Analysis
-
max time kernel
20s -
max time network
35s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-11-2024 23:08
Static task
static1
Behavioral task
behavioral1
Sample
jre-8u51-windows-x64.exe
Resource
win11-20241007-en
General
-
Target
jre-8u51-windows-x64.exe
-
Size
41.2MB
-
MD5
b9919195f61824f980f4a088d7447a11
-
SHA1
447fd1f59219282ec5d2f7a179ac12cc072171c3
-
SHA256
3895872bc4cdfb7693c227a435cf6740f968e4fa6ce0f7449e6a074e3e3a0f01
-
SHA512
d9f4e268531bd48f6b6aa4325024921bca30ebfff3ae6af5c069146a3fc401c411bdeceb306ba01fbf3bcdc48e39a367e78a1f355dc3dd5f1df75a0d585a10c6
-
SSDEEP
786432:lIL77/mXteC+c78UZnibhhr7pYA/NSkv7JrpzUyHTrD0N6U1cNYGOtss:lK7gf3iLrNYrk1rpwyPD0N6vYGOtT
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 11 IoCs
Processes:
installer.exebspatch.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exejavaw.exepid process 3132 installer.exe 4832 bspatch.exe 4728 unpack200.exe 3076 unpack200.exe 240 unpack200.exe 4668 unpack200.exe 2240 unpack200.exe 2420 unpack200.exe 2752 unpack200.exe 1556 unpack200.exe 2912 javaw.exe -
Loads dropped DLL 15 IoCs
Processes:
unpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exeunpack200.exejavaw.exeinstaller.exepid process 4728 unpack200.exe 3076 unpack200.exe 240 unpack200.exe 4668 unpack200.exe 2240 unpack200.exe 2420 unpack200.exe 2752 unpack200.exe 1556 unpack200.exe 2912 javaw.exe 2912 javaw.exe 2912 javaw.exe 2912 javaw.exe 2912 javaw.exe 3132 installer.exe 3132 installer.exe -
Blocklisted process makes network request 4 IoCs
Processes:
msiexec.exeflow pid process 10 244 msiexec.exe 11 244 msiexec.exe 12 244 msiexec.exe 13 244 msiexec.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Installs/modifies Browser Helper Object 2 TTPs 6 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
installer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435b-BC74-9C25C1C588A9}\NoExplorer = "1" installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\NoExplorer = "1" installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{DBC80044-A445-435B-BC74-9C25C1C588A9} installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435b-BC74-9C25C1C588A9} installer.exe -
Processes:
resource yara_rule C:\ProgramData\Oracle\Java\installcache_x64\bspatch.exe upx behavioral1/memory/4832-145-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/4832-151-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
installer.exeunpack200.exedescription ioc process File created C:\Program Files\Java\jre1.8.0_51\Welcome.html installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\jp2ssv.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\deploy\messages_zh_TW.properties installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\fonts\LucidaTypewriterBold.ttf installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\jfr.jar installer.exe File created C:\Program Files\Java\jre1.8.0_51\release installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\jabswitch.exe installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\javaws.exe installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\plugin2\msvcr100.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\deploy\messages_pt_BR.properties installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\flavormap.properties installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\mlib_image.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\resource.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\ext\sunec.jar installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\fonts\LucidaBrightRegular.ttf installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\accessibility.properties installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\ext\access-bridge-64.jar installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\dcpr.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\java.exe installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\prism_sw.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\server\Xusage.txt installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\t2k.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\w2k_lsa_auth.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\ext\zipfs.jar installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\images\cursors\win32_MoveDrop32x32.gif installer.exe File created C:\Program Files\Java\jre1.8.0_51\THIRDPARTYLICENSEREADME-JAVAFX.txt installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\javaw.exe installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\msvcr100.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\images\cursors\invalid32x32.gif installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\management\jmxremote.access installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\management\management.properties installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\security\local_policy.jar installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\hprof.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\ktab.exe installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\ssv.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\wsdetect.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\deploy\splash.gif installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\fontconfig.properties.src installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\deploy.pack installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\deploy.jar unpack200.exe File created C:\Program Files\Java\jre1.8.0_51\bin\javacpl.cpl installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\management.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\tnameserv.exe installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\zip.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\jfxswt.jar installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\meta-index installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\rt.pack installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\jsdt.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\policytool.exe installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\rmid.exe installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\ext\nashorn.jar installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\fonts\LucidaTypewriterRegular.ttf installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\management-agent.jar installer.exe File created C:\Program Files\Java\jre1.8.0_51\README.txt installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\javafx_font.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\jp2iexp.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\jsound.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\cmm\sRGB.pf installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\security\blacklisted.certs installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\npt.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\bin\sunec.dll installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\deploy\messages_de.properties installer.exe File created C:\Program Files\Java\jre1.8.0_51\lib\javafx.properties installer.exe -
Drops file in Windows directory 10 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Windows\SystemTemp\~DF170179F42DD63726.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSIA875.tmp msiexec.exe File created C:\Windows\Installer\e57a24b.msi msiexec.exe File opened for modification C:\Windows\Installer\e57a24b.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F86418051F0} msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DFB06C6E173A4C563D.TMP msiexec.exe File created C:\Windows\Installer\e57a24f.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bspatch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bspatch.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
msiexec.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msiexec.exe -
Processes:
installer.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{5852F5ED-8BF4-11D4-A245-0080C6F74284} installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284} installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284}\AppName = "javaws.exe" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284}\AppPath = "C:\\Program Files\\Java\\jre-1.8\\bin" installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284}\Policy = "0" installer.exe -
Modifies registry class 64 IoCs
Processes:
installer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0015-0000-0069-ABCDEFFEDCBA}\InprocServer32 installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0233-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files\\Java\\jre-1.8\\bin\\jp2iexp.dll" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0014-0002-0090-ABCDEFFEDCBA}\InprocServer32 installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0015-0000-0034-ABCDEFFEDCBA}\INPROCSERVER32 installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0015-0000-0048-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files\\Java\\jre-1.8\\bin\\jp2iexp.dll" installer.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0080-ABCDEFFEDCBB} installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0362-ABCDEFFEDCBC}\InprocServer32 installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0018-0000-0130-ABCDEFFEDCBB}\INPROCSERVER32 installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0212-ABCDEFFEDCBC}\ = "Java Plug-in 1.8.0_212" installer.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0013-0001-0076-ABCDEFFEDCBA} installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0015-0000-0097-ABCDEFFEDCBC}\INPROCSERVER32 installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0033-ABCDEFFEDCBB} installer.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0053-ABCDEFFEDCBA}\InprocServer32 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0023-ABCDEFFEDCBB} installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0159-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0013-0001-0069-ABCDEFFEDCBA} installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0014-0002-0061-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre-1.8\\bin\\jp2iexp.dll" installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0014-0002-0098-ABCDEFFEDCBA} installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0259-ABCDEFFEDCBB}\InprocServer32 installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0356-ABCDEFFEDCBC}\INPROCSERVER32 installer.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0147-ABCDEFFEDCBB}\InprocServer32 installer.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0163-ABCDEFFEDCBB} installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0192-ABCDEFFEDCBA} installer.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0013-0001-0067-ABCDEFFEDCBA}\InprocServer32 installer.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0068-ABCDEFFEDCBA} installer.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0320-ABCDEFFEDCBB}\INPROCSERVER32 installer.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0092-ABCDEFFEDCBA} installer.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0208-ABCDEFFEDCBB}\INPROCSERVER32 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0129-ABCDEFFEDCBB}\InprocServer32 installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0222-ABCDEFFEDCBA}\ = "Java Plug-in 1.7.0_222" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0289-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files\\Java\\jre-1.8\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0175-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files\\Java\\jre-1.8\\bin\\jp2iexp.dll" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0014-ABCDEFFEDCBB} installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0091-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files\\Java\\jre-1.8\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0274-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files\\Java\\jre-1.8\\bin\\jp2iexp.dll" installer.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0114-ABCDEFFEDCBA} installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0172-ABCDEFFEDCBB} installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0014-0002-0007-ABCDEFFEDCBB} installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0014-0002-0020-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0104-ABCDEFFEDCBC} installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0268-ABCDEFFEDCBB}\ = "Java Plug-in 1.8.0_268" installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0014-0002-0089-ABCDEFFEDCBA}\INPROCSERVER32 installer.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_CLASSES\CLSID\{CAFEEFAC-0016-0000-0052-ABCDEFFEDCBC}\INPROCSERVER32 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0129-ABCDEFFEDCBB} installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0002-ABCDEFFEDCBC} installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0042-ABCDEFFEDCBA}\InprocServer32 installer.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0235-ABCDEFFEDCBC} installer.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0077-ABCDEFFEDCBB} installer.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0240-ABCDEFFEDCBC} installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0068-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0206-ABCDEFFEDCBC}\ = "Java Plug-in 1.6.0_206" installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0042-ABCDEFFEDCBC}\ = "Java Plug-in 1.7.0_42" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0096-ABCDEFFEDCBB}\ = "Java Plug-in 1.7.0_96" installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0381-ABCDEFFEDCBB}\ = "Java Plug-in 1.7.0_381" installer.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0011-ABCDEFFEDCBA} installer.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0139-ABCDEFFEDCBB}\INPROCSERVER32 installer.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0159-ABCDEFFEDCBC}\INPROCSERVER32 installer.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0155-ABCDEFFEDCBB} installer.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0199-ABCDEFFEDCBB} installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0085-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0297-ABCDEFFEDCBC} installer.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0101-ABCDEFFEDCBA} installer.exe Key deleted \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0232-ABCDEFFEDCBC} installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0237-ABCDEFFEDCBB}\INPROCSERVER32 installer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
jre-8u51-windows-x64.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 3324 jre-8u51-windows-x64.exe Token: SeIncreaseQuotaPrivilege 3324 jre-8u51-windows-x64.exe Token: SeSecurityPrivilege 244 msiexec.exe Token: SeCreateTokenPrivilege 3324 jre-8u51-windows-x64.exe Token: SeAssignPrimaryTokenPrivilege 3324 jre-8u51-windows-x64.exe Token: SeLockMemoryPrivilege 3324 jre-8u51-windows-x64.exe Token: SeIncreaseQuotaPrivilege 3324 jre-8u51-windows-x64.exe Token: SeMachineAccountPrivilege 3324 jre-8u51-windows-x64.exe Token: SeTcbPrivilege 3324 jre-8u51-windows-x64.exe Token: SeSecurityPrivilege 3324 jre-8u51-windows-x64.exe Token: SeTakeOwnershipPrivilege 3324 jre-8u51-windows-x64.exe Token: SeLoadDriverPrivilege 3324 jre-8u51-windows-x64.exe Token: SeSystemProfilePrivilege 3324 jre-8u51-windows-x64.exe Token: SeSystemtimePrivilege 3324 jre-8u51-windows-x64.exe Token: SeProfSingleProcessPrivilege 3324 jre-8u51-windows-x64.exe Token: SeIncBasePriorityPrivilege 3324 jre-8u51-windows-x64.exe Token: SeCreatePagefilePrivilege 3324 jre-8u51-windows-x64.exe Token: SeCreatePermanentPrivilege 3324 jre-8u51-windows-x64.exe Token: SeBackupPrivilege 3324 jre-8u51-windows-x64.exe Token: SeRestorePrivilege 3324 jre-8u51-windows-x64.exe Token: SeShutdownPrivilege 3324 jre-8u51-windows-x64.exe Token: SeDebugPrivilege 3324 jre-8u51-windows-x64.exe Token: SeAuditPrivilege 3324 jre-8u51-windows-x64.exe Token: SeSystemEnvironmentPrivilege 3324 jre-8u51-windows-x64.exe Token: SeChangeNotifyPrivilege 3324 jre-8u51-windows-x64.exe Token: SeRemoteShutdownPrivilege 3324 jre-8u51-windows-x64.exe Token: SeUndockPrivilege 3324 jre-8u51-windows-x64.exe Token: SeSyncAgentPrivilege 3324 jre-8u51-windows-x64.exe Token: SeEnableDelegationPrivilege 3324 jre-8u51-windows-x64.exe Token: SeManageVolumePrivilege 3324 jre-8u51-windows-x64.exe Token: SeImpersonatePrivilege 3324 jre-8u51-windows-x64.exe Token: SeCreateGlobalPrivilege 3324 jre-8u51-windows-x64.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
msiexec.exeinstaller.exedescription pid process target process PID 244 wrote to memory of 3132 244 msiexec.exe installer.exe PID 244 wrote to memory of 3132 244 msiexec.exe installer.exe PID 3132 wrote to memory of 4832 3132 installer.exe bspatch.exe PID 3132 wrote to memory of 4832 3132 installer.exe bspatch.exe PID 3132 wrote to memory of 4832 3132 installer.exe bspatch.exe PID 3132 wrote to memory of 4728 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 4728 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 3076 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 3076 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 240 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 240 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 4668 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 4668 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 2240 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 2240 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 2420 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 2420 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 2752 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 2752 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 1556 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 1556 3132 installer.exe unpack200.exe PID 3132 wrote to memory of 2912 3132 installer.exe javaw.exe PID 3132 wrote to memory of 2912 3132 installer.exe javaw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\jre-8u51-windows-x64.exe"C:\Users\Admin\AppData\Local\Temp\jre-8u51-windows-x64.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3324 -
C:\Program Files\Java\jre1.8.0_51\bin\javaw.exe-cp "C:\Program Files\Java\jre1.8.0_51\bin\..\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -getUserWebJavaStatus2⤵PID:2120
-
-
C:\Program Files\Java\jre1.8.0_51\bin\javaw.exe-cp "C:\Program Files\Java\jre1.8.0_51\bin\..\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -getUserPreviousDecisionsExist 302⤵PID:3912
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Program Files\Java\jre1.8.0_51\installer.exe"C:\Program Files\Java\jre1.8.0_51\installer.exe" /s INSTALLDIR="C:\Program Files\Java\jre1.8.0_51\\" REPAIRMODE=02⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\ProgramData\Oracle\Java\installcache_x64\bspatch.exe"bspatch.exe" baseimagefam8 newimage diff3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4832
-
-
C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe"C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe" -r "C:\Program Files\Java\jre1.8.0_51\lib\deploy.pack" "C:\Program Files\Java\jre1.8.0_51\lib\deploy.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:4728
-
-
C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe"C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe" -r "C:\Program Files\Java\jre1.8.0_51\lib\javaws.pack" "C:\Program Files\Java\jre1.8.0_51\lib\javaws.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3076
-
-
C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe"C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe" -r "C:\Program Files\Java\jre1.8.0_51\lib\plugin.pack" "C:\Program Files\Java\jre1.8.0_51\lib\plugin.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:240
-
-
C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe"C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe" -r "C:\Program Files\Java\jre1.8.0_51\lib\rt.pack" "C:\Program Files\Java\jre1.8.0_51\lib\rt.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4668
-
-
C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe"C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe" -r "C:\Program Files\Java\jre1.8.0_51\lib\charsets.pack" "C:\Program Files\Java\jre1.8.0_51\lib\charsets.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2240
-
-
C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe"C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe" -r "C:\Program Files\Java\jre1.8.0_51\lib\jsse.pack" "C:\Program Files\Java\jre1.8.0_51\lib\jsse.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2420
-
-
C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe"C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe" -r "C:\Program Files\Java\jre1.8.0_51\lib\ext\localedata.pack" "C:\Program Files\Java\jre1.8.0_51\lib\ext\localedata.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2752
-
-
C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe"C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe" -r "C:\Program Files\Java\jre1.8.0_51\lib\ext\jfxrt.pack" "C:\Program Files\Java\jre1.8.0_51\lib\ext\jfxrt.jar"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1556
-
-
C:\Program Files\Java\jre1.8.0_51\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_51\bin\javaw.exe" -Xshare:dump3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2912
-
-
C:\Program Files\Java\jre1.8.0_51\bin\javaws.exe"C:\Program Files\Java\jre1.8.0_51\bin\javaws.exe" -wait -fix -permissions -silent3⤵PID:4604
-
C:\Program Files\Java\jre1.8.0_51\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_51\bin\javaw.exe" -classpath "C:\Program Files\Java\jre1.8.0_51\lib\deploy.jar" com.sun.deploy.panel.JreLocator4⤵PID:2032
-
-
C:\Program Files\Java\jre1.8.0_51\bin\jp2launcher.exe"C:\Program Files\Java\jre1.8.0_51\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre1.8.0_51" -vma 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 -ma LXdhaXQALWZpeAAtcGVybWlzc2lvbnMALXNpbGVudAAtbm90V2ViSmF2YQ==4⤵PID:3496
-
-
-
C:\Program Files\Java\jre1.8.0_51\bin\javaws.exe"C:\Program Files\Java\jre1.8.0_51\bin\javaws.exe" -wait -fix -shortcut -silent3⤵PID:3604
-
C:\Program Files\Java\jre1.8.0_51\bin\jp2launcher.exe"C:\Program Files\Java\jre1.8.0_51\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre1.8.0_51" -vma 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 -ma LXdhaXQALWZpeAAtc2hvcnRjdXQALXNpbGVudAAtbm90V2ViSmF2YQ==4⤵PID:1984
-
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D3C034E033BAABB8C4F81FB330FC2F0A2⤵PID:2096
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /c del "C:\Program Files\Java\jre1.8.0_51\installer.exe"3⤵PID:4768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789KB
MD53427b4cf705762e887a1dd2f4bc0be46
SHA1dff7beca1e3a96af61108917cab59572e4290816
SHA2568c1973eff4f813cece5f0b77115992f396d509e10a63eb8e990e036bd440af00
SHA5124622ea80dda416f3632d511539e73fbbadcb7d54c96fb4c69220ab5972b0056cb59cb1dceffd86812094d79cc97fc4db6325eb888958de29ff33cc0bc734150e
-
Filesize
809KB
MD5df3ca8d16bded6a54977b30e66864d33
SHA1b7b9349b33230c5b80886f5c1f0a42848661c883
SHA2561d1a1ae540ba132f998d60d3622f0297b6e86ae399332c3b47462d7c0f560a36
SHA512951b2f67c2f2ef1cfcd4b43bd3ee0e486cdba7d04b4ea7259df0e4b3112e360aefb8dcd058becccacd99aca7f56d4f9bd211075bd16b28c2661d562e50b423f0
-
Filesize
563KB
MD5dde10ec36be410229d7af47a2bcecdf9
SHA1ef377955905bd228548a02e55ba65800271ab059
SHA256240e962a459979f4c67020f9f6c21492dde53ef03fc79f150a02e2bed3146986
SHA512a585cb3ba177549fcbf477a28328b0f34db9c0909a56e24b5ffc491fbd0a97871bb495b10decb117239f7fda4eada210f6e92dfc9e3c57f19c2cf8ff67703e5d
-
Filesize
154KB
MD531401e170ddd8437635c4c8571a80341
SHA1b79de1ce1b96ad0c3d00c8a32e55043eaeb1bad7
SHA2563e060e1aafa2fe99f06c34db84a49d3a2f994c1a0dbef40f37dbafd45cd69533
SHA512fc5e52e5398563a39dd5d8204ffe52a8668c19e1f1bb9706cf408c6c7ed81f8be667d87233bcdfd8739ac022792c36b9147249e5eedb51b21493100ffbf1e5c9
-
Filesize
202KB
MD57b23b0aab68e65b93bb6477f05999574
SHA1920752e4c22e1165e6df27f69599483187edfbb3
SHA25632546ecf1236769d2d777331f90282fb97589bec75da11c8e727d61d3d4c988a
SHA512e3395303e53edce3dfa8fe11b7338c77795595a17dac17818e4bc8b77feee4900d541201d6762aa8f46565730e24a5423684049d40bbd074186ef7223c96b604
-
Filesize
314KB
MD55ed6faed0b5fe8a02bb78c93c422f948
SHA1823ed6c635bd7851ccef43cbe23518267327ae9a
SHA25660f2898c91ef0f253b61d8325d2d22b2baba1a4a4e1b67d47a40ffac511e95a5
SHA5125a8470567f234d46e88740e4f0b417e616a54b58c95d13c700013988f30044a822acfef216770181314fa83183a12044e9e13e6257df99e7646df9a047244c92
-
Filesize
17.0MB
MD59b44dac5c0f78fa5549d46bc6d092c15
SHA1e37d75d27c1e2c16dea42e1ab96c6f845960b7e3
SHA256f87dd946d26680669cad5c03cf858235a8cb0cd31d86fa6a7235ee0aef559fd3
SHA512061b9439293a0a613a79dbd6744e8089f71a7e498760b17c331201117b90a39c9649cc4d251b10f518862b12599a26f7caa09480e4a08ea9fd88d372d435ec60
-
Filesize
8.3MB
MD52894ece7b8de355b13978d6b8ec6e68c
SHA1cec5cd8450498ee6f81eae2f10e56726b6125be2
SHA25604d85639dacb86c6efca146051681608727f0376ca5293b9f83b232fc4db6a54
SHA512634e1cedf63d384c072bbd32dbca35982f7b2a7a77ab6d11130f2d45fd164d17ad080206a650854473370e824ec1153c61821c318a2af7954d2031a38d37bfd4
-
Filesize
192KB
MD55b071854133d3eb6848a301a2a75c9b2
SHA1ffa1045c55b039760aa2632a227012bb359d764f
SHA256cc8d67216b1e04d7a41bf62f9c1088cd65a3d21796c5a562851e841b3afa28cf
SHA512f9858ec0a1bfb7540512ede3756653d094ff9fe258d13a8431599280db945e8d9ea94c57595c6a21aa4fbfcd733eea9b887bfcf87e84279a7e632db55380920c
-
Filesize
48KB
MD55f317dc17d83fd8d80df4eee1a6f1024
SHA1256a67812cf7e6f6d41884d290e995e144c41c6e
SHA256238f96dc1effcb719a9efe8472c34aa880e2cff4af94e26b8a48b5c00695d688
SHA5125f0e62e0c314d9aed7d61bb79d77c3389855afbfc3765262ec61ab8c4b1648c1d1b7cd7b23f54319d4139ab2132a2471c115790ec25ac4a03d340abde0fe0e75
-
Filesize
75KB
MD5d027f8fd7d74aff3bf8cbddba3aa04e4
SHA1f6b97d03bfc4870f33414ec235160f77581452ec
SHA256d62088f0dc6aff56b2bc71185a88b225d61700bca55fcc721c9e9d5b02459790
SHA512eab8cfc41482bbcdfba5d0e77397b15d65227d98ed764cde0c56cffe75a314ed4aca9d3a12414ab6718e01064d6939a2b75f2c845f91742bd02aae5bcaa05b59
-
Filesize
634B
MD5499f2a4e0a25a41c1ff80df2d073e4fd
SHA1e2469cbe07e92d817637be4e889ebb74c3c46253
SHA25680847ed146dbc5a9f604b07ec887737fc266699abba266177b553149487ce9eb
SHA5127828f7b06d0f4309b9edd3aa71ae0bb7ee92d2f8df5642c13437bba2a3888e457dc9b24c16aa9e0f19231530cb44b8ccd955cbbdf5956ce8622cc208796b357d
-
Filesize
2.9MB
MD5eadb8bf14fa96d280b7c754df1f6e347
SHA15b8d6ef3c38cf9211dcc25aacfcd872d26ff406f
SHA2562b44da184819640f10a93fa64f1cdde2bbad735017f7c20d504d5379bf126cdc
SHA512274ff96580c1524707554329e9e9c44b807e8592cda48c844f375cc778a04268de785457b79624794acb59ee12bb72182fd6786f3d1a617c0743689dc2c826ee
-
Filesize
1.0MB
MD545288142b863dc4761b634f9de75e5e5
SHA19d07fca553e08c47e38dd48a9c7824e376e4ce80
SHA25691517ff5c74438654956aae554f2951bf508f561b288661433894e517960c2ac
SHA512f331cd93f82d2751734eb1a51cb4401969fb6e479b2e19be609e13829454ec27cec864c57bdc116bf029317c98d551e9feafc44386b899a94c242bc0464556d8
-
Filesize
78KB
MD551531cbbe256939e7ab12fcc256fbf3a
SHA15754126190f818b7d39d5b725a1878fb33233d26
SHA256406b68d923e9ce01f19194bca03eaaf9fc0efce6590713b6d066485cd94d1339
SHA512dae90c8f429bfc7782bed9116b6a3b30110ce2b2da865f63fefdbd6be965284c7d90ff8ebf869481e01246d35264110a3d8690b397cb1a109faf61d2f937bcc2
-
Filesize
4.6MB
MD5ead52a7e271669b340218ac3b60ce429
SHA1c49afc97e994be2e904d36e8794d791d35718e74
SHA256f8729d0cf43df8b85acc2670f353dca017f16acf95d32f22c611876e78b666a0
SHA512349edc648b7450a752ea3ffe296d5bc79b80a3839e275a997336637900cc0712db4a589e7a5e7cc01f1ed558c174370ffa2e4c831270b78fd6d28dc6542c3418
-
Filesize
1.8MB
MD55cfc3a1b269312f7a2d2f1d7c0497819
SHA1d048284db9ce7103156f8bbce988b4d9978786b7
SHA25680ba80d2a6c20deef6e2f3973337e15e22eec30508899ae998bf191ba725db26
SHA5128735af7c8bc5b48aac42120326a5dee21f98512ba31c57c77b6fc3906b7b1b98e5f22f57a31f26dc3e16abe63a6f15ef2e115c7fc17bbab35e846dc373da9c6b
-
Filesize
15.8MB
MD50c83f7f315e23766297a6680306f0254
SHA1f23b6c77346a62f3bdeb804e2e977a76bc553dea
SHA2564c1ed994f5488caee2c259dedaa782a5467f40ab05f1f5fce0fba24b8bc2bacc
SHA512beb478d508d54cde86297b8869123a08f70726047a98e2454a3c412419d8e243f073998f6dc7d55533f8e18f46a7e8bba31d0d4571c9e7cd1800f8d1a0b7d6bc
-
Filesize
4.8MB
MD58dfebf0b78c6e3bf5aa5002ca9a6da1a
SHA11edee53b9e0af5d767d0051c2beccc474035024f
SHA2560840d659560e62fcc41cd42dec9d7aedb8359f606097b540806452ca8ad05e21
SHA512f9bf6e9558b52969ec152fbfebc239c1bcb7e4343b3dc58da5e7cac015d1fe75f255bd9ceb3fdeb86b2c05be62c62b552a25c94aba4091df3eaf163cf91da444
-
Filesize
2.1MB
MD59859cc76005a594e4972bcb22b7205b5
SHA119f9ff82ecec5dc6b09e21ee00ecc9819d8ca4aa
SHA256906b00c40f33ac56f534a82915fd7ecd99d5162739419075346204b07837ea1e
SHA5126223ca652c38107c148f93dd80dfc4586f26e5df73f6265f46c4bcb89008225e861637f737a7a39e5d1a02e6d9e62ce0b1cee5de164ef58f3f41053009e71257
-
Filesize
1.3MB
MD52ad7c3462a7494b29edbe3701ebeab4c
SHA17358ab9b0c4771efdc0d28764b90a46aac55e865
SHA2567cdc489fa093e924649e82f4eb9689bc1bc0d28e20e37a0a94060efd5428c2db
SHA5128b1f0f5932896f1876e5f8137dc8f74ff79f02b7708220b53ab2146fc742403ee952c68dddff9a92c786d4a534f7a266327934a8fe84a3c979c016cc8c93efdb
-
Filesize
153B
MD51e9d8f133a442da6b0c74d49bc84a341
SHA1259edc45b4569427e8319895a444f4295d54348f
SHA2561a1d3079d49583837662b84e11d8c0870698511d9110e710eb8e7eb20df7ae3b
SHA51263d6f70c8cab9735f0f857f5bf99e319f6ae98238dc7829dd706b7d6855c70be206e32e3e55df884402483cf8bebad00d139283af5c0b85dc1c5bf8f253acd37
-
Filesize
943KB
MD586ef3e7b92e7aef0cdf5289ea7af43ed
SHA10dc099e2108fd993774fa46a70e535f1e0d8fc72
SHA25600191707ba332e7bf3f9ac5608db3ce878ab597e06950eff0ab7edb40d667dbc
SHA51234d3dc49131c9a604250e635801e8829bddae0837922fd640e58a185f8ce47ba241c06c46eff5fe2fe48a33f659bc49e15315dc222a52c98a8710c2df1d235f5
-
Filesize
211KB
MD55a83bc9b3e4a7e960fd757f3ad7cd263
SHA1f5f308aec7e93accb5d6714c178b8bf0840fb38d
SHA2560a95ab97c85e534b72a369b3ee75200f8075cb14e6f226196b18fd43e6ba42f5
SHA512b8e554bbf036d0500686e878597ffdefa8bcd091ab6533eae76fa04eda310cec7cac89b71911f1f81012f499c7bec890ac9032685945f7e5e6b68f7ad3f7430c
-
Filesize
111KB
MD5df21aa9a2da9f94763bdcc80f07c9afd
SHA1bccfe5cfbbf0791e752754b964313f9079f748bf
SHA256c57cf3b05d552d8a573b31a46e97a13201cf1df8f0d5cd4645514ba9a3f1c6a8
SHA512034bbbb0a12eb21a08947e70ab30c15bb938e295f40d414b1a8df57db0a47828f23e7c612dcb936c4ab745f8ee217da571632d29fe115d946851538040d51756
-
Filesize
542KB
MD5efa3ad7225fb79074246e8911e473264
SHA11e19fe8dccf71d430dec20d613ace2b99e380d7a
SHA2561bbcb162afe5db029fa889fde95ac0551f01395bce09fcc749feb26b5a10e6da
SHA512cc1245475c0652b08e53e503b3917262999c2db8a1962bc9b12a4fc87e689a8d51570c6432c3e55c3e7f6c3ed19892afc51868bc815bfc34ab5ad3b10e0a706d
-
Filesize
549KB
MD5411db7604ce2ca0ca1782d04f861e610
SHA1fd88154b1cf75333ed59753f722595a133d2ee4a
SHA256134730589e2c0519b1885df121869725903abcdb05a5e844348d56bdb84efb3a
SHA512a2a9c82b515b2d90172e27cc7558b956112d1ca6678665ee847d63a79826059cac9161e4c3a0005711af6e21400f9850d6879348517bd9242700fa1e19c9fd82
-
Filesize
150KB
MD5168f72fd2f288a96ee9c4e845339db02
SHA1e25b521b0ed663e2b050af2b454d571c5145904f
SHA2565552e52e39c0e7ac423d6939eec367a0c15b4ca699a3a1954f2b191d48a034e6
SHA51201cdf3d8d3be0b2458d9c86976cef3f5a21131d13eb2a1c6f816aeb2c384779b67d1b419fa9233aedd3bbd16970ec7c81689bf2e25a8bebadec5de8e9b5a19f1
-
Filesize
2KB
MD591aa6ea7320140f30379f758d626e59d
SHA13be2febe28723b1033ccdaa110eaf59bbd6d1f96
SHA2564af21954cdf398d1eae795b6886ca2581dac9f2f1d41c98c6ed9b5dbc3e3c1d4
SHA51203428803f1d644d89eb4c0dcbdea93acaac366d35fc1356ccabf83473f4fef7924edb771e44c721103cec22d94a179f092d1bfd1c0a62130f076eb82a826d7cb
-
Filesize
1.8MB
MD57b63f25d7adb2452df1b911c188fa25e
SHA1122500f1c1a418353cf6f37c7bbfa0c83d012b1f
SHA2569bb5e9d62ed28b0e3f17bf911dd9c2e4c558dcca7a6a8aa0f6877143e07fa94b
SHA5124a5e737d1e01b9f08ad9796ce6dfc2921327157cbafaed8d3cab7a8a6523b64d169d6496d63c83cf67aeb864b8f31f41f7023b2f26653a6bd9f3c099efdc11a5
-
Filesize
482KB
MD5538777ddaa33641aa2c17b8f71eed307
SHA1ac7b5fdba952ce65b5a85578f2a81b37daed0948
SHA2569948b1c18d71a790e7b5a82d773fea95d25ab67109843a3f3888f3f0ac9d1135
SHA5127a5877e0eaef6424ea473a203184fedb902cd9d47df5d95d6f617ca4efa1162f0ffd418e9bc6b7492f938cb33fc6384907237487d6ad4f6d0d2d962402529d8b
-
Filesize
3.3MB
MD5d00b062395ebbcc4269c4e1fba474d11
SHA1a82654f4b8cb34856e30f10973a85b386b4c8d47
SHA256d4d63c2e0743c901ac579c5bcd7b438a3c02619aec1a148cd335b37bf9600c57
SHA512173271af48b4ddb89b7d11b989ae104b0e58070e96b7d5be447ff5597c3c2db8457f76a1a44680e8315cdedc3d747e3cab21b3e2cae17e61be48549c665fef4a
-
Filesize
13.1MB
MD5f0177701b36068c9a2bb4924dd409fa5
SHA171e4b32c95e20dd565a6603d3de3819eb4f19d33
SHA25693c1e08034b68e12d78005c2950145595327477c17c1f716248d3e16313b4eec
SHA5128e198bf60dbb95f38bf5eca67c9b7cd4fe9920890ba3d569e08de59b38c1b00830a0a37168fd74c874df86b7ff0915c8b69adb1591432b42b5ff35e5885e6641
-
Filesize
34KB
MD52e7543a4deec9620c101771ca9b45d85
SHA1fa33f3098c511a1192111f0b29a09064a7568029
SHA25632a4664e367a5c6bc7316d2213e60086d2813c21db3d407350e4aca61c1b16a1
SHA5128a69acae37d34930ed1b37a48012f4c1b214eacb18e46c7adc54aaa720b75c17ac0512206e7c7a72669c9f53e393b13ef9b7783f02482f19ea756c1022580f0d
-
Filesize
9.1MB
MD5d417682702b140d7131851bae877f046
SHA1aa78da727e8a62c839a9bb6f7a93b48d3a04be70
SHA2563b3657c83e4f588f0e759cd46e99309cece2ebb54af2c377f9dc087ec764fda8
SHA5129e107b7f61e42410807aa1e6761ac7adce412846f69ae8e2e21b147e39d1a95d41367e21624381750eb11c77322206c4d869a477e5442e8323405c85854c03cd
-
Filesize
1KB
MD5ecfedb1e6d5f1eb90f2089d0d94f51e9
SHA12b5ad1008ad48ca77fa84434b4b3628403e64e8e
SHA25694a731f217ec830355f7224ff3ff8035f245a03037b7cd7d55dcbd45f9003c50
SHA5124fd0f1e30e5a684df047cebc32269884ad6cc481aa806b6c33fcad43891d06f484f0253f76ee9aa4ef31aed04953cc428579a71169b6afd222da65057db5e35a
-
Filesize
1KB
MD5d171d4f8ac628749ee5a4c4ce94f680f
SHA1e4ea50e65ecec35583dcede344ce446fad124e62
SHA256aa8684e9793977a6e327ea2698c28e274935541bfb440ac926a2bfbd15ffbe7a
SHA51258305f58807a1a4f7d8d23da48c82657ced3a0dae72dd21246249090351629a7cff45d3b6e8b02cb55d3c53196dcdbedf5d9fd59218e272c2cc793ddd7e55512
-
Filesize
38.7MB
MD51ef598379ff589e452e9fc7f93563740
SHA182ad65425fa627176592ed5e55c0093e685bfeef
SHA256d4bdc230eaebefe5a9aa3d9127d12ac09d050bf51771f0c78a6a9d79a1f9dbf2
SHA512673f4b08fc25e09e582f5f7e01b2369e361f6a5b480f0aa2f1d5991f10076ba8a9d6b1f2227979b514acc458b4fdc254fc3c14173db7e38b50793174d4697f23
-
Filesize
171KB
MD50a39af4bf611f4e52cc958c6eab6189d
SHA1ed429760a8dd2d8fa5ffaf5c7ba4a6db4a64bef9
SHA256377e6d01d6c9ca9e7f70b5263786aaf27e192da1ef5493fe6abd5d53a80a2007
SHA5121b1af8282aaa74b3208fc9ebb07bc39ed1bb83edb84149927430dfa5b291898e651b1df7a48879f8ee578e2f7c695a63b10a5257c6dc14266e2754978317a0b5
-
Filesize
180KB
MD519cded104f3d562d9bd5ddaa52588518
SHA110c04f963840cdab5216673da8dda176e48ab03a
SHA2560f09cbe918baae104dc65fb7107639326b1c98541c29b925c82524e235639d5b
SHA5124cdfc7d46032078ab17c4a4ad30e5f7ed98d5446c39bcc2c972720d5bd8aaa50967272a54bda5c334cc17ec1ea7f1f9cba95e95adbeb998d14777f3a6c71ae21