\Documents\PPTV\PP播放记录\desktop.ini forqd1170_141862.exe File created C:\Users\Admin\Documents\PPTV\PP年度必看\desktop.ini forqd1170_141862.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 forqd1170_141862.exe File opened for modification \??\PhysicalDrive0 PPAP.exe File opened for modification \??\PhysicalDrive0 hwcheck.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\system32\kindling.dll forqd1170_141862.exe File created C:\Windows\SysWOW64\kindling.dll forqd1170_141862.exe File created C:\Windows\SysWOW64\PPTVLauncher.exe forqd1170_141862.exe File created C:\Windows\system32\PPTVLauncher.exe forqd1170_141862.exe File created C:\Windows\SysWOW64\PPTVSvc.dll forqd1170_141862.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\common\stdDlg\button_down.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\common\stdDlg\std_dlg_restore.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default2\playctrl\stop_disabled.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\common\edu\begin_down.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default2\playctrl\unfullscreen_normal.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic\passport\passport_bot_down.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic\passport\passport_menu_down.gif forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default2\playctrl\interaction_disabled.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\3xgiving\passport\passport_menu.gif forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic\common\radio_checked_disabled.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic\list\list_hot3.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default\playctrl\mute4_disabled.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default2\download\dt_ShutDown_checked.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default2\mainframe\tabBox_down.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default2\sidelist\close.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic_b\controltoolbar\resizenotop2.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic\hoverinfo\gbg_right.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic\scrollbar\scrollbar_pagedown_down.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\3xgiving\common\checkbox_checked.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic\playctrl\SliderThumb.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default2\search\button_search_normal.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\3xgiving\scrollbar\scrollbar_vthumb.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic_b\controltoolbar\resizemini2.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\data\ieloading.swf forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic_b\controltoolbar\downloadbtn_hover.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic_b\playctrl\shift_down.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\chrome\downloadTipDlg.xml forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic\download\download_pause.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\common\common\checkbox_checked.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default\hoverinfo\gbg_left_top.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\common\crashreporter\error_hint.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default\download\dt_selitem_bg.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default2\search\searchBoxAlone_normal.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default2\watchlog\watchRecord_down.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic\playctrl\stream_spot.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\common\pipplayer\open_channel_hover.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default\hoverinfo\gbg_right.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default\playctrl\mark_skip_NM2.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\3xgiving\stdDlg\menu_hover.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic_b\list\list_hot3.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\chrome\VIPChannelTip.xml forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\chrome\adselector.xml forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic\playctrl\muteplus_normal.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default\playctrl\mute_hover.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\3xgiving\list\expanded_treebox2.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic_b\list\list_new3.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic_b\list\pdot.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic\scrollbar\scrollbar_pagedown_hover.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic_b\list\list_class_bg.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic_b\playctrl\playerinfo.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\PPLive.exe forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\tab\7\2\1.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default\list\list_updata_2.gif forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default\playctrl\play_down.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic\stdDlg\min.bmp forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default\common\radio.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default\playctrl\ch_hover.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic_b\list\white_dot.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\chrome\TextBoxHelper.js forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic\playctrl\unfullscreen_down.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\common\edu\next_down.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default\list\expanded_treebox2.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default2\small\bottom.png forqd1170_141862.exe File created C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\classic_b\playctrl\speed0.png forqd1170_141862.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 21 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forqd1170_141862.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PPAP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hwcheck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PPLive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RepairSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PPAP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PPAP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firewall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{CA7DFF65-E473-4efe-ADF0-FC1E50CDFC82}\AppName = "PPAP.exe" forqd1170_141862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{95B3F550-91C4-4627-BCC4-521288C52977}\Icon = "C:\\Program Files (x86)\\PPLive\\PPTV\\3.1.9.0042\\icons\\PPLive.ico" forqd1170_141862.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\bf1097f4-a6cf-4e32-afe3-cc58ea1c6806 forqd1170_141862.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{CA7DFF65-E473-4efe-ADF0-FC1E50CDFC82}\Policy = "3" forqd1170_141862.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{CA7DFF65-E473-4efe-ADF0-FC1E50CDFC82} forqd1170_141862.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{CA7DFF65-E473-4efe-ADF0-FC1E50CDFC82} forqd1170_141862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{95B3F550-91C4-4627-BCC4-521288C52977}\MenuText = "PPLive" forqd1170_141862.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ProtocolExecute\synacast forqd1170_141862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{CA7DFF65-E473-4efe-ADF0-FC1E50CDFC82}\AppName = "PPAP.exe" PPAP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{95B3F550-91C4-4627-BCC4-521288C52977}\ButtonText = "PPLive" forqd1170_141862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{95B3F550-91C4-4627-BCC4-521288C52977}\MenuStatusBar = "PPLive" forqd1170_141862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{95B3F550-91C4-4627-BCC4-521288C52977}\HotIcon = "C:\\Program Files (x86)\\PPLive\\PPTV\\3.1.9.0042\\icons\\PPLive.ico" forqd1170_141862.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{CA7DFF65-E473-4efe-ADF0-FC1E50CDFC82}\AppPath = "C:\\Program Files (x86)\\Common Files\\PPLiveNetwork" forqd1170_141862.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{CA7DFF65-E473-4efe-ADF0-FC1E50CDFC82}\Policy = "3" forqd1170_141862.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ProtocolExecute\pptv forqd1170_141862.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy forqd1170_141862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{CA7DFF65-E473-4efe-ADF0-FC1E50CDFC82}\AppPath = "%CommonProgramFiles%\\PPLiveNetwork" PPAP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ProtocolExecute\pplink forqd1170_141862.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ProtocolExecute\pplink\WarnOnOpen = "0" forqd1170_141862.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\bf1097f4-a6cf-4e32-afe3-cc58ea1c6806\Policy = "3" forqd1170_141862.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{CA7DFF65-E473-4efe-ADF0-FC1E50CDFC82}\Policy = "3" PPAP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{95B3F550-91C4-4627-BCC4-521288C52977}\Default Visible = "Yes" forqd1170_141862.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ProtocolExecute\synacast\WarnOnOpen = "0" forqd1170_141862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{CA7DFF65-E473-4efe-ADF0-FC1E50CDFC82}\AppName = "PPAP.exe" forqd1170_141862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{CA7DFF65-E473-4efe-ADF0-FC1E50CDFC82}\AppPath = "C:\\Program Files (x86)\\Common Files\\PPLiveNetwork" forqd1170_141862.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Extensions\{95B3F550-91C4-4627-BCC4-521288C52977} forqd1170_141862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{95B3F550-91C4-4627-BCC4-521288C52977}\Exec = "C:\\Program Files (x86)\\PPLive\\PPTV\\PPLive.exe" forqd1170_141862.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ProtocolExecute\pptv\WarnOnOpen = "0" forqd1170_141862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\bf1097f4-a6cf-4e32-afe3-cc58ea1c6806\AppName = "PPLive.exe" forqd1170_141862.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Low Rights forqd1170_141862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{95B3F550-91C4-4627-BCC4-521288C52977}\CLSID = "{1FBA04EE-3024-11d2-8F1F-0000F87ABD16}" forqd1170_141862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\bf1097f4-a6cf-4e32-afe3-cc58ea1c6806\AppPath = "C:\\Program Files (x86)\\PPLive\\PPTV\\" forqd1170_141862.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{CA7DFF65-E473-4efe-ADF0-FC1E50CDFC82} forqd1170_141862.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.3gpp\shellex\ContextMenuHandlers\pptvfilelink regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ppl\Shell\Open\Command\ = "\"C:\\Windows\\system32\\PPTVLauncher.exe\" \"%1\"" forqd1170_141862.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EF0D1A14-1033-41A2-A589-240C01EDC078}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.ram\shellex regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.smil\DefaultIcon\ = "C:\\Program Files (x86)\\PPLive\\PPTV\\3.1.9.0042\\icons\\PPTV.video.ico,0" RepairSetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.3gpp\shell\open\command\ = "\"C:\\Windows\\system32\\PPTVLauncher.exe\" \"%1\"" RepairSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Ifupt.DPlugin\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{579A418B-2440-4278-9CC1-25E85E1C9D09}\ = "IEwaOCX" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.f4v\shellex regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.pptv\NeverShowExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.dts\shellex\ContextMenuHandlers\pptvfilelink\ = "{7A1884A3-F647-49BE-B93C-8FFAF4A1F1BF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6C39969E-AF81-425C-AE42-48508B7C4F2C}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.ape\shellex\ContextMenuHandlers\pptvfilelink regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.pptv\ShellEx\IconHandler regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.rp RepairSetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.m1v\shell\open\command\ = "\"C:\\Windows\\system32\\PPTVLauncher.exe\" \"%1\"" RepairSetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CA7DFF65-E473-4efe-ADF0-FC1E50CDFC82}\ = "Manager Class" PPAP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.mka\shell\open RepairSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.mov\shellex\ContextMenuHandlers regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.rt RepairSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{377AC21C-4921-4C3F-9240-7756548790FB} PPAP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{628DF9B1-785D-44BA-AC9D-E9E226F01987} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.dts\shellex regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.3gpp\shellex\ContextMenuHandlers\pptvfilelink regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.rp\shell\open\command RepairSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.ra\shellex\ContextMenuHandlers\pptvfilelink regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.mka\shellex\ContextMenuHandlers\pptvfilelink regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4C5A0DA6-C2DA-422D-89E1-457978AB87B5}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.ram\DefaultIcon\ = "C:\\Program Files (x86)\\PPLive\\PPTV\\3.1.9.0042\\icons\\PPTV.video.ico,0" RepairSetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7A1884A3-F647-49BE-B93C-8FFAF4A1F1BF}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CA7DFF65-E473-4efe-ADF0-FC1E50CDFC82} PPAP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.ts\shell\open\command RepairSetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{04987413-5E4A-472F-9899-0A092233239E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" PPAP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Ifupt.Update\CLSID\ = "{E62D3029-1430-49F8-9470-2A192B02E433}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PPLive.Lite\CLSID\ = "{EF0D1A14-1033-41A2-A589-240C01EDC078}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.m1v\shellex\ContextMenuHandlers\pptvfilelink\ = "{7A1884A3-F647-49BE-B93C-8FFAF4A1F1BF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.mkv\shellex\ContextMenuHandlers regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.mp3\shell\open\command RepairSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.wm\shell\open RepairSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.asf\shell\open\command PPLive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6C39969E-AF81-425C-AE42-48508B7C4F2C}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.m1v\shell\open\ = "打开" RepairSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4C5A0DA6-C2DA-422D-89E1-457978AB87B5}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.rmvb\shell\open RepairSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.ram\shell\open RepairSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6C39969E-AF81-425C-AE42-48508B7C4F2C}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.ram\shellex\ContextMenuHandlers\pptvfilelink\ = "{7A1884A3-F647-49BE-B93C-8FFAF4A1F1BF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.m2p\DefaultIcon RepairSetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rp\shellex\ContextMenuHandlers\pptvfilelink\ = "{7A1884A3-F647-49BE-B93C-8FFAF4A1F1BF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.midi\shellex\ContextMenuHandlers\pptvfilelink regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.wma\DefaultIcon\ = "C:\\Program Files (x86)\\PPLive\\PPTV\\3.1.9.0042\\icons\\PPTV.wma.ico,0" RepairSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.avi\shell\open\command RepairSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.3g2\shell\open RepairSetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PPTV.rp\shell\ = "open" RepairSetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E62D3029-1430-49F8-9470-2A192B02E433}\InprocServer32\ThreadingModel = "both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{27B91D23-7428-46F4-AC61-E1869F374072}\TypeLib\ = "{C5A164AA-482B-4322-842D-9C9DD3852F8E}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.mp4\shellex\ContextMenuHandlers\pptvfilelink regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.midi\shellex\ContextMenuHandlers\pptvfilelink regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4C5A0DA6-C2DA-422D-89E1-457978AB87B5}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E62D3029-1430-49F8-9470-2A192B02E433}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.hlv\shellex\ContextMenuHandlers\pptvfilelink\ = "{7A1884A3-F647-49BE-B93C-8FFAF4A1F1BF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{377AC21C-4921-4C3F-9240-7756548790FB}\1.0\HELPDIR PPAP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{628DF9B1-785D-44BA-AC9D-E9E226F01987}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.mpe\shellex\ContextMenuHandlers\pptvfilelink regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe 2384 forqd1170_141862.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2588 2384 forqd1170_141862.exe 30 PID 2384 wrote to memory of 2588 2384 forqd1170_141862.exe 30 PID 2384 wrote to memory of 2588 2384 forqd1170_141862.exe 30 PID 2384 wrote to memory of 2588 2384 forqd1170_141862.exe 30 PID 2384 wrote to memory of 2588 2384 forqd1170_141862.exe 30 PID 2384 wrote to memory of 2588 2384 forqd1170_141862.exe 30 PID 2384 wrote to memory of 2588 2384 forqd1170_141862.exe 30 PID 2384 wrote to memory of 2816 2384 forqd1170_141862.exe 32 PID 2384 wrote to memory of 2816 2384 forqd1170_141862.exe 32 PID 2384 wrote to memory of 2816 2384 forqd1170_141862.exe 32 PID 2384 wrote to memory of 2816 2384 forqd1170_141862.exe 32 PID 2384 wrote to memory of 2668 2384 forqd1170_141862.exe 33 PID 2384 wrote to memory of 2668 2384 forqd1170_141862.exe 33 PID 2384 wrote to memory of 2668 2384 forqd1170_141862.exe 33 PID 2384 wrote to memory of 2668 2384 forqd1170_141862.exe 33 PID 2384 wrote to memory of 2668 2384 forqd1170_141862.exe 33 PID 2384 wrote to memory of 2668 2384 forqd1170_141862.exe 33 PID 2384 wrote to memory of 2668 2384 forqd1170_141862.exe 33 PID 2384 wrote to memory of 2388 2384 forqd1170_141862.exe 34 PID 2384 wrote to memory of 2388 2384 forqd1170_141862.exe 34 PID 2384 wrote to memory of 2388 2384 forqd1170_141862.exe 34 PID 2384 wrote to memory of 2388 2384 forqd1170_141862.exe 34 PID 2384 wrote to memory of 2388 2384 forqd1170_141862.exe 34 PID 2384 wrote to memory of 2388 2384 forqd1170_141862.exe 34 PID 2384 wrote to memory of 2388 2384 forqd1170_141862.exe 34 PID 2384 wrote to memory of 2596 2384 forqd1170_141862.exe 35 PID 2384 wrote to memory of 2596 2384 forqd1170_141862.exe 35 PID 2384 wrote to memory of 2596 2384 forqd1170_141862.exe 35 PID 2384 wrote to memory of 2596 2384 forqd1170_141862.exe 35 PID 2384 wrote to memory of 2596 2384 forqd1170_141862.exe 35 PID 2384 wrote to memory of 2596 2384 forqd1170_141862.exe 35 PID 2384 wrote to memory of 2596 2384 forqd1170_141862.exe 35 PID 2384 wrote to memory of 3064 2384 forqd1170_141862.exe 36 PID 2384 wrote to memory of 3064 2384 forqd1170_141862.exe 36 PID 2384 wrote to memory of 3064 2384 forqd1170_141862.exe 36 PID 2384 wrote to memory of 3064 2384 forqd1170_141862.exe 36 PID 2384 wrote to memory of 3064 2384 forqd1170_141862.exe 36 PID 2384 wrote to memory of 3064 2384 forqd1170_141862.exe 36 PID 2384 wrote to memory of 3064 2384 forqd1170_141862.exe 36 PID 2384 wrote to memory of 684 2384 forqd1170_141862.exe 38 PID 2384 wrote to memory of 684 2384 forqd1170_141862.exe 38 PID 2384 wrote to memory of 684 2384 forqd1170_141862.exe 38 PID 2384 wrote to memory of 684 2384 forqd1170_141862.exe 38 PID 684 wrote to memory of 2408 684 firewall.exe 39 PID 684 wrote to memory of 2408 684 firewall.exe 39 PID 684 wrote to memory of 2408 684 firewall.exe 39 PID 684 wrote to memory of 2408 684 firewall.exe 39 PID 684 wrote to memory of 3044 684 firewall.exe 41 PID 684 wrote to memory of 3044 684 firewall.exe 41 PID 684 wrote to memory of 3044 684 firewall.exe 41 PID 684 wrote to memory of 3044 684 firewall.exe 41 PID 684 wrote to memory of 1704 684 firewall.exe 44 PID 684 wrote to memory of 1704 684 firewall.exe 44 PID 684 wrote to memory of 1704 684 firewall.exe 44 PID 684 wrote to memory of 1704 684 firewall.exe 44 PID 684 wrote to memory of 1408 684 firewall.exe 46 PID 684 wrote to memory of 1408 684 firewall.exe 46 PID 684 wrote to memory of 1408 684 firewall.exe 46 PID 684 wrote to memory of 1408 684 firewall.exe 46 PID 684 wrote to memory of 1960 684 firewall.exe 48 PID 684 wrote to memory of 1960 684 firewall.exe 48 PID 684 wrote to memory of 1960 684 firewall.exe 48 PID 684 wrote to memory of 1960 684 firewall.exe 48 PID 684 wrote to memory of 2164 684 firewall.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\forqd1170_141862.exe"C:\Users\Admin\AppData\Local\Temp\forqd1170_141862.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Program Files (x86)\Internet Explorer\PPLite\plugin\1.0.1.1919\pplugin2.dll"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2588
-
-
C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\SkinConverter.exe"C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\SkinConverter.exe"2⤵
- Executes dropped EXE
PID:2816
-
-
C:\Windows\SysWOW64\Rundll32.exe"C:\Windows\SysWOW64\Rundll32.exe" "C:\Windows\SysWOW64\PPTVSvc.dll" RundllCmd -start before2⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
C:\Windows\SysWOW64\Rundll32.exe"C:\Windows\SysWOW64\Rundll32.exe" "C:\Windows\SysWOW64\PPTVSvc.dll" RundllCmd -start2⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:2388
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s C:\Windows\system32\kindling.dll2⤵
- Modifies registry class
PID:2596
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe" /s C:\Windows\SysWOW64\kindling.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\nsoF3A4.tmp\firewall.exe"C:\Users\Admin\AppData\Local\Temp\nsoF3A4.tmp\firewall.exe" /PPTVPATH=C:\Program Files (x86)\PPLive\PPTV /PPTVVERSION=3.1.9.0042 /DELPPTVPATH= /DELPPTVVERSION= /DELCOMMONVERSION=2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Program Files (x86)\PPLive\PPTV\PPLive.exe" PPLive Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2408
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\PPLiveU.exe" PPLiveU Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3044
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\RepairSetup.exe" RepairSetup Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\CrashReporter.exe" CrashReporter Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1408
-
-
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram "C:\Windows\system32\PPTVLauncher.exe" PPTVLauncher Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1960
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Program Files (x86)\Common Files\PPLiveNetwork\PPAP.exe" PPLive Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Program Files (x86)\Internet Explorer\PPLite\plugin\1.0.1.1919\PluginInstaller.exe" PluginInstaller Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
C:\Program Files (x86)\Common Files\PPLiveNetwork\PPAP.exe"C:\Program Files (x86)\Common Files\PPLiveNetwork\PPAP.exe" /RegServer2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:2548
-
-
C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\hwcheck.exe"C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\hwcheck.exe" -s -luminanceonly "C:\Users\Admin\AppData\Local\Temp\hwcheck.mp4"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Program Files (x86)\Common Files\PPLiveNetwork\PPAP.exe"C:\Program Files (x86)\Common Files\PPLiveNetwork\PPAP.exe" /LoadModule MngModule.dll /T 2 /A http://h.synacast.com/1.html?sa2foJynraacmdeYo9aizKjLqdakmdrL1KGfn9eZ1Kedyq2c1aTSj7mipuyd5a2boKHom/KW7KnovNvX5tnPzpa10dPXiafhlrSpvOrG3tTN29qFxretib3X0eDU0tnYkLHQyubZ1eLon6SWnqeimaaToaafoavhlrWpmqeToJCSr7OWppazpqbdoKCcmaaVoKCSsbOV3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1668
-
-
-
C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\RepairSetup.exe"C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\RepairSetup.exe" -codec2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2920 -
C:\Program Files (x86)\PPLive\PPTV\PPLive.exe"C:\Program Files (x86)\PPLive\PPTV\PPLive.exe" /LoadModule "C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\components\PPOptions.dll"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2888
-
-
-
C:\Program Files (x86)\Common Files\PPLiveNetwork\PPAP.exe"C:\Program Files (x86)\Common Files\PPLiveNetwork\PPAP.exe" /LoadModule MngModule.dll /T 1 /C forqd1170 /F 0 /G 3.1.9.0042 /H 1 /I forqd1170_141862 /L 1 /M 0 /N 1 /O 1 /P2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k PPTVServiceGroup1⤵
- System Location Discovery: System Language Discovery
PID:1160
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209B
MD5c076ada51e336237be1983c8ec5b2b7b
SHA10d2bddbc75d1c8cec81373e5c9c8440bb18fa459
SHA2560a5811a7b7d8242e5bff7ffa2b29d7f990717f7cbcd066ed25a6ce6e67ec6e84
SHA512565a326f77cc5f9154a702de309aff5efaceed4b0723953d2df77ba8d3a74c71704046cb4f5c190ff5a09f428fae24f0938f37aa9a4228b8f0f015ebe377ab91
-
Filesize
489KB
MD53b32d234804891d695c42b09b299e55f
SHA11e663ab6f6778f14cc4d20239d6a984e2f7c5108
SHA256a0d86614ef275a2fdfde413d8d5bbb1c0e47a0af761ba88642fdef5e3db0d0ce
SHA512db214d0a3a06ad088a4e8449a36d314b4b72513121605f220ca4a50c05ee51f66eed6d1956001c164d3475189dd0043b83e982794a4ec0578640e578430ccd0c
-
Filesize
134KB
MD500d2c06a552f782c1f16acf77db765a5
SHA1640fd59ae52c7c381d7696ce66668aeaaa25b711
SHA256f54fe6535538174c139b1b0cb2ac0753b2e34412153a443482ccae53ffbc4dc6
SHA512bbdfa6945d57c49a886442a7d1032e08656d4999e614d5a0be0d318832be94520601d2db9c0e3aff5e083d7a1392c72fb38ead2873520947e26993daed7ac795
-
Filesize
127KB
MD55230c2232f3ba9e6a0513f847863d71a
SHA1db4fea673ae5c389c423eb13950e6836f6564198
SHA256c4bc151f084b887ad1f8174bd5f11318848f6c33a005b2186cc2484df97a53e3
SHA512c14c8ccd975334a078e7ccdf8be02a6ce50c47d07dd9d9f94a0e164b118a2c162f50191b2a2a42fa972e5e7bee22b60e4186606eefefcac1e3b7f2b8989fa454
-
Filesize
411KB
MD5e3c817f7fe44cc870ecdbcbc3ea36132
SHA12ada702a0c143a7ae39b7de16a4b5cc994d2548b
SHA256d769fafa2b3232de9fa7153212ba287f68e745257f1c00fafb511e7a02de7adf
SHA5124fcf3fcdd27c97a714e173aa221f53df6c152636d77dea49e256a9788f2d3f2c2d7315dd0b4d72ecefc553082f9149b8580779abb39891a88907f16ec9e13cbe
-
Filesize
755KB
MD5bf38660a9125935658cfa3e53fdc7d65
SHA10b51fb415ec89848f339f8989d323bea722bfd70
SHA25660c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa
SHA51225f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1
-
Filesize
2.7MB
MD551d2aca00f5dec7407d756387a23fb53
SHA1383bfd89b69bd45c868aafa148aacfa38ce325b8
SHA25615cd4586d7a52d35ca8ac0ae8bd11c7118d159f064a4ab9903c99615d420b421
SHA512c2488c8eea96e67bb76d2193e166928cd5fc86e8f763bd7132febb6ef557d37e32723ffc7b8f9d4687d27770cf1f3a9a4d1e29b814c0379d9db9fbddfd869bb4
-
Filesize
506KB
MD542caab4bbb78f571d515c05f6b21ef9f
SHA1bc65bddd26fc4e57824c6056823b7a82a8bcff2b
SHA256826a37b8b60d5f3c993d883452fd8d16887df27a4b906c063a120108a7492d51
SHA51293ed2e9516cbeab8c0b7466f594699840a457b91a6a228de8e687260a60df1597a13d701b4b1c9d55c7072a412a8c3db7a2e7c7c34d6ac033cb2dc84ddeadb74
-
Filesize
509KB
MD5bb01bfdc1bfe48cf9c18180bf6539917
SHA125d0a11d31857fef74e9b98dcabd96f24d89c774
SHA256050649bb8dc43e68753de7567e17972cbcec1a2dacf243befeb12dc51517f7cc
SHA512f4fa00923ee61f0fcb53c8ebfd65b27db54a7663e5d60d8a56f7d08f33e2e1c467aa0b58899fbd62ac2261b185655cc94bac9ce85e2ed3b0c32336daa5346ba5
-
Filesize
685KB
MD567afb19cd5dd5c3013506db0ec2a6fd0
SHA149d8b649d09d00de2ab822e1d2d3a2b413c1aae9
SHA2565cd2d51adf2742b91bc1ba90a49a5366038d5b2b8c48e4ddf4f35c7735abe673
SHA5120082bd595d4f5b46c104d09b33300dfc02c442d5d8ca6901ce009fbe60dc1cd8b271abbb37047ac72d36f19b45a63d60eeb0b944b7072a635c75375cd677c96a
-
Filesize
1.1MB
MD5b99de549832eed7e78b516a830899e9c
SHA12e06a763e9d71147d5918933dae8f6a7211e3a26
SHA256cabacef493c50d7d9905deb535a3515db2a27ad0afd5e3b1c38198a8e4fc3ea6
SHA512f1aa6d1987317843e64768ffb9ffc25ab19555edd78d07c5f72c279ee5e30df500152d82a54545f166c5549d7fbd624b5ae80d2f52809be39af71771cbcbf179
-
Filesize
576B
MD5c91400d11e7e21a77be3754759e072ba
SHA11ecd1fb0ab06a160649fe88a87b8ba906f0d71b8
SHA256cffc7129fe1626f8f803d7d24020d7625a003e492913173ed7e7759dfb0bd46d
SHA512e1af4a260686f94c10496a44ed592db759f3c697450a2d724b465055c7edbe3b1df33378101f02c8e5b9af288f07ed9de5cf11413137a547ff8f5d64540e70e8
-
Filesize
544B
MD522b53edfe6e1d6bde4c145fe4eeb01a5
SHA111e8c70756e18ffb8b7c03cb17f9f8e1ccbd9cb6
SHA2569ed30eb5783647a0f4d3838dd9a4df81794c0234b237e73327aa7b24cfc28f43
SHA5127ffbed90c92b76d73fd4f537ef1c7d92ecc3ea533c0382a89c2c835e29f7a8af86e46c9f898879814b47c0a6d64b88ae509f63aafc7d6d26b4ec5b80c2e2ac68
-
Filesize
757B
MD5cb96f0c57d50eeadf658f1bd858353ee
SHA12367654541eaf27ed1e86b506d3199c18f183ed7
SHA25636630d09b394828852c5133a3ee909c8d2b5b402cf81477a5036597259943a1d
SHA512e5a5343e5f3fd57b6f6f8207b86ac13ae9d29213af646aabe9dc5e287989052106c23ee6c809a0cc5024449852435eb897154bc94b68e984dff5759c4d0bc2fc
-
Filesize
568B
MD58d50be88be04be8e0155f5225e9d1550
SHA1487a319dfaa3893a87f7811deb315849bc4b357d
SHA25644afba3fa4f4d535489cee02146f1f68d9f8a7d4f1ec39b7a1bd137d82693993
SHA512ac6d3b2aac550423d830dbc353e97d2bc7b83dd19919edcfbb33bed923156b572489070e7d13e0b31b01ba73c561e6bdd5e1e78e8cec6fba3743b061f69342b8
-
Filesize
4KB
MD58a082e60b033ebb16649a40f4c810225
SHA1263eca6ab770b4c7ca047243957118041152c793
SHA256fc9bfd161176f9685774c79fd125a08668a48cca33790901a448f3fe66fdbce7
SHA51221348d8bd8c088b65a0a71f0ac0ae347bc756c51bd4f795ec2fb1af6f78166eeacf3bc0a966d95a94096cea94e581ac7f1fe40fc4e6f26415342ec1f9565221f
-
Filesize
2KB
MD5921f9e0f79e738cbcb7277cefe25b3d7
SHA1fbee296dc8d8736df309b1fca3e334cda7fd7e4e
SHA2569ba700e07659becfe2b296cd7a7e404a1867aa35324e947872a9e747753fc4d2
SHA512438ad298d729d1d3ee8d0c647d865238a53f8bdc23b75d21ba7126352bd55af844f811cdaf3c10a6280c27327454ee43ce3aa5916b3d60f4702c053235a25226
-
Filesize
576B
MD58504e16a8c9f289537a8c404a3e322a4
SHA12e9532e8a72407cec10a662df3711cd0c2886eec
SHA256aeb7452c9d202abffcc53022c46cd8faede0ffa4f4821e024c0720261fa60d8c
SHA5122f775aa1b9e3f5addd88baaa3b83dc7e34cb90b1a650e7e20338d9d7febd77434ec84512e0b2c2ecd67928341f13db885da53f8ed6f623387f14b05e6f348756
-
Filesize
576B
MD51539514ae6d730e1cfc7a69aecd80e2e
SHA1bd8f47a99dbf8ad6979aef6b0bce60397935ca46
SHA2567397f699faaaf9363177e0d0e074c4ac5a19a7bdfc6b7c2e32586c466b39dadc
SHA51280821fa6a07889c4cc280202c81c6bc8b10e39b997cff359c8df45f988de226aad517f674262e98ed6690be3cc433a600852cf14ccc4eea4b96165d4e09cd7ae
-
Filesize
576B
MD5b12368f6e1b8ce7ff4c96158b3aef9a9
SHA10ca69176b2808eb81724de4af36a51a89724de45
SHA2564215fe3f6ca2011a8c386bb7254ede56c11cce6010bbd6764e9c4d0121621d6b
SHA5123892ec9f8f7fa1090b43e8a68a2863d5c17ffc68ad983d7968fb4ed2cd4882b73660526f42d7cb6c76a3d621baf99dc4fce4b7f4de95529ca1b4b95e39c03681
-
Filesize
576B
MD5cbc56ad6a2f4734a0c3fa226b2582b4b
SHA12775109a99f3b952806a202bbf2601fbedc246ad
SHA2565e1777c91fa4a4412a688dea4948361a462bc464f0deed828a0dd3122f2add85
SHA512c60127dfbb8c8f561f0263620a1c6c1edcc9a1066cfc290cae3dd3fff59b84f45e1d3bfc1bbf13c8694c8789e526dfa369265204d5f20f3c98a0ae8bd59496a0
-
Filesize
576B
MD58621ff9d66b415016211d73f6d8c34e6
SHA19c0168e47f39399a140bce460cd2cb0d6baa3c19
SHA25694f7483f0229e440f5fc077b0fb0dc00d710f7814d09e5549bdf73dceb53b95d
SHA5123dccce990e6f9d4527ae4dabe529e6022d43deef74a1d52acf53abc22a6a6179ab14aa82a8d371d7dcd93b8755ee76c8d5147688ba41170af47646825174b194
-
Filesize
576B
MD5899994d10caecb0536298f7c1d733cc7
SHA18a5657d28d16bc365458c72360d5ea8ab8a138ff
SHA256a0c9c8fc2f0bef2092dc38fef5acfcb7f3d19a6fb27a94d270c878a16bb16732
SHA512872fa4f6bed95753023a925e5c8a2feda72d5642fa94f3f318ec72fa2c30685bc46b341368df0e33257d31d826e3e9d8660a603cdd83224a27c25e4751de470e
-
Filesize
3KB
MD572715ef6db655782dd7e447b9adafe0a
SHA1435d37cec5cad575f544ec42165dd7d5db7f6ebb
SHA256f0dcd15af06267badb1d01a9a4b9a376da53a4996f8fab5e5b5bc8ed0d0d5ea3
SHA51279c76593cfec88a943092f848a42d41a708eeba185e81695a6b87330d5e4a800c3cc1290e7a5e856bfbb94f37f193a623a0de049393c4e86d64d639629768c84
-
Filesize
3KB
MD5433f402cfec042629945b5bdea713e18
SHA17c62edb9ebbc93d59d75ddd5799d4e21161d201d
SHA2560016838375afb51bad967899fd2eca286f2c27f84ec1005b054bd80d108c00c2
SHA512ed3fea9226604a454e227c59b29c0b6a4d4aaafa88e064fd6c31a2a7ca8e5776dd853e25718be74174f204216ff7c245bd3b4daad99615994b6043d1cd31beab
-
Filesize
2KB
MD550e8e363f1e7fba15f1117c11268583e
SHA1b6d4da1992c499d6989bee6a9e1612f909e02d0f
SHA256f20db24dbc28551489acbb642e6e2a830bbb0b523cfb29ea6604f354d6d20872
SHA512be990f2b63bb9b7986550e3c339d801f1f2cbf7c74b182aaef27f0034ce5b1b6391932f10d66ff3680b4fd408e8741834afac4d9b555da41dea6ae2c71139fe8
-
Filesize
3KB
MD55d9c2d8ad99cec3fa2b21515b96ffabc
SHA1d74817adcecbbcfe19bf5178df7bf2220a0b4f4b
SHA256bf780c8c221c3ef4a1bb8b91718782e9307f62557da419568c64af912c47b481
SHA51216ed132ca2d869b4dd9d19637e5207ae75c10e1ae516c1179f8ab34a6884d96b38a71dc549767d51543779708c27e0bc8ae3dea9ce683c65bde97dbbac863fb3
-
Filesize
3KB
MD591670588aec0db6c234783b46fff519f
SHA1de17fa85af07388800352239fa6d34b33bf1c54d
SHA2563fbc4981251b997fc05c4fa5683fece9cc407ec7c97a0c77295f17297fb1f807
SHA5126150da1d5244dc88ef504ba98de008c6001767f14f57048ffa9b1afb4d64a89c1e628039f8ea4bbb0aa62386c32e6f79cca9f859b7ea44a8c6e01ae9725a13d7
-
Filesize
2KB
MD5b04a98e0f87e8262be019bc29138be93
SHA1a0e22059e9bb199731286d4d1a56416f56939467
SHA2565dde8dd578cbe8dfa3d6075462a2f00a7ea33586ae7314581747644f54b72bb6
SHA5126ca598de1fa7c6c9b677fd5e8075e469a0604134993d83076654229279909770875b6f4942b0835f86e4591dfe7497df52adaca403c9c963394faeeaeaa5b4df
-
Filesize
3KB
MD5a11b23c7a81bdbde6ee793d6548c2bf9
SHA159191208520763ae9e1206dcd40923c5f5065d97
SHA25658e218e25f24cfdb89fe145b3325bc26d4ce637cffad725e918bf483380b55b8
SHA5121c32b17543cd34463b4ef605dc947ed21357f510aeb9b54a516b671b68638a5e8ff26a64342157a32ff9bb4740dabd4af73a862e711dff37ed3cd34bcd462e69
-
Filesize
3KB
MD5823a32ae4003e97345b2e83d1dbc0ff7
SHA121ba87facfc45b650e20477992d74fd583e06ceb
SHA256be18b68f4fc767765527f860c422e3cb6875f5ad0738feac1753943af35c507e
SHA51265df4f1aa6931c814b5aa6eca86bb158508b30ec35d12946e5ccb4d11a265404fc90cd98e8e26662c47e1521436822bf10845c7e8ff34da202b9791b43131829
-
Filesize
23KB
MD5400e3ae746339166c946ba66b7904d09
SHA1c79f17bfc6852802e7a186ab06e6de36d48eb4c8
SHA25678cbcfb4992ef63dd84b4f8bddc318e6b67712256892efe0d55a3fec01c00182
SHA51273131166a67de4a7522aaf66e00ba87eed885567d4017bfaaab20b6f0bdf76875697933bf66be993137c74ee16123d1ca5dd137907ef5e150a3417a8939af264
-
Filesize
2KB
MD59b264a8fd3b725c91be9f19251b45497
SHA196ba341f706f066094e1c40efa7f17ee50308162
SHA25649b30bf4be968094681aafcd3d497678b9ad665c170d5b9f3a54e2fe0ea0d6f6
SHA512f2a1994fa2043fd1e8276ee0294f1ca9ab91c8d32edffa94cf3bc5bad7a40969b18951c03203d9e2aec0843ccca3076ffda8bf7aa518c1b20d6fb27857319d07
-
Filesize
938B
MD58cef089386ebde8d75be4f1ff484dedf
SHA19b0d2df216ab05a77dd2d26e25f74ad0f74215e7
SHA25600ef4863718b02036cba33c6c6a9c418257055ae9ecc05e2e9e363ff7164d31c
SHA51227aeb168cc70c16ae64f60507250c935038bec80c084c0d54b8a273ec3f4311d02c3c3cf1320a4b87286760187d0654f17bdaf5a7698f970624973912f64d822
-
Filesize
488B
MD58d4c2f2863f2b4dcef20acc984488a02
SHA13133f0a5b4f4487c3400ebd2fc4663a37657ed09
SHA256e3fedf6cffe67c2a5412fce2bba2745d22c54e621d5d67f421e3232d72ffd4f6
SHA512a71549800c6d4f041da3bbc9abd090b0364695ec8a1ae1dcbb74844f00a87908188963205e82ea7e2463e5c9a69000277b21fbf27e0f676f2e2663b50363bdc0
-
Filesize
938B
MD5164b0e5435d98c9b78e5a8b2f67032f0
SHA17e97a10a4889f0a40fc09fe0af457994a3f29b54
SHA2566909bc2d3367d8d28a4f43b4b5dfdfa0118f9d3bc36d758ecfba3241cb0a3e23
SHA512b1f52be072d6ffcd901bcad633dd74c50eb499f8945158ac1009e7f3690406d43e49dc5469858113e334a5ab12f24560f5d1d9e5af9cb56c9b4287633ae5027a
-
C:\Program Files (x86)\PPLive\PPTV\3.1.9.0042\skins\default2\scrollbar\scrollbar_vthumbgripper_down.bmp
Filesize488B
MD50129dd07526b63a36f43dfd8a09291d9
SHA1cfa05b8bc2d13a67c1a71692040bcf6ae5a2a2b6
SHA256cfdd7e892c56661c8b29d442efbec58aa39569e1a4e52157e660b3acbd342d53
SHA5129d6814486c6f340ea12c25764c9b4e1d4208fddfcf49b6ecbd9ddb6785c67279b03fcfdef3cb3b21e46a608a32e51cdd5efbd1d1a872a67351b41041225182e0
-
Filesize
244KB
MD56d8642eb3340195fef177995e3f1d64e
SHA1c84d743e74010243e293e4e5a1c65cbc8979dadc
SHA256c757d7c17298f1e25518386645fa56f9109dbfcf2f83b0b4f83b0139874caab0
SHA5128f45d0026cdeb6fbb9a20df993f78781e9f743992cc03fc6cc5d92a20a510282ff97a8cdfd02a8c4b6e4bcc89932fcea0f898a4b19a2304438e4be06f6e936ef
-
Filesize
1KB
MD552f5c794513ebd5da8306c0f8794bb3c
SHA13b8b4ef08636eca1658aafcba082eda8954998a7
SHA2561acae44bdf4282c235d60ad92079a0b722ac1df8de42ee83c1ba13c2bf8c3a4e
SHA5129108b3fde455e39f435d53b47ac690d90f8cb7a7d17d0a50445fad335e6b5d53572b29b5321a3d3f88ecb14e51ddd90252c1c63030dfbbf6ddfa63314b0f83e9
-
Filesize
11KB
MD5cafc1ee307726dd4aa02677bc2265878
SHA15b5cb5a82a2fcf9b6386a574534771804aca0fb3
SHA25602dc4b7b312995b68f1d424590755a4266de42bf7790efc01f6a336deadb31c6
SHA51238c46cdf22951d7b0ac1a8a60b9a72d26706cdf6046914d8809586e2e008b186dc2252da2d68b37833ca08335576c9296e445597255b1797f1f2c1c08d14279a
-
Filesize
49KB
MD59113f1ebc6ab1d8e9037883926ce30a8
SHA17e07d150014fead9e9a7fa3fa300e360f9bf824e
SHA256faf33559a59f00ce3017b319710d99d370bba6c851b7010bb7c4c77458e14c3c
SHA512c660c35c8af9a9e4cac317c1615ec190a1fc7ef0d91f0a0820af3cb269d4dbea58356835256f1bd1accccf4735edad7d391105af0ae26438e010e2c860eac623
-
Filesize
5KB
MD52e2412281a205ed8d53aafb3ef770a2d
SHA13cae4138e8226866236cf34f8fb00dafb0954d97
SHA256db09adb6e17b6a0b31823802431ff5209018ee8c77a193ac8077e42e5f15fb00
SHA5126d57249b7e02e1dfed2e297ec35fb375ecf3abc893d68694f4fa5f2e82ec68c129af9cc5ce3dd4025147309c0832a2847b69334138f3d29c5572ff4e1b16f219
-
Filesize
278B
MD500d648f977b119d93feb9f456832a5f2
SHA1ed366c2fd6748d03e69ce1224faf9d9e736306b9
SHA25622005de519c1e95bd2ff85067ed9956d302ecbcb9aa16ddb182c20cc5636224c
SHA512066a0c644b603276f638cfd8db8de34243294bd6568a3a167d07fd796c5ab743613fab804a60d10094b4d4c64ef9b3070c50729268be70939e809009799007a9
-
Filesize
3KB
MD57ba81223bf700796daedf39c67ed2f7a
SHA1dc6a21fffb3eefc7d562283b9273bd125281d410
SHA2568b5d8f56d56900f79bcd18497acb1c2bc6c815dd66e06af7c21cf4cdf2b7c0ef
SHA51270ba7b95459ac6909bda9917258f068c56f9ad1a1c46913fde85975d1d59af07a58fd71fa8ef99f1fe96bab268ab834fee51da0702e7751747fb159786d3d54a
-
Filesize
2KB
MD5341f7463c0d214a5f54b32b9d780ee60
SHA1692dd50c4a6884c60130420799b25b253ad7c263
SHA2563bdab3dd40f02ac5a595e34de63a54d77c2f808e937988fa3ce5fcd323974e1e
SHA5128663fded94fbafb8d29e20ef55ad9dbc065061387e197a3774e9bad1845202c9ff2f0c55e3af550e3232f891a1b63d63fbadca1a1965a776d650288ddaa69045
-
Filesize
5KB
MD549db1b72cef16400c6afab40834dbf79
SHA1d61a189efc09cda78391bd360780aef3d422b135
SHA2563d63f77f35119ffb40f1db3532f0cae4111351e019974fc11cd6771bf225becb
SHA512895fe8b0c9a73b1ee902b374c16a526a4f00e982961459ff87d8868320cfa287e102f3292db6498bf0d733a819fe13e6300766654b5e7e86ea2470d710dc681b
-
Filesize
105KB
MD5ce9af172025094f8ffc1ebacf1fea815
SHA1e05b2ddeeb699249fdbde4d6ddd005f192399fd3
SHA25694cb1c1923d0198ba8f10266f6ee84055d54869d2a1a0986b4cc73624f4f1dc2
SHA5121fc6e5a7acc87640880e731add4aa91c3397df797a5c73ec3fa922d85bde446962083202c0017c3fd5872827a73ba7b352af4ee5d9ee9afaeda6efce950b539e
-
Filesize
377KB
MD5bac0668f450bcf32ac7170a0d1453aec
SHA1a64f8d5e1b9fd024dd7f562c026f36ef3df065b7
SHA256ceeb7c61a135ce0f82263807a4e5639c298d87f49f561a03701a0673bbb96029
SHA51262e7d1fdb104b2ef8b144c39dad5c5799161bbad891347da00954e6a4ad376b7fdbd96fcba5e7388cd34ffe4b1719e33dabf16ab6276366dd1b97a6a84fc4468
-
Filesize
505KB
MD58b5367db387ff56304b44fd6f7e0678b
SHA1716f69cff7c5dc0ec3c13fbd2065ba78b28ce42f
SHA2563f38f19c2d68c174f3b1ce59ff3f308aa0880ca3b92ede6195b47be493bcf655
SHA51277ac1d569fa9a68b516bb37bba4c90f6ceba878478cb69c651c1268a9c22f0a308b568fd17f537caa888d5d2f12443fe38b3ec46db737edd5749093c861e951a
-
Filesize
389KB
MD5649387e8f2301c59f1893f7ecd73f34c
SHA1ea5769f3b527004b70d97525091723441727bfef
SHA256f0fd9002039f0446a8e3b66e38774300d4706f6ee6ec5333df41f510ac056cd6
SHA51202d6d7481a93e7561a069123b19e9ed732a3dd7d0a40fd768a9d878c00b73ee41fc09862927c6cde359cbb7686e1bce78c12560f56769c1ef265c223b3394505
-
Filesize
230KB
MD5330e6df7f0167f733da0937424be412e
SHA19480be42759ee64b1d0879d47785fcf35a900a91
SHA2567b3fd7240656a51083ba4c9bc450329cd6ef81e063fc2da198036ed09b950c09
SHA5125a745475a3460c7661f2d17593f865e22f8d0cba9d936ce9f24c673a8b41a9054b6d88826c0a0054249a549749c5133e373ede465243b9152eabbe267a5b1415
-
Filesize
119KB
MD5ff4582a1c4782cb92e932ba28e4894da
SHA15969412c3e09438e83d0416547598b8b9337d3fb
SHA2564ae78b468c47bf3899fe5071dd780b2a3ebb7af59e9a857b1ee59c69ed790f3d
SHA512d0720e36494fe0252868ad9fa16da930594a355922babb14f4d5f0e8f43b754597a7e90faa64870bdba63588d01554ee2924e0a98d57d3700e83d576ad84ccd3
-
Filesize
269KB
MD5dd37edfc2a381cc169951301bd4b1e6d
SHA10734f6615addb577e9c70e4e316c69b9b89c47dd
SHA256ab362764c495fb54929cd9eaeb18ce67673de091ce892e43439804446e8d5c95
SHA512387fac37e46b197582dbcea9f570e6cf1f5e36ed70b77f1ea42b78af6876b24bc2e0578ca699d2ab6abe212b42f99ded5e71371236d29858209cb2ff855422ce
-
Filesize
1.1MB
MD5bf5099c78068447b31e64521e103ec41
SHA1eb986008eca58285ba5a5b77d83a166395f594ef
SHA256a68c03df839d75b6f512ea26d160a3a506976e301cb13c7e23392c38fbde5677
SHA5121ceb83504b36e2a0bcad7f0c1107685368e2b6156aa0599006b6ee3d8c94d3dfcf14dad679817f785ace71d603fd8d51f2a2ddbaaf48b5d1eaa517d9d69571a7
-
Filesize
885KB
MD5f7aebe01c20ba67e2841a0d26bb14e7a
SHA18571707df764256694e6a5eb9da1288127d570e8
SHA256f92a000062c3b5cb961a9773db071ab7dce19bb21a6b775fb72b89e6e12e745c
SHA512dea2cea63d7098c27d73c3891234b6e672d956a41acc24315de7cce42ba35aae4e6447234c42fca085f91e6749fef051c78af35dee316f348939cbc3a131ce29
-
Filesize
2.5MB
MD5158fd9c419dce70ba111a4300217dba1
SHA137ad9783a213b2f3931480874b04d03c1a71c4da
SHA2562cf12d1a930fd794ac64a29ef7d101ff1a3bea6e2ad7c8d05efdf41913b3b9a0
SHA5125a2364ae31d130e0ae5284a1db4d1577d79fba808443b039a212cb63231f5da44e8bd04f35a758da112467d8d03d2c9fd0e403127c644bdb1e052f547a6e8a51
-
Filesize
112KB
MD556064266bcfaa7848b396ca18d8069eb
SHA10a4e479bedbe55b73ffa05844cba18d48c210bef
SHA256d6b5933b726f83940566863c22d7e2787e581259d1d8c26c40389ba0b3baaa35
SHA512e809d26aec280b871677934a9514bbc95cbc9bb4cd332ee101da7a4559338426ca1d9a129c3d71c897f9ac535e3cb437608bb56964324bf9febaeb04f43b214e
-
Filesize
312KB
MD5b0ffac757be8d6cc41e1131eb2b0d959
SHA10e41733a050bc2ed53fda6337d6501b9942317c2
SHA25604bf38bbd9cb8287582f9a2fb8b06e0ab30f06f676a93f4a56656b576f10e597
SHA512356ecf4902f767f74670e5fcd57f26fb8a43710d0a2b3a995877e6f265119b2f091c6e5e3457dfa1767c6e4043afc470cc7090f43dd997b27c0e94c7e102bee3
-
Filesize
265KB
MD5a45cfb1f058297ae981f8afeef056b8d
SHA1e454ed585a0f19d3119cef725958ea19c93cd7cf
SHA256779768aa0bf2270422e1686547ae622238e7b7cf37ce212a1d75caf8628c1508
SHA512efa87c97e4f76d5fbd73d2e0c5c580c719518d4e3e7e16efdb1355b659c9584956bc7df944f0d637f069f359a046fe65bfd178e4cbaf97fbb5921ebd29e09aa0
-
Filesize
181KB
MD5c264fed121afd44bda8bf0ff8f4e4269
SHA17480a3b26b81045a1504e68e15225682bcc6f440
SHA256cb8d9d80dcd48d9a9e3d87c847c47125f7201a98fb5abb4bd6c443322071b951
SHA51299ed4b723b2b7a90fce8e9bf9ee8d5a1440c4d569638ff6a1aa59354c8bca91618a13c440f754fad3ae22c306709da35b4c53b8a00a09753027eaed0d238052b
-
Filesize
334KB
MD5e33f76bdecd96872d949455b0750679b
SHA1e7764b4b09c2a6e9af043f07de5cc38804114dc6
SHA256784b602b1c61207c5125db0b9195391e90cee3dd6f042f2d1941ed47f52c210b
SHA5127a6378186882a82fce64010585ad44da54e4944f8a40ccb1c703a8550fa1ae18411c8cf48d270733ca374fad5a41758750aa2d94ac61d508657298cc1cf0ee55
-
Filesize
50KB
MD5322db931c5d9130147a611a032a3b4e6
SHA1dc174d4b10c9bd10167dd0dd992e4c318c7d3565
SHA25600a2f60be90b6a26e2b8e7bc7262e1071047e3e6467ce51b9f857f6bfd6b1dfc
SHA5128a63f31996171b8ff86deb1a192f7d36ad1e4b9010c0d1bdd01515323fac56a9cfa34bc05d8db860abc3d2e5e63dd237f2c882080a92e97800951fd1a66ac056
-
Filesize
844KB
MD5a1c90e527e7d09ce4f9dffc2dc1c44a7
SHA1c81de3c93e14208dbffb76accc47b49a6ed19851
SHA256f8dd0584c2b0876464cc14b0940d24a82a5a521d899597b40d3fbc0c99603fda
SHA51215952658a44810ef170ec670ee1aeb98bf2b009704ef345bac9268b359d1a295cd83be4d3984675d6bf3175e089ec75ad2645bf371bfaa2f7e92ba73c4063a87
-
Filesize
244KB
MD5ed8268788ec0eb2a85de42b11dbd8f8a
SHA14de8f8d1dadf5f59ca0e1bb7050ad0ec305e1e9c
SHA25670c812ddf1b02af7d9442cf0351051bb2bd90c2ce07a75d41d0250a7c878829e
SHA512b3f4048bcd3d13a32587aba3903f9cacc79a63b904aec05da443f105108992c59a09069e6fdd2600ea6faa7dabe1f24dc9edde2c46aa05c387c3ecd8c9ef8556
-
Filesize
125KB
MD56635bb09bd59b00d37adbd6401b32100
SHA13a54c2aaffd9604947496d77ea7d854ef032b631
SHA25686b88dd266ba7133ff04502739693dec7e1df93315be7156127d451062f544bb
SHA512a3a5e815b777d1471aa7233166ee894933779bf56d13516ba81e687118067599a9b7a15f642b0ee34bc9052fe4ea9ed7da871825f5ca3ee8da1424e8df5a978f
-
Filesize
465KB
MD55524cdd67e4b647e2182140d061c38aa
SHA1bf37d31c8b6fc5b21208d6bd63e354174d20033b
SHA256b79bad2a8ece3f5729a56a41f3ae9b956d4b9920ef3d94425b32189c94d4d8d2
SHA51297ccf0c0f2a8384802fbc3d59269c00bef26adfe6255b3c6e16165f5721892c8660fc94815ff05d7501fb60d28d1f271a2646fec8f3c98d8d6235d281eb14817
-
Filesize
133KB
MD52205dfeaf187d0f4f6e8c6e9f669f635
SHA13de9354d3e52bb92bf801afdf65cdd42586b4b67
SHA256ecce636b52cca20a34fc29c19ca73a2616a8ea37517beb3f7a8eb2a2f246085f
SHA51288cd55636f5771d8a4679703ac363a33d54d4b52f4dca52b14853301bef19695a2978e1fe5255811e796cf593c4445c62b6251f8bdb13f6b59c8d849d72c8d94
-
Filesize
233KB
MD5988ef947e1c63344a1778288213d0f5b
SHA1548c542c75f268d8a9edd885e2408c334f06db23
SHA256dd13ef8d2d5ec67ab468259eddd0326ea2522acec19f16fdcba433e6e86fc8f1
SHA5128424bc3c8c15de8d15731d7e14bec4afa8cb2e8dd749a8defc7a52519c67b131b31f8144446091ac69add4f51b2d3e1f6806ceb1deba4c0a04b1fb9ee92ea3ac
-
Filesize
229KB
MD54a32f3e0ea7c56e313481f85677d98fe
SHA139957caa9042f0eb1eaeeefb8c7faeeae4b6687b
SHA2569a1a5b216b0c5e9a328c8440faeb82afbc9d99040f2554ac3671b3309b4a5632
SHA512a73972a0b0afb47999b0e30fed31a714f41bda0e11b1a26cde48e2aa37c4fedebd8a32414a3ade70d175fa6aebc17f352bad00767f5fc3e136948ccbf3b2d32d
-
Filesize
29KB
MD572f5fa9eb744818136a0ad6b5bc3b332
SHA123facc141497c0c27bf25ee2d81b37bdfb5a1e9c
SHA256ef89ba69fa02c1617005b2cab71981126f926c50fe21fef454de2a91f3b27edd
SHA5125bf62bbff9ff8e78367b3fce41b9cdad4cefcd8b02c114fe4b71a302365af68f6ba6b9a4871ecbf877bc12d3e5c0876a344041cc46adb4e89efeaa30d512401c
-
Filesize
200KB
MD595b513650615b2661e2d6660dedb2d28
SHA128c6b0a871a066e7592d857942e42657de68ce76
SHA2568d2e970256c8227b290506a81e61206af5c5996ab73a06dff13d667dbe7c36e3
SHA5129e171e42f38e502afa87fe3765ca61c3ac6a9dc5c76bfc0d7f8d32b19b10ba6ee02bd06a4a7b3d9e9c98eef8c4a528af62b41b7b9c5fd841e63028d1cc44b9b0
-
Filesize
25KB
MD56cf5b5f2492a07175902beefa138522d
SHA15ad85b25c7cad0b0747eb6ea0fbaca5830571244
SHA2567addf56d9c08efb13d7c8bb39cf9073cd58495f22aaa04e22c1b43661d67fc0b
SHA512fe2f0bad6d650f6a260488e9dd2b5476d2553995219a72eba7bf75ac61135382237a19b107c76b9762f959e4e14470a40aa588069fb3dac3a2512afba8a537a1
-
Filesize
53KB
MD5aa61ac6aa49a499b30dce871869bb6be
SHA1cfce11e23f1678fe9e46bc72b54ccc546c6e79aa
SHA256c5a4a3674b518f7378a900665ac94d39a305f92dccaed5a879c328d6cc308ae7
SHA512bd1facaded3bb2fa47901e0e0cc27a5376fe11c140a5be26a95a38fd66a1799109dd97ece1c413fd226ef5da3ebf55b0999c80b8bc1eab828a84a4600d84108d
-
Filesize
22KB
MD5c6c0e09404a118930a3e3df78dddb43c
SHA144285de81985dbf4f72d9615cc0233da28143e55
SHA256906959ece55907e11802e4d20278f248f8f6f92275f99f755dce02f7e7a77333
SHA512d593a99ca92f4667aba8ee275cacbed916db4b5d058519d4641bc03e3c9c155272c863c574a614c4ffd8771e68262881cb7a423683ece197183027f32629b047
-
Filesize
25KB
MD556aa49d64c747cdd6b5cef305b4e423f
SHA19f0a4c6600e61e394476a35ef639d428bb2a136d
SHA256dc90ebf8ffd5d30fda40b5c7779579ab65d83f80ca9fd3e5ab119efc42aa4902
SHA512504f183939893b83d733a4be49a90c79893631ffa2367ebb0a27777a67337d7b06bb2e57bdf4a53a28131fdd7007db3c7add8a84e28cf8e4897c75dec44f09c8
-
Filesize
449KB
MD508feed3a3238c459708078d9bd392360
SHA189d05d0a1506740b08cd634574268aba30168874
SHA256ad28878b980abda7dd258bcddc50f3aa8c2a1163b5e3611c8c63d6589b6fa249
SHA5129f149872f6514aeb3a3901601827067e45196dbf9f4c03ee8709c7d6b5a5eae84b268dab65066f10b20e9a65a081db0b5c44e28bb245b803c940b7366230b86a
-
Filesize
37KB
MD59d97fa707aa40a6ed68545a35ec0e038
SHA194f2c2e380987fed5670a4d15ffdcc2896a1e867
SHA256c866c99a2a5d049d3394ab8f58b46ee9450eb493bfba4e0c2be34801fa3ac322
SHA512b0ded01166cde92775851d24bd21f463989f5ec1752a6c97dd8374f9960ce1338d1dfeae8ce9636527c70a6874e8ef67b2c8921590b1a73e83c008a0ad177b88
-
Filesize
14KB
MD5f470cc1a72cd0dffc799f0d2b0ab9f6a
SHA1a1d0e98aaea162739bd52c36d2a77b3028531859
SHA256ce9f8fd595dd6450f2b5d2633d684cf7a247f61875d95bd2eb3c5a441d93e0f8
SHA51260e65ba2e42150e90219c7ff0c85d12a0db15444dcd6d958436f0f52e28a20a4723e4cd2a4d23f999312be1b832d37cdb60d1d434b4fde95b701c03ceb31670d
-
Filesize
51KB
MD508089179f184f92fafe82e690b335bcf
SHA1f272226069706e1e2d009e95e408b3303a8b1662
SHA25658eac56896032ca3babd1093b25be14c1a54ecbec2c7ad0f9ae6b87ffba2a30c
SHA5126277e5151628a0e8e78006e8c69c44b89c988352e1de02de149dd162bb2a5dcffa3f1bf2844d8a621c1768ea12b8597ddbb1abc375312240873f1151aa0a2dda
-
Filesize
77KB
MD5bdb493093a0a8b3a19744db0f3e9bb9b
SHA16c5aace481375a8ffcd0b5d722cf02ae8c752a06
SHA256b33f0bbe8dceac3eea4a1bd4ded2af8b34303cabe7029e8d3294ce20d446ea1a
SHA5126d288388e99ce7c51f469da65a64835c0d6e0b63577e4ee8e5dd566e87df8999af1ea19b621e34d8017d88cdba93a09cd74feeb99ebb5970002444369e3af8a7
-
Filesize
10KB
MD538977533750fe69979b2c2ac801f96e6
SHA174643c30cda909e649722ed0c7f267903558e92a
SHA256b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35
SHA512e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53