Analysis
-
max time kernel
230s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 03:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1Zry70bwVx84a_nS9aYPJ6Otgueom0_KA?usp=drive_link
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1Zry70bwVx84a_nS9aYPJ6Otgueom0_KA?usp=drive_link
Malware Config
Signatures
-
Executes dropped EXE 24 IoCs
pid Process 4524 350 torrent.exe 1856 350 torrent.exe 4700 7za.exe 5060 7za.exe 3828 7za.exe 2184 7za.exe 1324 7za.exe 1148 7za.exe 1584 7za.exe 1468 7za.exe 3224 7za.exe 5092 7za.exe 476 7za.exe 2580 7za.exe 4892 7za.exe 1108 7za.exe 736 7za.exe 544 7za.exe 2344 7za.exe 4252 7za.exe 2512 7za.exe 4004 7za.exe 392 7za.exe 3980 7za.exe -
Loads dropped DLL 1 IoCs
pid Process 1340 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: MSIEXEC.EXE File opened (read-only) \??\W: MSIEXEC.EXE File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\B: MSIEXEC.EXE File opened (read-only) \??\M: MSIEXEC.EXE File opened (read-only) \??\O: MSIEXEC.EXE File opened (read-only) \??\R: MSIEXEC.EXE File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\T: MSIEXEC.EXE File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\V: MSIEXEC.EXE File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: MSIEXEC.EXE File opened (read-only) \??\E: MSIEXEC.EXE File opened (read-only) \??\S: MSIEXEC.EXE File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: MSIEXEC.EXE File opened (read-only) \??\N: MSIEXEC.EXE File opened (read-only) \??\X: MSIEXEC.EXE File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Z: MSIEXEC.EXE File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: MSIEXEC.EXE File opened (read-only) \??\J: MSIEXEC.EXE File opened (read-only) \??\L: MSIEXEC.EXE File opened (read-only) \??\Y: MSIEXEC.EXE File opened (read-only) \??\I: MSIEXEC.EXE File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: MSIEXEC.EXE File opened (read-only) \??\P: MSIEXEC.EXE File opened (read-only) \??\Q: MSIEXEC.EXE File opened (read-only) \??\G: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 drive.google.com 15 drive.google.com -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\Installer\{6CE7FA83-63AC-4C55-A397-7FC88B3DC2F2}\ARPPRODUCTICON.exe msiexec.exe File opened for modification C:\Windows\Installer\e59c7da.msi msiexec.exe File created C:\Windows\Installer\SourceHash{6CE7FA83-63AC-4C55-A397-7FC88B3DC2F2} msiexec.exe File created C:\Windows\Installer\{6CE7FA83-63AC-4C55-A397-7FC88B3DC2F2}\ARPPRODUCTICON.exe msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSICB46.tmp msiexec.exe File created C:\Windows\Installer\e59c7da.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSICAB9.tmp msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSIEXEC.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 350 torrent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 350 torrent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 553435.crdownload:SmartScreen msedge.exe File created C:\Users\Admin\AppData\Local\Temp\{36214920-148E-49C5-A6AF-811D1E9C9668}\350 torrent.exe\:SmartScreen:$DATA 350 torrent.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5032 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 832 msedge.exe 832 msedge.exe 3160 identity_helper.exe 3160 identity_helper.exe 3128 msedge.exe 3128 msedge.exe 424 msiexec.exe 424 msiexec.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2720 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 2720 MSIEXEC.EXE Token: SeSecurityPrivilege 424 msiexec.exe Token: SeCreateTokenPrivilege 2720 MSIEXEC.EXE Token: SeAssignPrimaryTokenPrivilege 2720 MSIEXEC.EXE Token: SeLockMemoryPrivilege 2720 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 2720 MSIEXEC.EXE Token: SeMachineAccountPrivilege 2720 MSIEXEC.EXE Token: SeTcbPrivilege 2720 MSIEXEC.EXE Token: SeSecurityPrivilege 2720 MSIEXEC.EXE Token: SeTakeOwnershipPrivilege 2720 MSIEXEC.EXE Token: SeLoadDriverPrivilege 2720 MSIEXEC.EXE Token: SeSystemProfilePrivilege 2720 MSIEXEC.EXE Token: SeSystemtimePrivilege 2720 MSIEXEC.EXE Token: SeProfSingleProcessPrivilege 2720 MSIEXEC.EXE Token: SeIncBasePriorityPrivilege 2720 MSIEXEC.EXE Token: SeCreatePagefilePrivilege 2720 MSIEXEC.EXE Token: SeCreatePermanentPrivilege 2720 MSIEXEC.EXE Token: SeBackupPrivilege 2720 MSIEXEC.EXE Token: SeRestorePrivilege 2720 MSIEXEC.EXE Token: SeShutdownPrivilege 2720 MSIEXEC.EXE Token: SeDebugPrivilege 2720 MSIEXEC.EXE Token: SeAuditPrivilege 2720 MSIEXEC.EXE Token: SeSystemEnvironmentPrivilege 2720 MSIEXEC.EXE Token: SeChangeNotifyPrivilege 2720 MSIEXEC.EXE Token: SeRemoteShutdownPrivilege 2720 MSIEXEC.EXE Token: SeUndockPrivilege 2720 MSIEXEC.EXE Token: SeSyncAgentPrivilege 2720 MSIEXEC.EXE Token: SeEnableDelegationPrivilege 2720 MSIEXEC.EXE Token: SeManageVolumePrivilege 2720 MSIEXEC.EXE Token: SeImpersonatePrivilege 2720 MSIEXEC.EXE Token: SeCreateGlobalPrivilege 2720 MSIEXEC.EXE Token: SeRestorePrivilege 424 msiexec.exe Token: SeTakeOwnershipPrivilege 424 msiexec.exe Token: SeRestorePrivilege 424 msiexec.exe Token: SeTakeOwnershipPrivilege 424 msiexec.exe Token: SeRestorePrivilege 424 msiexec.exe Token: SeTakeOwnershipPrivilege 424 msiexec.exe Token: SeRestorePrivilege 4700 7za.exe Token: 35 4700 7za.exe Token: SeSecurityPrivilege 4700 7za.exe Token: SeSecurityPrivilege 4700 7za.exe Token: SeRestorePrivilege 5060 7za.exe Token: 35 5060 7za.exe Token: SeSecurityPrivilege 5060 7za.exe Token: SeRestorePrivilege 3828 7za.exe Token: 35 3828 7za.exe Token: SeSecurityPrivilege 3828 7za.exe Token: SeRestorePrivilege 2184 7za.exe Token: 35 2184 7za.exe Token: SeSecurityPrivilege 2184 7za.exe Token: SeRestorePrivilege 1324 7za.exe Token: 35 1324 7za.exe Token: SeSecurityPrivilege 1324 7za.exe Token: SeRestorePrivilege 1148 7za.exe Token: 35 1148 7za.exe Token: SeSecurityPrivilege 1148 7za.exe Token: SeRestorePrivilege 1584 7za.exe Token: 35 1584 7za.exe Token: SeSecurityPrivilege 1584 7za.exe Token: SeRestorePrivilege 1468 7za.exe Token: 35 1468 7za.exe Token: SeSecurityPrivilege 1468 7za.exe Token: SeRestorePrivilege 3224 7za.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
pid Process 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 2720 MSIEXEC.EXE 2720 MSIEXEC.EXE -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 832 wrote to memory of 4028 832 msedge.exe 83 PID 832 wrote to memory of 4028 832 msedge.exe 83 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 4992 832 msedge.exe 84 PID 832 wrote to memory of 3996 832 msedge.exe 85 PID 832 wrote to memory of 3996 832 msedge.exe 85 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86 PID 832 wrote to memory of 3828 832 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/drive/folders/1Zry70bwVx84a_nS9aYPJ6Otgueom0_KA?usp=drive_link1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffcf63346f8,0x7ffcf6334708,0x7ffcf63347182⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1932 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2264 /prefetch:82⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5928 /prefetch:82⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,9334631455316054138,5998380415283732541,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Users\Admin\Downloads\350 torrent.exe"C:\Users\Admin\Downloads\350 torrent.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\{36214920-148E-49C5-A6AF-811D1E9C9668}\350 torrent.exe"C:\Users\Admin\AppData\Local\Temp\{36214920-148E-49C5-A6AF-811D1E9C9668}\350 torrent.exe" /q"C:\Users\Admin\Downloads\350 torrent.exe" /tempdisk1folder"C:\Users\Admin\AppData\Local\Temp\{36214920-148E-49C5-A6AF-811D1E9C9668}" /IS_temp3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\MSIEXEC.EXE"C:\Windows\system32\MSIEXEC.EXE" /i "C:\Users\Admin\AppData\Local\Downloaded Installations\{A5FABCAE-75FF-4E57-9DE7-0D19A518558C}\data.msi" SETUPEXEDIR="C:\Users\Admin\Downloads" SETUPEXENAME="350 torrent.exe"4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2720
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\system32\explorer.exe4⤵PID:1016
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3292
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4596
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:424 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1211B658469B56970018F5E457312E2A2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\7za.exe"C:\Users\Admin\AppData\Local\Temp\7za.exe" x "C:\Users\Admin\AppData\Local\Temp\\data.7z" -o"C:\users\admin\desktop\railworks\" -aoa2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\users\admin\desktop\railworks\Assets\InstallMe.bat2⤵PID:2764
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 DMOS.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\CT-SL_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 TCO.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\CT-SL_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 TSO.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\CT-SL_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 DMOS.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 TCO.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 TSO.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 DMOS.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 TCO.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 TSO.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5092
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 DMOS.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\LM_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:476
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 TCO.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\LM_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 TSO.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\LM_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4892
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 DMOS.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\LNWR_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1108
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 TCO.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\LNWR_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:736
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 TSO.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\LNWR_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:544
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 DMOS.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\LNWR2_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 TCO.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\LNWR2_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4252
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 TSO.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\LNWR2_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2512
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 DMOS.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\TPE_AP\Engine" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4004
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 TCO.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\TPE_AP\EngineTS" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:392
-
-
C:\users\admin\desktop\railworks\Assets\7za.exe7za.exe e "C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\PortsmouthDirectAssets.ap" "RailVehicles\Electric\Class450\Default\Engine\Class450 TSO.GeoPcDx" -o"C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\TPE_AP\EngineTS" -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3980
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:644
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\railworks\Assets\InstallMe.bat1⤵
- Opens file in notepad (likely ransom note)
PID:5032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57b4c47b93abb6dc9428c3a72cc39ab15
SHA1539a5a3fda7989cf476a2be2a2e7482dc27ab807
SHA256a5e3ea73f1027408bc3b938fe6acb36d09d3108aeb39a978d20a196fad574c8a
SHA512b151dfcae4b75b03827d4bd29860c2e93a95af72102a8e213232e4d50f03e656d235acd3af3c5cb2e982083e1267ea4451304bafb38e4eeccebeb0224310b790
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
25KB
MD5ab77c85aab42e61d0557bfe285bcafc0
SHA1ac4241859bef658513fee5ae997b08543b8029e8
SHA25632a74d447d992c99982a6c6979935c3eeffc358bcbcf7b1843ccb8021523f398
SHA51241aaeb6c514f1ec1e97e213739ee2f4cd731cfa17fc1bd2c0c2d6197eaa487ed4b57c8d359ddaabc8764db4e12d3000eb2e23f884aa5dad0962ee9e0ae1d02b2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD562861a7f649ed997b3f87896d9e0c69d
SHA1f0f414dab59a63b0c2b4d7c6e86712a2187ded2d
SHA25683a0a148742ebad377450efdeea22f5601891c24f3ad54d69e68a1c5730111a1
SHA512f68b31b71368bf6fba91a8052993a921631c7ecd251d1857b78fa25ef066d31b2dedae7f653c0291c313b8ad288733e4461ea4374cb0e91c8e429e7ef271ed33
-
Filesize
4KB
MD569371cb516895d767b315e77d1fb8212
SHA10dd35131f44cf71e381c07e9e9aac778f8c49446
SHA2565d8f579fa8b9c961fdb1464c3ec0da3ad783fb5f98fa894f057765f04c293c74
SHA512099ad77bdcd0a9033ead9c246f9c1de145a12dd95a128b25cbdda328515f06c92457193aeec9a0e46bed0d1430427dad0ad5305998e709975ead133dea870cc3
-
Filesize
4KB
MD5050c315d672722d840e9b34615460c55
SHA1bb2cc66d51a973332179153fef90ad687df26fa5
SHA25644cf50b696983683a8f0934deb70b39d23417b7c166ea2437c77c9614186f34c
SHA512cacae19d141d3f30ba1b7a231910482296441ca0e61eed23ae17f947007979ca32de6f92281dbe77dc75f76dc3a525f514291134fc256843e0525c1311190b50
-
Filesize
7KB
MD54457be6a84ca17695918c3969dd0cb24
SHA15b4c15905fa5ea83e039c857b4d79dcbd8135e1a
SHA25618d40c991330ebc1208a571e479abf12289c0bb87b389572790b51b6e6f4e938
SHA512e8e6ec08e58574513c0f15f9a629f054ca0ce8fa3e097927841afd200d5e7af114ff8a4b1dc94de036514a5fb381c77de856e5b81761d80d54169950efcfbc08
-
Filesize
6KB
MD55fcf570b8a64ac2d3eb22e09ccd278e1
SHA10c136174cceccf16911a0a53a492b4223d231ea6
SHA256ca0eedf4e030e45f2a99d4c1c01b38dc4025b913149f5d90246a51217feb68d5
SHA512529045038250a77619587f4ce793ffda333734cbbbeae92d1e8bdf2cf744838e8392a259173a2eee7a04bb130596e52b7745e984914df90d7659dceab46aa98d
-
Filesize
5KB
MD57dc45de0736aea1ed889a0f536324bb2
SHA1187ac26a586348c3a9b64cd48c267e36f61235ad
SHA25626fde42d253632d4315761e0aa3a5f2bb8eebedc9bebe99a3aaf1dca42e542a8
SHA512520f6b7d30dac26f53a3ed1123df0e7bc31d0174dae1514da68a8f8fba8a8a1dd2f365c56f8a450e3602f2edd2845b8a4782d1877de7d08d0984eb802b807cd0
-
Filesize
6KB
MD51b0ef732c4a5ebeb091842b82b49e4d7
SHA174a5fb7ea15090b734f10a9ce531058a96a9d08c
SHA256a91049bdd23fc03028a5d58100df7ed63eca0a2f5c3aa4481148f4f3bd399563
SHA5125bae581daa19d171bebd3fb03288b31dc169d2a9e01ed367b836611f2e11e08114e09cf1e53f24b88f6e446db0a06d218d6aeec14699023ab9d832d0319c5cb5
-
Filesize
1KB
MD5201dead42a1efab60c8be33c8b94e10d
SHA1d3bb4b1f16c8342f440faf39d1ccb8ad90b8a0e5
SHA2568749c54f69e51f3ce8895a56dc4a2db047f300d1e014a599a079df01b7c0585f
SHA512ba91b9b7146a6c69e703e61d1861409e177583214ca1506386ce9931baf8a58a76ed82bfb751305f3cf28c5512a23aa53ed97a1fa899bb0061ee06b1efae2778
-
Filesize
1KB
MD5c9bc23cacbdd72fd90ef384b189cc4b2
SHA1a53075457c0e0e3b7b22bd11d1dc969f6708d51c
SHA25693b71af5cffe5fb5e2aa86cd36625c3895b603c26e5fda47675736e9c7f1c73e
SHA5128a5ccf90e3eae46357a69245e84cb80b8795a9292a556710e0588ed4fc0c1b15542d75bdd71db4f49ab59f7ecc32b6300a67ba8c8af6b5b97f034a29371cb957
-
Filesize
1KB
MD5dce123ac700c3e8658a37aabe809b4e8
SHA1c8d340f6d57b407e1d2f379928e4d3a1a0138adf
SHA256e5a4779ae3680d6fc34c3afdf59e97d1c425a19db46c35a2630b76707ead3692
SHA512bac67d06aa9321f3800ae9d84d1c72239be293225e6d14c352f43250a43bfeca768bac3597f1b6705ef84413011c7f847414ef938ee8cc48a835be3ec5b926ee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5636582eab1c3f61aec3858062d13bac8
SHA16e03cc0e6222785aa78b648a6741e5724ca45e34
SHA25645ea9d4301cb06162d9345d6a9b3c0de31c1f22f29a4299ff6dc0e6918836051
SHA512513da49532b93b9ce2b822daf3b81f7fd691205d3516abeeba3da155438996216a053f30d697896a76f2901ca661905cc630fc78aa77bf68a029ea2100a15f1c
-
Filesize
10KB
MD5b676beb19b2d8c2b966ff7157d518b78
SHA1c385245af90085fd3f8b44808458b5c4d11d9511
SHA2569a73a95c71f12848139d662b41321a3eff0104d89586497c46503479c31eebe3
SHA512bf963d126c4c642d144162b7ce4a5a0fea0d496e881963d80bd3b1deecde0657d6f3c65575c31a1f610511ad3e4ca5cddb6ad1e64051f2d8d0ef4cb1d5d411db
-
Filesize
11KB
MD5ea95094e86344febda6ec2601a4397ae
SHA17ec2d6f19c8bb79578e0009cca35df6566c2f84d
SHA256eb46045919cd7a3a079db86cd919abb38532c1f5f21e608957e7c8d098b0903d
SHA512f45a367b0799dabc641cd52891a6a2ad4865e1482b45c80ba7574145dd39afdd0c08018af498beef2788c36ba7b85a8c234113f8f2209061682bcc46bcd6b37b
-
Filesize
721KB
MD52395868a72bfe1fd5e888b679faab621
SHA17ab01a1e3b0ae8a0e59ff586a6777b78dbe67750
SHA2568e679f87ba503f3dfad96266ca79de7bfe3092dc6a58c0fe0438f7d4b19f0bbd
SHA512369b487da9dae83cdaf98ee45c056fc847a5f50585979638d9d8e8ba8511a31267307d885fd40399bf4c22461f82c60f6298bd7e31402e12bfebd0621b131222
-
Filesize
21KB
MD5a108f0030a2cda00405281014f897241
SHA1d112325fa45664272b08ef5e8ff8c85382ebb991
SHA2568b76df0ffc9a226b532b60936765b852b89780c6e475c152f7c320e085e43948
SHA512d83894b039316c38915a789920758664257680dcb549a9b740cf5361addbee4d4a96a3ff2999b5d8acfb1d9336da055ec20012d29a9f83ee5459f103fbeec298
-
Filesize
5KB
MD5319bbf38c7c153dcd057634ee2ff5ab0
SHA10657b86d69ff08f422dc1978c9b38f3e8c4723fa
SHA25614af4c82eb8602e88583e883ddb8bd40a503e662a0f7e29faf7117a2df6de1c0
SHA5124cfb42f08fc9e813d9ef5a768e6560257b528585bd11d957b6c6401dcaabfa774e218dcbde5c8874dbbef168743a7b08d4b48ca99690caf94325df2c28e7d558
-
Filesize
616B
MD5f39fd11b6a52eed7e3093fbc62fe5be3
SHA13dd193832b3142eeefb1f264ff272783718fa875
SHA25678be48929e16e490c42f67a43aa2a69626b0ae2b4322f3dd55e03aa18db184c8
SHA5129caa6960b9fe7f4c6d437c1699a7611e3bbd1fde21efc63f5b29f9c88ad55365c3619dcea8d3078ec410b8985388901ca844555cd720daf7c9256169dbd3d38b
-
Filesize
20B
MD5db9af7503f195df96593ac42d5519075
SHA11b487531bad10f77750b8a50aca48593379e5f56
SHA2560a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13
SHA5126839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b
-
Filesize
660KB
MD55e0cfb5f9d4cc24c92c7ebb184d6c9b1
SHA13c65a4d8897193cade0e9b67db9b8606bec913d7
SHA25659df28612ee340037001acf8ec39a624581f37a01c4f231a62b99873d4793482
SHA5124058b6d970bcd953b56fa53a847e7343203f7dcff9004857531a1a4b6b7beae96bffed0e3e1eac778e0565775fd8e5224e39a6898539685cd005831d50ac0228
-
Filesize
1KB
MD50a1e0c0966026df188d6d91062203b86
SHA1bda3668fd0e99900b73f70ad05819875fa364d96
SHA256d886960e83e89dcf0f88dd0d50e2ccec15be7163b779301c4f648b26922308b4
SHA512ed1a8aad83ee48955ea2cd66d204e2f87feb2ca980410335f878f98138d3840bb97ce49ab4b9b6e7835f6bc5cd842fc82b28e3d44f644a0b6e23fd02d685e3cc
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\CT-SL_AP\LocoInformation\pl\Description.html
Filesize397B
MD5b0be4fe10fce93d2bfc9e2ee09a18a83
SHA1ad1cc24fe84287d253cc3de40bbc9c279110c197
SHA256e1e56455147b18193a725cabdeb1f684a9f4c959436d7ba1a7762e7f34d5aa60
SHA5125c0b2d209532d6c91ceb781d83a5dddace7f6e69d89e5b6b3e867c0031c7ea162a2fbdb52c5ccf75426b323bd39ad024e2821cc6324501efbf9565584808f3f7
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\Numbers\Class450 Digits.bin
Filesize1KB
MD56a198bff8642f50370a62988fc8598b9
SHA1f79718e75148842dd91f5a717b18c37b7193d564
SHA2568fe6f9622d826b2695786173f8dbd208ff0cb6121d17bde636f7c5070729cdcc
SHA51210926885e497fed4660931df7fa6203abbe89197172c4bcb13cff6288b1fa183b8ecc515526151c0f70a1e143a025642470b14e187c4647de3bf31358ccbfc1f
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\Numbers\primarynumber_0.TgPcDx
Filesize32KB
MD5a91c1d2ec2bcaf8d394bdbfc0279ac3c
SHA1994da4ffba979752398754088523a0cc9fe2ef2b
SHA256efbdc837c174c6fa97d90a7c906a4383995c1c62154d4b9d25b3512e00845eeb
SHA512b1cd921a1bb14b3ddb3d8352e8f8e19fb9234708697d222400b4905ec273c1b5f9588cd41c664d5f20cc9789139cd18a370cd5c729200506001c9e4bfdb68240
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\Numbers\primarynumber_1.TgPcDx
Filesize32KB
MD5db2f3e40c25dfa6303267cc6fdf852c2
SHA12d93a721056e04678a2a1e107c35e3fad35b450b
SHA256e268379f74020d6348c8c306bfabad81647076109aa33bc734cad3d57a60765a
SHA512568c42b4d15c44ecbd77250034c2d46641d69f57aedb967cc4f718b8d4793e08733ba3f78b8868cad8afe45544dc22503b0c9c08540b99f34236f30601d81e6c
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\Numbers\primarynumber_10.TgPcDx
Filesize32KB
MD5f978bb2ac11d686b3ee75705a054e838
SHA1ac9a5955d46c62daf5877fd69770b9ac43414f4f
SHA25641387cba5b6cfcd87a510a0b5b6efea27dfa031d8d4601936fe19924a5f615ff
SHA51290d325fde8c6574657fcf2673c61c32343da8a680fad0f7366972480b04c258976e42feab65393202f32bbd6c9e93b22ba2b49d680e9a39d655392099a9097c2
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\Numbers\primarynumber_11.TgPcDx
Filesize32KB
MD530725a9906ad7c198960bd5217d8b2a4
SHA1a52da85056f16a5950f11eb89a9950ec4b53096d
SHA2569dd004e6b8c9e3e70eaa1d6611e952ac938e56417a1b591a3869ef2da7cbb18d
SHA5125a38f6989e7d8c3de1714fd082e96e54b8dbfcfc9a1bf5b2289470ad40a4d13e148171575d93a42b54ef72bca66612265e4b9ed66a176061b927b7090bc1756a
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\Numbers\primarynumber_12.TgPcDx
Filesize32KB
MD56b5e32f4354bbf0a8851670851cca99e
SHA1402658d00ac51f4a37beee72dec0226ac3c5b8cd
SHA256202860a2dd6a5910c30758ec1cf180b7df6e07096a7c54d8e2a2538c4c9e12ff
SHA5121a9627a559ec16ee0d64173e09208b9e0abca22f4aafe3dc75ba221c976ec2e5b95c94da09fc0c79f4ce315f32f634b7b8904fa1a60862d742c1ba79485d0786
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\Numbers\primarynumber_2.TgPcDx
Filesize32KB
MD590dfd6d1043815dd854ccd2bcac77830
SHA1ed147f6eea5361be7d3790f1e9c4b971ea3c9e7f
SHA2567621a3329a6a50ffbdc06fba1b1b10c1eb1a60d3b2e7ce0d9fe599aab3db7b5b
SHA512f0cfc6301696c4040dc99c68a736a1e504649b20d99bb368afb44f76e215528685641494175dda959a381865243b931a8abcfff0d84ca824fde83b25bc1b306a
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\Numbers\primarynumber_3.TgPcDx
Filesize32KB
MD5211c902efc753940de992e47b9cd9cc9
SHA1a8e0dc4bd1a8dce09dd8b56b929262e50eee0235
SHA25677173e0842355d64734ea4337bacaa86716cd2d46ca431c589aa26857e01a9c9
SHA512f77a6ac54a240adfcba764672ef5fb1240c73d5e46cfc8e89035c0e65d075417e453c3db6a6d8783062e26e501e0e3fc515bbf4def2e33d80b1e2eabd0b49177
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\Numbers\primarynumber_4.TgPcDx
Filesize32KB
MD5c88688901cc7f589349712ffad184736
SHA18b318ce9ec1135fde2527b8837ea960754f5bdca
SHA256bd6902e08d0da5ae03cdaa6e5fcef9dd92eb2d029e5850a3e8a8d23cb3c675b6
SHA5128c3a2b1bd3818d60d34d400fb76dbaad44e9249b73b1f9b26c139cc9f4d5c9cf6c270e41f31aa11f63d081453bf6e2487c04d806644592547c4e8da3090f0373
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\Numbers\primarynumber_5.TgPcDx
Filesize32KB
MD56f64b0f39ce9c16fafd72403e146d3a6
SHA1b9dffec87e2105565095f228ebe62b498b3c32ba
SHA2562c6b99ea4cd73cfc52b7f0b87e099b20ae8dbc580accad6b00c1bb295c8773cd
SHA512572084654cd5ae366742cb4adc79f2936f4239faf24cfb6b76579559aefae012184fe4013cb2375c197d753ec993ebc1fea4e350c645ce8f50827d38a9476db0
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\Numbers\primarynumber_6.TgPcDx
Filesize32KB
MD509ea7b71803df6e152ba704a16da8d37
SHA17296981dd19f20f897d65651ba0f3686fa2bed7f
SHA25675937d280832db9093cba5566d40dbfb501436229589ac0241162aa46d310067
SHA51284f951f050dcd145c6c0d64b2cb4cc2b306150c453e08f2fe739b0eead2e7520674e3e0ce1ab8fd935a1eeb90a9c070929813268035d58c0f980f20cbfa088d3
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\Numbers\primarynumber_7.TgPcDx
Filesize32KB
MD5af73b7842296c37b1273aa1e7437463e
SHA1e3e0961a25250c65361b83d9262bab4e4b729fec
SHA256d1d38da264b1b3957fe60607995861e3f9e42c893e6e1c8ec0ea2a3e2f387106
SHA5123fba2e3727bb5ba83b4b80d3a7c55658a9accd8bfaa3b1fedc97ac8ff472a3a36f83272d5eb77d9fc9dece8f83b699a45d7cd951d266ca53448b6c878e037b6a
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\Numbers\primarynumber_8.TgPcDx
Filesize32KB
MD58b3e231a5074c0def08aaf57271344b5
SHA1509fce6a487c1c3acd4e352a46577628a1efb33b
SHA256fd3e262ce44bb57fa62e19fb9bab0b9d9dcf97e904d288694b41874dbb025c92
SHA51215208710f8935f7840e6fcfeb2ae983389b93e890080772ac134a04f6f7fd08ccf60d72bd256d3b035a7cea4ea97c20741dbcedaea914547167c9912ba3ce86e
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\Numbers\primarynumber_9.TgPcDx
Filesize32KB
MD5b57ce850ead776e4fbcfa4374c0d9592
SHA1ffa119c4998e4ada26f1040492f5ea324c0b736d
SHA25696cc6fee66c850c746bfce1598a18c9663b00f2bc263efc3587809da0e693405
SHA5123a1ae152630b464c9c8f769320eb1693f59156b2bb2816555f41ff538aef65c614985846edc02ce083230c2ab095058fe0ce57c10a7ed73a9ad8c8dbd2243126
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\bogie.TgPcDx
Filesize1.0MB
MD5b46b0db42a2bfa519b4d20af797e3fbd
SHA18be4ab437ae2408929868627f857bab09aba5fbc
SHA256c4c8037e026f8e3ee01e52811b3a97379aa3ff7dce721c510df56aaf2f147fc0
SHA51219e5d0af80c60f8b68d22f30b7207ec232799d85da67079f3c649913bdad886f9189e401f729e0d67967b84e20d8cc244d21acc5b72b79aef024a5bb85bda7a5
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\bogie_noshoe.TgPcDx
Filesize1.0MB
MD5d2b51e99eccbc1346c6878cef756bd6d
SHA15eb84d5112d7b914643ca6935de6c180668f06b2
SHA256ef4fe338913241fd7349c77077ff81b946d718c87c897e4f17fefed616bb63cc
SHA512cdb22cb4ebbf6e3a0fa277a8fd982dbdf9f1438be5f68bda578dd31208eb206f6a863a8264930a391ebc6d3bd3dffb0ad465d5b5c9b5de705827fd9581255f16
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\mks_bump_nocomp.TgPcDx
Filesize1.0MB
MD5eb74bd74fdfbe9e55dd08babd8481059
SHA138c64aa9290de24acfa84793c76ce72fbff17d38
SHA2563eff66ba66c92b644d0b8e1a50e85f3568cb7cdbb69955dabc5e9337e5784f0a
SHA51275d26e06273dd08e375a2c0d99afb67e6e82b7311e8eb9a5cdd315cdb46cc8ac1b815d46f661753cc5fc16a896c8c5331b53f7512235d880908d30903b17a7b7
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\softshade_long.TgPcDx
Filesize5KB
MD57755fae5d92dde3e1383d5482abfe34d
SHA13ff2faa5820e16c1cbe1790ca4f7a6501087cbd3
SHA2569f30f242f663ef44e60f955ef4d8d321d502e4276d30297f3f01277389bea397
SHA5125b425a35f456a334c8e343caf8d5436acb39a52b34fd105c48c3bc9307a4632be1055aba74c23dea603f0e64fbe46fd2cb77ee6e9485f4da884e98ef9352389e
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\swt_logo.TgPcDx
Filesize128KB
MD50713e6e57575087ba93e2432c3446098
SHA1ba6f18d3f3af415d0ad63cc1e19f20a308c73235
SHA256ec71d58effa0152f7218857b6e457968fe9491aa658fa6cb8ca7690909518f72
SHA512fdb8edd8fd61e5aed43a6f0e3dff3ab583f851235b048a5e15467849ab488827d7861e1fc81165ae6c291a45492b45e3dae6d6dd76fba74ba198df87c94ade3e
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\underframe.TgPcDx
Filesize1.0MB
MD5e5c0598721ca76e2969dbb0214ff7204
SHA1df3f1fb0cf4f12a29087bf46b68646576e86f21e
SHA256fedbf5b97c2a5bf0e3c6ead77087ca9dd9a233da26215dc4dd751bd630a625a3
SHA51211efe772c8cccac214578a4e070026b099784841d5f251a067f691557fcf86fa729bd20544b0e34434bb9c0922b25be7ca0e06a5eb0b0356510d525679814d9d
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\underframe_tso.TgPcDx
Filesize1.0MB
MD5719819e438c71b743fed543162d37776
SHA17fc4c453f336bac5f94f50c9ea15d67140d03586
SHA2565695f956733d85ce1da3a9911545596c8e6fd8c0448b7b98269c250ce20ea8fe
SHA5122c4bbfffc1fd7f8ddc3894fbd097469dc542ad28c533f0c87d7ee0d6287b9bf4f7ffa0b1e74eaaeb56d6562236da57528281323bd82768817c30725e35f77490
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\wheel.TgPcDx
Filesize64KB
MD54635211ed49c44c980439bdd38f6423a
SHA13b12aefcac21789f889857bc09549e1580a907c6
SHA2563b42020d8536d98ada8df8b90ecab748054629ce3e604ff00850ccfbdb4df98d
SHA51200a06db3d4ea5673cdefaf2485c84f434226d37c09131f1de28085499ec6aaad44ef4c191607791fd6e240e31ceb93721e9ef534c97c03822d6584b58c7fc7db
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\EngineTS\TexturesSWT\wiper.TgPcDx
Filesize1.0MB
MD59f37d19f492ffccb281c40b3129bf6dc
SHA19bfe97513c56e823be16ab41b9acf81f7278c0c7
SHA2561d368c09af60c8a1b77837e9e57a1ff271db9a295155eabbeae0dccfff64c63b
SHA5122cefada3295750291270a9a5a9163822f9d61db9fc008288f18c5355e20b5ede8e6f3a5e27f3ab31e4ea4afd9ca658dec176863b4e7a419efdfea07bebaab41b
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_AP\Engine\TexturesSWT\Destinations\450_Destinations_4.TgPcDx
Filesize1KB
MD565370e2cfe0dc227170d6e7072f2a914
SHA1f9f98a37247b03eff35a7ea3c5aada326b13eb8a
SHA256e10afcca2d82c180e63111c0d5e79889bd3d26e38c2eccec27b3c4e2b4747621
SHA512dbd7a1bb5be326be5cfeeb7d1e94c681f1eeb32249b0ca73eb33526cbe6eefa88d6fa309498a7ceb0af95360508cdfe27c9cbba6db8016df9052ceadfbd1ea1d
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\CabView\TexturesSWT\Controls_low.TgPcDx
Filesize64KB
MD5c2d0440561e65bcdc2bf9f663513fbc0
SHA13a411c298f277700d714d9728dacad82723e3cc2
SHA25641432f33e138e2fe0098d6222baabbac313a304dd867d4b066b66cc38ae9c3e4
SHA512d57148a865a5ce97dac2090e33279ac854ad2bfe9990584f92605bd17dfa0df0f4d3d2f4a3bab67ed06f03625678b0412cbc18d78bd2ac47e5de4a7d37408fa6
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\CabView\TexturesSWT\Decals_low.TgPcDx
Filesize64KB
MD5f6faf538b966380c6b5ba159947378df
SHA1bdf89156ff045027bea4bb926d44963f659f7b7a
SHA256ce0cad4361fd04dc5328c4d3f0550dc00684c49a8ab285ff14a745eb69537fcc
SHA512dadbdd9581e35bd160d3fcd042e0f67d0deba19b07a4f2e9ca8e9b97b9a867da0b98661156156bad688c4d352d250e94ca34274a664f8f0571a211ab8b502361
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\CabView\TexturesSWT\DeskMain_low.TgPcDx
Filesize64KB
MD5550b4ef6bdac40f47feb00f674e8e23d
SHA1b3c2dd344f537679f6cabfebe007f5070e79f236
SHA2560b46b4a3b7f9f958afc73a5e1ef77f691b89409425826dc0c928d282c0f51f22
SHA512acb2c51e875c63c397aef43082cfc293c1d2a57bf403ee13bddb992a4aa7d77d1b2957061f1cb03fd6a23c6d8449fa3edbb2666b9150a5c5febd0408b397a83f
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\CabView\TexturesSWT\DoorsWalls_low.TgPcDx
Filesize64KB
MD56ac3cff80051bfa2c9ddb43abf35fd29
SHA143a83f44049d4ad0b344a587b33d5146f26f6fac
SHA256365e039c62773d16c4b5dac8ef6ea9e29e185b5eb0a2aea53335920a37a4dba5
SHA512e4644da7bfcb0ff0c3f97971b263513e9bb75024c0a1eb60290abbbbdf99fa3c2900fa84f79003519a34b779694e522eb90d62227118677b7f9c0b683c2e56d3
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\CabView\TexturesSWT\FrontSecondmans_low.TgPcDx
Filesize64KB
MD5cb3ead64b6ea319b8b7d029128fa51a5
SHA10acd0b5a381dff5dba373611aeac172af6db247e
SHA256ef478f538b7c016c77b440eee2f8a22c1243e413619de8a93ff424180e0b5b88
SHA512ae437cc2339b5ff7d426db59878faa556c15b5e7562478c0d7c04331084fb92336776833586ea6189bc44344c94bd8dd9580de682346239c190c97725db87fd4
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\CabView\TexturesSWT\GSMR_low.TgPcDx
Filesize64KB
MD5326e1e0c66d01a992a7fcd22ef27e865
SHA11807fb3411ef2162ae667a551ca9806898ec9661
SHA256f6c73c561b36bce1832c91467636b496ef02a1f553118a16cd22b480894ad652
SHA512cac8e9b502ab1d5123073a084bc45ce1e50e85f6dca913d887aac7cfb3eac4854832af3a595f49b3239cd2051f8b362c759e64a8d166385bbb5d04242186f736
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\CabView\TexturesSWT\Gauges_low.TgPcDx
Filesize16KB
MD51270e621ad5bc7657a36d016246fbf27
SHA15ff8637922071e5f264a41e40d39b2ce5fe02ba7
SHA256d490ea9c5bab555d258bd6ddddbd81e8601728239d81d5cd598e711616819b52
SHA51265e9b46a286cba1746c3456ccdf4d9ffc41cfa282a6122988fbeb89247f2fa62dcc2ca5816a5986fe7077de5ec6f9521fc34470c0778250e8327350bc8070400
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\CabView\TexturesSWT\Phones_low.TgPcDx
Filesize64KB
MD5e1906e8d4b7d69e609ad0ff2e8d82e3e
SHA16f28422b4bd21985f46a2074fc3172acf7895090
SHA25633dadee49376814d2daaad817f35dba4fb50d090e1109d6528ea5ab5f7669124
SHA512aef5d9410d2f23bdb8664d17837d59eebf4d32855c3aa300ebe17f528c046dc98a2e090e9c9cde488d4179a4420dafdccb4e23b60e25e4d258cf5ce839ef25b6
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\CabView\TexturesSWT\SeatMiddle_low.TgPcDx
Filesize64KB
MD53126467ef90f04e06356dc8cc887ada1
SHA1c6f61b3c89de5076f361c4e5994de2a61bd65445
SHA256ab67abf6e25b4af04754bf23fc3161e2e7f26f3b208870be34cb45162849e37d
SHA512f92f5b78b40d2ef3b50cb1caa1ebfcd877a6cbf813e3f260777abddcc9273e6c324c7a13e7e04c85d9d7092a6641929c984746f039a404edfb109e8d7c104bc3
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\CabView\TexturesSWT\SideRears_low.TgPcDx
Filesize64KB
MD5d3289863b3ee7dd41a43c5e52f67d226
SHA12365ffe563f0bd52224d5fb06bca5297f2c82c76
SHA256448eb5c449b74eadc49d9b15535fac53fa27c27666293d4717b319c0429161af
SHA512587f2a3be0499963ca34b3dccdbca0ea0c885837225e135e631471b473dde455bd0502b1a56ba321ccc4485f0e2f8253f09641613a1d0ef59775ff66eb151245
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\Engine\TexturesSWT\Destinations\450_Destinations_6.TgPcDx
Filesize1KB
MD54cdd195f24e9c0c5ecb860a4c16a1ffc
SHA1fc80c247b3b9f1b523f55d43283dd383d4f6480d
SHA25624335c49d981dd97a7142298dfdb81f676d180d15b93210a0bc4041502c5e1e7
SHA51257e1211750ca1df5c3c0d0601cab2bf760d0ae9287edd4f543b55470fa2537ecce4c82d25f5f8da72b7d36a49e89e138be18cead4815bf3a6fa0fafa44d9dc4a
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\Engine\TexturesSWT\Destinations\450_Destinations_7.TgPcDx
Filesize1KB
MD5749ec7e7960db939812fe478568bf2e2
SHA198c3e78e829328679b698f63c4278eb06105bfb5
SHA256800c26ebe7762c5a7689bb77276d1a9edbd048304ae779496efc4adef90b16a9
SHA512b55ddffbe487f7e0d824a8f6d6be0b1bf1002d4fb424b00dfc91f8f58be651194d8821aba0c4b10aaa8c647821d4ec0535f83beb02727fda4856bcfeb4477597
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\LocoInformation\En\Description.html
Filesize1KB
MD50c27c582a535a8aa77565b056f09ffdd
SHA10e116d4b8acb9d828d468703f03ab689a1bbc334
SHA2562eaf099236f415740e8e4482c48998de35810fec49b53055af8ed25f6b9236ba
SHA5123be4c129cf08782f8b5fd24da28f4b754f9eb0e9afaf6a0ae93293822df13ce5903dac86ebf6ca83fa2ce328f97165fc49dc3892199e78bb1fa762e42977b254
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\LocoInformation\de\Description.html
Filesize1KB
MD56e18a068f297c8f3a93228875f116c20
SHA11329cbbf60a7b3259ca68460377f321047fb0392
SHA25607fea71542ed1c5d602cf27c64fd695b5ae63d4aa64c9efe12ce1c4741beb14b
SHA512db92b8e655a042756f18fb6ca7180102b44e6a90833dbf4535eafb25f42c1d9c4e683b6b3044a9e3758e6d79451d0f358c81ca0db47ca9f1be30c05b6caf1151
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\FTPE_Grey_AP\LocoInformation\fr\Description.html
Filesize1KB
MD5872e4c4f32bfdf754c2524a182e6d7a9
SHA1381dc97829b37ef18b9b4f5523ed5a7c27d54032
SHA256cbdd7e5be18e95921141a32315970da76431f4b004090b8df4db19a66c1cbe25
SHA5126677314da46bdefa62597128b9cad42ab835cab6699f1a832052903a382cc18604df9e244f7eedb3f4708c6f4c4a40de55e97b00e64b265294d47d3cac2d9996
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\LNWR2_AP\Engine\TexturesSWT\Destinations\450_Destinations_1.TgPcDx
Filesize512KB
MD5f7904f36c295a3de86b193246ef9721f
SHA12dad21f0f3e72b93aad5678604bbd192b8d1b13f
SHA256ab2e9723851e11c816eb5f3797d28314568496e50f152be810de6fddd7427484
SHA51288468ccdbc2c60d0cccb34941a8b8a94e68c5f44ab96ee313019a7bef5464658661688be44f41b0f8762cc353ce16eecd48eb58e8965dd7b7dc58fc59cba4bdd
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\LNWR2_AP\Engine\TexturesSWT\Destinations\450_Destinations_2.TgPcDx
Filesize512KB
MD546bf4fafb4dce7a7248528088b7aa5f0
SHA12a09fe81f0b0aa8b6db2ff92bab524286b1d08cc
SHA256806752ae3b282ecf3daf31979f8673a4067256484058ef04259c3c324007963e
SHA5126a610d8c1fdb55a988eaa9b4e646ae47146876c95f445771c026f46abba65574d74a4ac723ed503a77e70e730a9eb2412d93cb0a7d569e53f26b49caa3a1a8be
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\LNWR2_AP\Engine\TexturesSWT\Destinations\450_Destinations_3.TgPcDx
Filesize512KB
MD5f8c023870119b1c76dfe8d4345d39876
SHA1be19b2430f6aaf7832eb21be7079b33c2dc2aa5a
SHA256867467233f6b030fa4d09c4adc7cece6583b5a86be91a767541ab6050b8fcdf4
SHA512632309e2347b5f3441463e78c8d5aefe9d6788c4df8b6586c02c19817f96b4a1d296ad5248e96feab9452b52f64db0eeed9298100335c22f05a34be0e34f8467
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\LNWR2_AP\Engine\TexturesSWT\Destinations\450_Destinations_4.TgPcDx
Filesize512KB
MD587156ac8c3b1306f9a605d580d0047c8
SHA1d977c107fdc255572b76139ee2f15b5755237352
SHA256d88261ae286d5063d7a1282d39cc0943ce80a1e721327d276c1b540d2d79aabf
SHA5121e4eca12a21501e5879b2943a4648c8cdf95bc4bb96cf09582d9e2417b84e299d5663fab0ca4fdfd52088637f61487cfb8f2a508b2da22957941ed68370b3b34
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\LNWR2_AP\Engine\TexturesSWT\InteriorTCO.TgPcDx
Filesize1.0MB
MD503ac08a9d0b2f7f14a56a6cc02292852
SHA103ffd2dac300bf9aa63d836502b53242b46c6afb
SHA2562efbc01ee6e9f00abe11ab9f3535f2bdae9ff88f5ae7d7330c0068717c9c91f8
SHA512253f58db703b36dbc297dbb21b934e8215d8bd128661ff3f8f4433ab3ec00a40c76b4c0c411a2e765d82224154daa256251f6c5741715ab9d5eb6bc334d39c28
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\TPE_AP\Engine\TexturesSWT\Destinations\450_Destinations_1.TgPcDx
Filesize512KB
MD559ff796076632093f432bac5fe04e86a
SHA105eaad8fbd477d9ae6abeb7b5d04ab0344ff15c5
SHA25665c01fd60ae2b249837acf738b5e8198993bfa210016d1778d0991ccb323a3de
SHA5127705de9222bb29134899fbdee961f6d563505580e1e880d1f50ef9eaccef2dbc9ff98773424385c120421b24c767fc860314221c7c2fac604487c8b353f3ab46
-
C:\Users\Admin\Desktop\railworks\Assets\DTG\PortsmouthDirect\RailVehicles\Electric\Class450\TPE_AP\Engine\TexturesSWT\Destinations\450_Destinations_2.TgPcDx
Filesize512KB
MD59ce493b2c4a0d547d1888df6f7c16fe7
SHA1cefdc91489a3d8a3c5954ccb024c808aace32830
SHA256306d4f987457167a8c75af0d40ef7ee744d6a4481db267a19ec046dc4bc3a452
SHA5123f78135d6ab8f4069e8fa1238c8275510ebedb126a2f9ee106445ef24d2c023f9ec9a5503ac9c6c71bb29b4d4035ef542696999e9fb4de719cf0adf034c88acb
-
Filesize
105KB
MD5547edaedf124ec8848d8625fe3045bd9
SHA1d6b69020ceaf0ad6eacab9b4f228f67c3023b423
SHA256182eae16a648e6de8c45ea5b433b0035e257ac7e51e43f9b1afe7968e01f8a27
SHA51274b34b9a7602513dfc6352917fd41678057a5bc0b8b3047cfd680582a76168d4dd9f160c6fa8ab7b37133bf8a81a8328cfddd50bbabf59b84defdbc8efbb6a4a
-
Filesize
4KB
MD5845672429eb59f67ccba83df5cd39c7f
SHA15de82c73ad782f401f2ad3bf224dded9a71e3917
SHA256557523723cf068cbced7d11ceeb3d6f49c21ba6d740993a5750cf2245e52bcf9
SHA5125a9e448286905cc51086e364d7e55f644cffae5b5bae038f21ea135d4f85861a8e2f628bab9247f3630be4d6fc3300f2eabb0c690f0453b1666309e9954a2774