Analysis
-
max time kernel
7s -
max time network
125s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/04/2025, 10:49
Behavioral task
behavioral1
Sample
2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe
Resource
win11-20250410-en
General
-
Target
2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe
-
Size
251KB
-
MD5
8981ec8170d7378709b0f9989b04a922
-
SHA1
fe1923cef44847e0a128b66c445827e97c3ed7a5
-
SHA256
3be964c7bdd8349bed41823d242f36bc525df6323eedb9e6a7144118984020af
-
SHA512
22f05bc348e92e19f904e8d6d6cd1be768a20abf4b3a378425ba976dcfdb994fe8573dca526d7cb29604349977de0b62e2878b16cd972633a21f4df249dd7046
-
SSDEEP
6144:k9iaEaA+HPsISAzG44DQFu/U3buRKlemZ9DnGAeWBES+iia1vD:dtWvVSAx4DQFu/U3buRKlemZ9DnGAeWP
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Buran family
-
Detect Neshta payload 18 IoCs
resource yara_rule behavioral2/files/0x0006000000027b0a-24.dat family_neshta behavioral2/memory/224-179-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/224-410-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/224-3496-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/224-9535-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000027afe-14369.dat family_neshta behavioral2/files/0x0006000000027b21-14444.dat family_neshta behavioral2/files/0x0006000000027b19-14431.dat family_neshta behavioral2/files/0x0004000000027c22-14400.dat family_neshta behavioral2/files/0x0001000000027b80-14590.dat family_neshta behavioral2/files/0x0007000000027b6a-14571.dat family_neshta behavioral2/files/0x0004000000027c21-14378.dat family_neshta behavioral2/files/0x0006000000027b0a-14364.dat family_neshta behavioral2/files/0x0006000000027b02-14355.dat family_neshta behavioral2/files/0x0004000000027c2f-14350.dat family_neshta behavioral2/files/0x000100000002a976-25470.dat family_neshta behavioral2/files/0x000100000002a97a-25476.dat family_neshta behavioral2/files/0x000200000000067f-25498.dat family_neshta -
Detects Zeppelin payload 14 IoCs
resource yara_rule behavioral2/files/0x004700000002b1a2-4.dat family_zeppelin behavioral2/memory/5144-178-0x0000000000830000-0x0000000000970000-memory.dmp family_zeppelin behavioral2/memory/5492-180-0x0000000000680000-0x00000000007C0000-memory.dmp family_zeppelin behavioral2/memory/4864-181-0x0000000000830000-0x0000000000970000-memory.dmp family_zeppelin behavioral2/memory/2620-207-0x0000000000680000-0x00000000007C0000-memory.dmp family_zeppelin behavioral2/memory/5492-1182-0x0000000000680000-0x00000000007C0000-memory.dmp family_zeppelin behavioral2/memory/2364-3497-0x0000000000680000-0x00000000007C0000-memory.dmp family_zeppelin behavioral2/memory/5492-3922-0x0000000000680000-0x00000000007C0000-memory.dmp family_zeppelin behavioral2/memory/4864-5323-0x0000000000830000-0x0000000000970000-memory.dmp family_zeppelin behavioral2/memory/2364-10906-0x0000000000680000-0x00000000007C0000-memory.dmp family_zeppelin behavioral2/memory/2364-14748-0x0000000000680000-0x00000000007C0000-memory.dmp family_zeppelin behavioral2/memory/2364-23543-0x0000000000680000-0x00000000007C0000-memory.dmp family_zeppelin behavioral2/memory/5492-26236-0x0000000000680000-0x00000000007C0000-memory.dmp family_zeppelin behavioral2/memory/2364-26207-0x0000000000680000-0x00000000007C0000-memory.dmp family_zeppelin -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Zeppelin family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 3 IoCs
pid Process 5492 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe 5144 smss.exe 4864 smss.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2627618461-2240074273-3604016983-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\smss.exe\" -start" 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 iplogger.org 16 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 geoiptool.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\133030~1.69\BHO\ie_to_edge_stub.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\133030~1.69\elevated_tracing_service.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\133030~1.69\msedgewebview2.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateCore.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.43\MICROS~4.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\133030~1.69\msedge.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateSetup.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\PWAHEL~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.43\MICROS~2.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\133030~1.69\cookie_exporter.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\133030~1.69\INSTAL~1\setup.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\msedge.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\ELEVAT~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateOnDemand.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.43\MI9C33~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\BHO\IE_TO_~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\MSEDGE~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\133030~1.69\identity_helper.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MICROS~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\133030~1.69\msedge_proxy.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeComRegisterShellARM64.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.43\MICROS~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.43\MI391D~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\133030~1.69\elevation_service.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\MSEDGE~2.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\133030~1.69\notification_click_helper.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\MSEDGE~3.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\NOTIFI~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.43\MICROS~3.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\Google\GOOGLE~1\134069~1.0\DISABL~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2472 4864 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5492 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe Token: SeDebugPrivilege 5492 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 224 wrote to memory of 5492 224 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe 79 PID 224 wrote to memory of 5492 224 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe 79 PID 224 wrote to memory of 5492 224 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe 79 PID 5492 wrote to memory of 5144 5492 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe 82 PID 5492 wrote to memory of 5144 5492 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe 82 PID 5492 wrote to memory of 5144 5492 2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe 82 PID 5644 wrote to memory of 4864 5644 cmd.exe 83 PID 5644 wrote to memory of 4864 5644 cmd.exe 83 PID 5644 wrote to memory of 4864 5644 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5492 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -start3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5144
-
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe" -agent 03⤵PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe" -agent 13⤵PID:2620
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:2096
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:1568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:5840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete systemstatebackup3⤵PID:4848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete systemstatebackup -keepversions:03⤵PID:2268
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete backup3⤵PID:5264
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:1184
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:912
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:5220
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:5316
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -start1⤵
- Suspicious use of WriteProcessMemory
PID:5644 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe -start2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 18523⤵
- Program crash
PID:2472
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:5352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 4864 -ip 48641⤵PID:712
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD50bd293f4914b97825cff86b0da73c91f
SHA196a46e6530aec55a845caeecf19263a533c87336
SHA256525413423fade8e22cc5105d071d6f15e9c1f05eb89bdbf971a640b7904d6b59
SHA512c809c09cb9e241651119fa52e1223391a9f0b9186627191a4a356250585b7a9167baebf9a5dcde83dfa1b3343db6d5e6f46f8626f72772ab7daa3c192d1bff7a
-
Filesize
86KB
MD53b73078a714bf61d1c19ebc3afc0e454
SHA19abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA51275959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4
-
Filesize
177KB
MD5d4e516a2a05255cb7e2283732af20f06
SHA133fc615cfcb61659c0965aa86b95f5bb839240c2
SHA2567fcd25487e6bb1639320f2f7837552c890148bc822500fe3f37c88526a8b9a8f
SHA51206c426f6d85896c9a4cd67f35c4ec7cd6b792392e9fc765162903f42ec0abe9c17858ef48221656390d20edf427274a37f5caae0a85f9a60d481215560547181
-
Filesize
330KB
MD510dcc57864a4be4709473c70a22f6330
SHA125ba372439d3eaf0241acbd042a191af7fa491f8
SHA256301c57d4da893a9e718862741ea75c34ce3a608317567708cfcbbe5282ef2b15
SHA512e8b1051f5b3315a6e0d6cd2623591d3e3fb3caa1dbd434443a272ce972c91da2808dcf24f2f2559e4662c29ce4a97bbcfa4b12ece564a1cba0b850785ce2b164
-
Filesize
3.4MB
MD50c8d6021c5fc17f23d463f9bf92173ca
SHA1f94b428d4d11fb6df3952b511f02c0b6bb4a1360
SHA256a6a8e3d585d002ac127aec1cb6a6f31b415d423bb309d73c8ff38d46dd32dbbf
SHA512c82752197b3b8187ba1e6ca8d5fe109b8d82807d3056704c3529d9cbfd626d5e55ab8f04fd8ed8e280c4c630cbb46ea0c9649c535e1677b27aff7d0c75ed682a
-
Filesize
2.5MB
MD5052ac72e25991e65b9dd9fad33b106ba
SHA1b71e1e9928d34d12371be7e08d19b58b2cfa9b87
SHA2569e19810ac7411871b14e3406e6fcc7276c34952cc51de4beb1063a0b18147e4a
SHA512d5a33e2059bb9b540d9fc85d12fae4683101e96ccb1e34609daa602d6f34cfc90e1520b1f5352e58d46bd494279074765316e17944e921b864375b7918ea5c75
-
Filesize
2.5MB
MD55890517a691f4316e086867aa50ed3d1
SHA11d26a7a3c969fd5ac627c50c5eeba7e4b664794c
SHA256cc5852d0eae13937972f28390d28570838733dcd1a94cef636fba29e1f5fa97d
SHA512577de3c2330a8164a4d6939c83964c18eea16bb1b71e6894f2775f709953de5cc5afa72678ff777670f897d25b2df6ea4c973cdaf67a9d0f9df48ae7bd0a1ea8
-
Filesize
88KB
MD5b8a90238821075001c3a4e8cb97c332f
SHA1c16421ac9bc59d19231816097481b2e84669ce19
SHA25608fb8b4f7690f302ebb9aa6f7da851dd447f4841ae2d19f716abb1a23135592f
SHA512ba4f1d1db236ff9338f01964d5e675424a6ac9d780dad09f9f17b205dfcaf22783c6e178d477bd3fc375997ce0414b04381a8e6be5397e6103569268e0738c69
-
Filesize
3.1MB
MD590a7d99843a48492d679953ba08c1cc3
SHA1e6fc63ee2fa6fd60d723ca7a5970853d8aed354c
SHA2564d0bab4fac5a132f83712c2654db97028dff5ce7944b56baff10a7dd36e478aa
SHA5121c81642fc92ea119e23fc0d34e9d020bc59a005ecf1ff67e62834aa8939cac0e365437c44cb3609b9dcd9121b4966a3c9c6fec9a6be070c048ee442ff56fce75
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe
Filesize185KB
MD56e48274e74ed1d66072e883fcca64474
SHA19c6c61bf6b3be0453fddacacf9d46d525edada58
SHA2563ee2e82716606a040104f342469ef779fdb2aa3645f9c9312fe5f76d6b74e91f
SHA512b4e9033576dcbc1ec4d0b6d11b04d5cf722f704ac9e29602ba1fcc3470d9eac50deb60d3c21d92e0bb68be6a465500c29e014e7998248f14fc70318bd88dcf10
-
Filesize
133KB
MD5c3124ac5e4b604571fcfae5636dd81df
SHA12d7f3e9051ebf03e2d8bbdd29da4776a6556eace
SHA25685b704a4b1f3ec649ce2faa6bae503f5182e7ed4ff25f14f61f2628fe5391964
SHA51285ea18659a18fdf1216c587777f14be518c26eb9a5d66903bd8bd0daff518c9c7ab391b2103aeb95f023df84860d01ad6d1e68043176b6cfbe0359c57b3eba0a
-
Filesize
255KB
MD519ac02f064694a290dd89577eecc3fee
SHA1cd3ba968cd4f09808f2a18186ed2632cd731bd69
SHA256e7ebb061af62a19b2dbcd7d800f7f96a34f58aa9884cc3c0e0de76cd2b69629c
SHA5129e271849bbb8b3fcadc246d430d975b508eceaf774a92718cb08ece775f598dde48c1bd7c5bc8c459b0247ad56a6c56ec21b81035e27690cab3148df9f1a8c8c
-
Filesize
387KB
MD50c022d5f8e7cd49e18a49581181d5072
SHA118bb9f838ae982a9bd726f799df8d23d5a865e09
SHA256b67b74223b7dc3c8d0889f6f985f34b4cfdb370f77a6e9f04f94091fe846023a
SHA512e9eda4660448a889dbb0f6fccc0aa10b0d3f8fa4bf6130a0b6b77c57d79e3fd3c84759fec9df3a0e0ff9ee73a7102db90c9b4744aa968bf49a32b53542bd4909
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\aic_file_icons_retina_thumb.png
Filesize64KB
MD56f6b1e94e3cb23b53e2bbaff258da344
SHA10ae998b184e36fcb012d05ed103e0a59341b79ea
SHA2564b12ceaa8b892e9307ecbb00b34aaa6323be0bbd4c597b562364eb04915ac31d
SHA512e9c2bce4f6b62ce62c1d8ddcc03ccdff7fd4e9c8034057366343c11242d0ed7d230e41bf9fceaa73af99526b9fd91680e6fab11dcc42e5f1b11771085bfbc155
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\aic_file_icons.png
Filesize52KB
MD5f49d6ac002fb87bb4b7254b731535062
SHA17aaf1ab698a1a55a2803ea7671cc7668814d2860
SHA25680c2516c39fbc596366e3351df8d9587ffa66cd84f1993737997adbab9f5ec47
SHA5125c75e33005c0d5567a99ddd8342f285dd37cc3de427bff812425959008f1ed9e81ef1e29fee0779e76425cb3d2e76b30201d07744eb948362bc200ba090df6aa
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-il\ui-strings.js
Filesize29KB
MD550a80fd3273c955be259e10171de8383
SHA17f81b2d6396c6ed46b5d2a35ce3dcbe9f3feadc3
SHA25659010fe0835d39be3cfbe7a0f995b92421c20b239803ab2c60bbbec922fe7dfd
SHA512bfd8a1975fbee9230ad5f61be05a8a80acf8dd1e3b825224be0d632b7dcdcc95853e4abea6868df2d665fbb462b0a402f77ce4b9e2f69c8ea6513818a79cbf96
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-ma\ui-strings.js
Filesize34KB
MD5c206f26ffceacaa405044beb6f6b941f
SHA130250744a7ebf69ac672e5571c65bf55690aedfa
SHA256c3a49d4df2716b9dcef9090f40e1a5a6b8dc7996bdc7246c58e89cbef2e3765b
SHA512f9e324a631aa0cb2186205a5dc402982417741d107c068ce7de7b6d2972f2c33c9988b4da47c869659b8c34a915e3abcfd51de21a06dee55c33e70921a26cec8
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-il\ui-strings.js
Filesize9KB
MD58542488fd38d94dc58a0901dd352ad40
SHA16d0e4f9da32a4a42ec5038eada2180067f527212
SHA25603bc2b792c091824bb25a16323b1ca08e495be48cfd1e0a68b9e10de1a62634a
SHA51253c11d6638c2e0a124d3f45d09db1178bd477a9bad66836126c8866a5dcd20350ae105af44f68e31e630ea7cf179ab47f0de45e90d084fea8d3d3d8a93577754
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-ma\ui-strings.js
Filesize10KB
MD543f735281f6316fd2aea1035313b3cb1
SHA169e1ff68c49762ec63405b483efece1c6c80987a
SHA256bd41f922cf805a3db8bfdd3ebf74f22bfa497bc4797ac77503e520552346d4f6
SHA5129df4c844fc097e4ebc58a91f9fc103b32364886b8bc48507b46cefc3e44dce9acd9ad9fadf8e3009c9e2ee8c53b081af780804a70a952a2c5e7ab79d1c63fbd2
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-il\ui-strings.js
Filesize5KB
MD52564838e70ae64efcea5776f6d489b7c
SHA1acf724240fe4703c8b407a95a88584654fa8c149
SHA256d9234861050a926cfd43552132e911c6587920eafaa41fb67b54d3a0b18fc5ec
SHA512e77bd148ead29c57a388d24f2ffc80bc837a8f8cb5bbca6526835e83897cf8e1384b40e79e52f35adfce25276cc213dd1dd6ebfd4cac86356292f096739ecf02
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\exportpdf-selector.js
Filesize175KB
MD514f023883d377b91028237eaadfcd8ed
SHA1dd8bacda5e8dbfe8bf367285cc2c283304362fdc
SHA2564f27aca39da57d2c0761f59b50323d0da8d641513d3b8a22acf6cf9f9328c5df
SHA5128af59cbd2fbcac1f275b8e4f7295e3d8a936610c9ae45d7dca283ae31943f2a5cac1152ff94e438fa622236be61caf2fd9475489028d5c2f66730fbee6d7dbeb
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\exportpdf-rna-selector.js
Filesize176KB
MD5be656550c76063775f808e78889fb474
SHA1fee6890e09e37e0ce54e712b43fa48d5440d04aa
SHA256e5bd2ab4794e9ebf9bd49447fe907b0a95ef4c69baaeadcf526d922f5f82c5c9
SHA5123488a896c1045614bd6c73f794f33781b1993cd2f9348554e3b6ab49f7518ad4b3f53fa32aa6585fd3e5f6c7dd9136be4841be59afb33c9ed14870d18a88b36c
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\exportpdf-rna-tool-view.js
Filesize387KB
MD59cf2c082bff13ebfbbd5fba23a07eb80
SHA1de6f8ad47709988074b1b55159c5247e1c2683e4
SHA25640063d276c9a9b4c6745644aa4725003d9d6633afb81d280ae3d46befd131955
SHA512a0c1c268095ca63a4d10276455f6fd78dbbd7e7c1d1720ab780eff7e06d42f0335e578da90aca660a35853fdf421fa22748c3bd0e3a6620d57fc4194360cdc38
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-il\ui-strings.js.C07-C33-7BF
Filesize10KB
MD5307decc15368ca97283abe116ed06b3a
SHA115263ee7df6730fc67a94764b4a3282d7fe0a564
SHA25679150152e121e579c04451fc791372c2b7f8e26be35083ca265988d9369ed2e8
SHA512a3bd61561c2fb361e420fbcfeffe6164f4eb6790e8154c1b35eea12d7f27d7e398c1bb519412b8e1bcd835de9b22b5aab0d184b71d2c42acdc938223546cc974
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-ma\ui-strings.js
Filesize12KB
MD5c62c9014f656942bc924003d6d0be0c1
SHA1bbf8ea81d4414f727aac52e8b9d78cf4bc9dd770
SHA2568bcebfd81378ae997cdcf2f3bbcad46707cd10ffbee1c9edaee31a7c174bf954
SHA512cd3e70ab5b159810c38320ac89114da6f94bc6b41750dee698e2b15ca54920562648744ad77cc4148d98bb794f84cf73332bf441d3738b679995e520f0ada216
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\new_icons.png
Filesize9KB
MD52959f1fe09d97e01f733667f1a4055d9
SHA19a9d75236a0ab054fd6786b3152e6c7e22a2efc9
SHA2562e297476eab7b7c4fbd55cae430ae6d47ddb557b4de3bd9e44b5d8e9b9e09c8d
SHA512a98b9e827ca1594cffa378f7e5da2dd3d1735dc10dcd68950e8eaccd945c638274bc73cc6848c105d9098f8097e3aed2dea7b77cf23480879e812240d44df315
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\new_icons_retina.png
Filesize18KB
MD5751d0600e0c40a321127aee947817071
SHA1d9a86cac19b78502ffb37a64f8620ff867ab32db
SHA2560f1cea602753b01d76ff2654c060f07d4974fc277742a7a13f617ff6d06facfe
SHA5122770bd4ece0b90517babe4207528180132e7bb9558bce7110171e5797b9913fbb76bdd482f20e44a66f865595d8afc167fc7a83c10c62f8dd60818c9aa9ff6c8
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\dark\icons_retina.png
Filesize16KB
MD51184d39704df96f3e817a3678845ec1f
SHA12ccb5d87b1830055983bf1f874028232a484b339
SHA256dcbffe4418b79877b1645c3148628ff023837340baa03294e588b8f059f0bcdb
SHA5129d81a71d432707b003d11f8375d99fca72d61615f744bada6ad1013a5c7a7db83f9b3925999fa59ff1d2dd452c7c97b052de305fc1b529a9609ba1c0e7b1e03c
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-il\ui-strings.js
Filesize6KB
MD51143465183dc4fa3094252d5b48f5330
SHA18f4f846fdb557f8896c793999bf1e21ac9fb8acf
SHA2567847eeb23e4ae4ee17d5d9d90c0954f2610f718bc028496273187fc7ebf5252d
SHA5120c09d232a531adae02cd7a54f03a8b8f9de94b06cf02083d6b49b774485e40b428d976af3b8af49118ddca06643215fd34dc65fe6d82269b2648f02d98c203e9
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\selector.js
Filesize48KB
MD5c50d83ad9c16e3506a9f82b83a959824
SHA11078c6cd218c5368119fc141c0594fdbf0b5c822
SHA256b4eadeba7b69512bad4d7ab4e2d1c97bbf18e2a6846ca297b7f7864b0a598a63
SHA512549d1f0f0e2a9514ff3684ca500de53f348a8870589d13bc3ada9dde65b086d18e3978aae2b1439603e67f4c70dde157c1e4329879d0d4da88f8bb92bacec8b4
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\en-us\PlayStore_icon.svg
Filesize7KB
MD5e7ca1e47be93756715e0af68c809fde7
SHA1d6c6cb35debbc9b16d14d72c292ad493f39bd759
SHA256372415af00656d7f2a7cc86a805cad91cc7bd2a55c42e582e4cbf07885b96d56
SHA512855822645e86c5c2cd9a16d830f9022f26c21c777f710a3d3ff3156c8de1cace807a2837dfab7f9d73ec35e1b29515ff2312ccf7b93c735430817b73e42a1485
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\MobileAcrobatCard_Light.pdf
Filesize381KB
MD5eb595ace4a6d2c53378585d516ef3f0c
SHA1b3205943b99ce2e4189713f6eeb62c40c066b8fc
SHA2561205b5f9d1597038c3c76fe8e324d7afdbe03465760501dbe0beaee09dc7c4d6
SHA5125f2b4c32e8b8689e35dd13c065c5b0003319d9754a1e3ef328375e77422f7d3b1632f52130c33b58af5d513968c3cf149ff13211b2cc01092c7a4b5f06a0b6c0
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\MobileScanCard_Light.pdf
Filesize56KB
MD5bc0369de99824b89e63aa6bc00761166
SHA17a1afffca2b156ca681ebcf6c905135fe9386cd0
SHA25621f0d9e6777aac25d182eabe2277d08f8d83e5f4b7efe174d23f57728e521c67
SHA51222055902a56ddff99aeceaec550fd2ff3c0a3170cf0af92819554d49e24ea6444c571bf087529519188ddb885809d7580f3850b78dd7f703c61fa5d786250af2
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\en-il\ui-strings.js
Filesize14KB
MD55368426eba7e0573636d534d8dfe17f6
SHA1b2ea5aa3982d5b5ab406b0a9303ae6c1ddcc9a15
SHA256078f9f7b4b81b617a867755df2c3f46cbb84d687008c07f7b825944ec29f9cbe
SHA512ee0cae93b1077cd2722d3dd991ba94d32ac3fc88207b5c571c3962c7ec1d279bf2d77fe0d7ef93bfc39270920ffbc5e0b71d7add5ff84224dd3009f1c8a4c02c
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-ma\ui-strings.js
Filesize17KB
MD5444afe1e0686838f573ce083c2efb27a
SHA1055ee5537c616b3849819342daa1ae7d237f9134
SHA256ac0b1fc903b3f1a075fe35da94c57a275741b835bfa90ee63c7cb99fae53068b
SHA512fa325110e4f269c0e9ce18321018ee6e21c925db956fadc2e7f9ed9f56403e9809f93e92b009b8f3fbea84385d0d883cf83b9b5449e7e088c3078075858ed927
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-il\ui-strings.js
Filesize15KB
MD56ff3f59b5617062396b8c419d0822170
SHA16de48c66809b10099a63413e53569b1845e7facd
SHA256ac8c09f652928028e4f4fc30de4e16d3bbe092d42f19daf8f10504179c32f2e4
SHA51251f8810f0a301cde513b825a50a15922883ced73459a3eeaa580a8ec4dd9c2fc3faf37ee6e9973bad7407302cd8e8cb9ef80e84801944ed0c0e099b7b547159a
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-ma\ui-strings.js
Filesize18KB
MD564f6aa4291eecd270906ae76cdc7b12e
SHA18b551cca5385daa1aa939ff76fb767977f026bdd
SHA2569ef90362e5d8c485f3c30e10cc475619f842f98f244ecafdc722b1f10e27c6f1
SHA512576539a732c26be422d90264e6a525b92d6306f230592205ebf98816855442a9b4545280339ee5b9b75d2bc3ee2a8f2dd3fcd5d821b786fd5fc194791a64c103
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-ma\ui-strings.js
Filesize11KB
MD53c22de306b9bf458784cac4c804ad79f
SHA160d180e788996b6d3745df016a38a361d90c01f5
SHA256d9fbdcb27841409cdb690cbca0fe44f89a542e6a2c9db731932fa09395765723
SHA512f16c8136b55b34673dee5af225c2ca5745e64810397e5318efebfc171662a85b516f4ab1fa8a28ccd276fc4c1b75b79166006340b33a76bb2387697c5638c4c2
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-il\ui-strings.js
Filesize15KB
MD5e487975b78771e0d094b32a6069071b2
SHA1dfb2a984b80117ba7d056f0e075419668edbfca4
SHA256c847bdeee101aefad3fff1a77a74e23c24a21e603bc62e3d02284c61252f2bff
SHA512237aacfd1c92e3ec6b7ea487602aeeda9c6749399fafe408c90efcff1438997604263947aa5ffde17da74f9124eb742e142213025f1791d70331268345281e52
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-ma\ui-strings.js
Filesize17KB
MD5e434d0220b2f630aee19cd085a78a7f8
SHA18997737407130913a2e1f196b1f5374d83bf371f
SHA2568170d34a2a4b3169d3d8e5f400c73a750aae6414c9bdee07dc378280830b6682
SHA5128df33bcda343b67365831b4b78b1871db1dfb6ca8fa57990bd45999876f87ff06942b33ac3b005915dd4d7c5b7e9ffafde134facc6da4aa91414c1a16d6371c7
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-il\ui-strings.js
Filesize15KB
MD51a3e94caa006d920156c4483f2d905ab
SHA1ff465e343fd5045b9fc5e84aa3286fa38e5f4c7c
SHA25698407e0a4e66de60709cbbe695fecfcc656bb5b55bf799eff9a7bad801c903dc
SHA5121a1ec26e910ede2349be1ffcb1118a06e0fa9916e9fc3249a26d0b431978e48f2efc80db53b446e322bf8e976a43dfa3c62b8f838349bb82d18e6f5d2cb6ff9a
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\fr-ma\ui-strings.js
Filesize18KB
MD533e5eaff4c72e113734eb0f419a9b68c
SHA1035d663bb5e19f6cce05b215362c5ce7a6bc303d
SHA256bcc4ba592fefb1110a7c99989ce742054337b60a1fcfc76af2c87050b347883b
SHA5124a04f49be4e54da2e83e03b73aee9efd8df62ae028d589ce3f081299902937850f507fdd184117ed7777240154602550c9e4386f5a7149050f50f12adcc25ff5
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fr-ma\ui-strings.js
Filesize23KB
MD506e21f12ccf17d25635b2e83bcd0f15f
SHA14ac58fcf2fa9ee66d11bb47c342c6080aa414b83
SHA2567a10a69f3509d529137ffe8361d70457d3cae70d4ad8658944facfd80702cd1c
SHA5125f1f4b3178399545fd66b272e72bc105c48ff6dbacf8e742bd1586854403fbb219a8a2cb0d684bf9f13201d19aefe25f77678372f35f6d57f498b523c3fe22fc
-
Filesize
126KB
MD5aa24b65aaa575f8d3fce1eadae73a090
SHA1486a0f174056674a0e79e2fccd13a7eaf8da0646
SHA256e5565d83e01ce40ffd38377b6e6e0ec2656830ab06826bf6247e4907622a2938
SHA51241323c74b1799fed791bf2040bb453d6fe2e8c7e63370ab99edc8e51cf20197a1e88891efdcd0b080814861e0ea60c1f1914dbbf104e4175754c99d624dad4bc
-
Filesize
144KB
MD57a7553463fb7deb03dd1714f8f0e895e
SHA18a88c18872e0dbf697c62779972cf940dfe79651
SHA2562ef30f8ed3449b4ddc7a721f08b1797ce22efd98e6dead498e32c0ff912757d2
SHA512b7c7d3db5216fa2969b6878b69e64e409141478422324b3ce726a17cbbd8c30acce0cdd09f820457d1b554d6eb9d81d80c213a2a40fb37bb328b23121be5b4ad
-
Filesize
280KB
MD5ff56ae6670d121286b6691bf5be56bbf
SHA1b30a08d95688d44efd67cbaec91a6e2e06030b0c
SHA256c785c17c0c3922653aaf327a7cd152c8f295e138fbc5820efea0d33e6709153f
SHA512fcef46d7c162616537748b873d1342a417bbb0dce42f11edbfa13e8b6545885b8ff0dd86efa842120f5f3ecfc05c3f82c4138c4756504f306022dfc2cb331da8
-
Filesize
94KB
MD5296ced7e327cfd4613cf53b90df86b8d
SHA17218a6bbda7be57663eeb8b9db1e0d7b8ca94451
SHA2569d8675b5aa0b683cb957ace7a8bbb9235c298ba498953154e2cf1a95c9a3ec79
SHA51258ff3af0245e3fe631313467b0df00c843b61e29143e039cacb12a0201006460114d394267629a828cd46dea0a24e9cdfaa72f5d5acfe156d4ffaf2d15fc1aff
-
Filesize
149KB
MD5feb46d41281768b40990d3e15351c937
SHA1638d6d4b4da9fe930fb9ba0e9cfc79b3451e681f
SHA25675ec393627e8b18361917a84c0f4bef437cffb39ee181759fcc23d1b50007ae6
SHA5128187b718912b2c5d5bb4d6675965608b0d86aabb41540ef6f0a1e070ae7844e1888ae53645d64cd3ec8e1019cfef7700962e313540a70eed2a668da6aea82b35
-
Filesize
143KB
MD5fce16f7fe048f337fafc524630c5c1f4
SHA17187e11a4c332169c614b018f43557fea4a43b11
SHA256e0077849dbdddc09650b09eb7a18fa9406eb80fa5c9f3443c069ce8a55505c89
SHA5128c1da8f9ff506e139d47c927d831cbdcc3683bff98822990ed3d9ad0397d939b09f2f7642a394cb3397671e4242b42e0f6de24efafbbeeb7f25db737d9054ac5
-
Filesize
314KB
MD56f098c8ea91a106fbed73d94b97697c3
SHA17cccf6b3e8a63365d820d33bda8e366ec05989d1
SHA256acefc391609b3e0455d92af392c8413d826edbcbb3f3d101f5dabce066a8ba52
SHA5125e943a7c811792c9cee2a1410235a6615b9d1e60ddaae959941fe2b2b7bbf9cd38d3de91774fd8de5eb1d923fa63d612c828dc31f45b13d818182427457c5665
-
Filesize
985B
MD5e02a23aa5e3ae40f5de88c8c94032982
SHA12e9974f7512991d56b2d9293dc38685d480b39f9
SHA2560b294fdaea09f372173f6c63efd2fb297a7dbe5707104108d99aa54092f91114
SHA51236ea597602a3464dcdab0eabd0dc1e4d44d69884898cd8e58e1c03475c341eaa72dedca153f6231330dcc04da2be7b5550337bb29660915593179e41685d2893
-
Filesize
3.7MB
MD57822256c0edbcc034ce6653676d65419
SHA110156aac5defd05505da6d2a5283e5d9577a5724
SHA256a934ac9a209e9c107fbb5e38f736acf4dc63e42c854659bd33b7f1ea2ca3dc55
SHA512a04e47f4bd79eb1ce04f91b3245c643ee7e677560330dedfebd78c0531a8ba3b9c6754e5d46b48b73a87e1fcc30b493ef11fcefc1c1853026f6df749988d7fb8
-
Filesize
292KB
MD52bf939d6550db406244bf008fa875824
SHA1ff42dbdf646de5c57a59a03f433ce9eba51b7420
SHA2569bd5f443b7ba2bc8895917a550575a7656c6daa44f785babe98db27fc9bbbb3c
SHA5128acb36e5d9225a8060bdb4c5641ad6e21402e9ca7f9e74d35fccb3459bea7b51335185aefe62f288b386c8ab3aca0de484fb7706e2584a952dd08b2175cdf414
-
Filesize
265KB
MD5d41bb12f1d47ce8dcacc61a1e22810f1
SHA1c03a017f78a3be2094fc3233f0afbae4ea490049
SHA256c00571177b6f29e056810789cb4a4e27570101ed20b924035004c816510904eb
SHA51293d5d408c9d584cd340ae12eb7ac00adb1d7967714840b819e6b8926d1eaf198d131796c94abe8c50c0f94ca0190a3987a0e3e1ae23f404386628dcb4ccef00b
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\osmia64.msi
Filesize3.4MB
MD5adbeaeda66ac587cf8d8e789f2df9580
SHA1a60671a6269fd7c2024a7ab162f10d6de0e37e96
SHA256ecb7f7707bd8f628b0b4d8e018b38b2e4bdf146ffa2f04b7de03b7b9a1919a5f
SHA512b38da0651ec27aa117eb86370ad145729460e940c1c19ec25ce49c1a0b6998119a36360ab3de36248ad91420800f85def9b837dffb828e33d0e1e2888ef347f9
-
C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmclienticon.exe
Filesize62KB
MD57bf33e66c6de162675364e86516ddfc2
SHA1b0a172a7057704b0b11e21fb5b490cb23b4e7bbd
SHA256e7c067ca9615b7dafaaa8dd533976cad31b7794735bb8ca57abdc39f9edab9a7
SHA512e7966a34c04f4e0bc563dacdc5e7522fcf14fb28916e657f325b5162f6a168036fbf7a20fe3bdd0623194ed6a25b0c1f83f9f2c47f3b312a1f863c3decf9393d
-
C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-040C-1000-0000000FF1CE}\misc.exe
Filesize1015KB
MD5b3334b6c0537e05194db541e8af2c2d9
SHA145e00ede2bb414679fd0ed44c39a4ea6adcf2d66
SHA256548fd24fe0ac24a73ee1ef674e6f43ea4dc74d31f576788f0006db1908a05a60
SHA512a8c3d13367f8ac3a939a76204f2f40d6cbaec5d19e0c0b1273edb4da0fa8307285e1ad64798deb2ca9bb4d31e0d8524318051e7a4c53567418f34feb58a8d337
-
Filesize
586KB
MD5d489b4f9ebc6267d9910a05f911d1f85
SHA1cbf58df15145448bbc24a9b257021e52c151b780
SHA256a7ff625cd2ae27fa1a42ccc2eb16c38b7c542d0b6c24c9f2f6c0488ea6ee225f
SHA512997c1aea9b89d05a890ddd48743f795e6cf12ad4f67d3297700a8df7a90c52a0ea1684be11f305d669b9fc27323c270bdd2cc03d07d90db5bfbb7eb243b4f70f
-
Filesize
605KB
MD5f06ed0d3e831ca314c5738e959998eb7
SHA1ebea5cbac5bd772c6b79189fbbf4ffb9d7db98da
SHA256254d6d417241a3fc92d626afae22ac0fa113b36c1ef9a25613c02ad97331f509
SHA5120f939c824337696b7f44f87650b65ac03c13b96f797f0bbcba7688072387513e73086cf2df146b984fbffce491b6e6fca36e3bd556588fd950e4a4e8ff947088
-
Filesize
612KB
MD5b24f8cadc612f04ca4e02e7f915cb625
SHA1d693f4416b851e8923091131e1d9d5ee3ca68b61
SHA2567fef9f59f357f59af1d6d728c989b4ef240ef4eb5511d5406637c476984a3ee1
SHA5128ad18003c09bc2c2eaeb074a23f16d2afe38049c4545c827796648a9850c6a731e640fb1496e74f50763b6de838f98b41dd2be0083e9db6988cc57ee324e034f
-
Filesize
1.1MB
MD5c34227c8b1b8e100da7124243b3a0a08
SHA193351e36f61289ec0b386743f60c7a5440a9e5d4
SHA2560b7f750e7ecbee907efd0ab1fc5c8de7cab800b2e0ea0e2419c424612835d44e
SHA5121c5416dec008af4da4d815e4c3cdaebb1a13dd89eaa8bc2da5cc7bdbc2c90625bf2363d057c3578b308b736504c9aea1fab6493d4102dda4f366c08b4812db56
-
Filesize
615KB
MD5a0e901ffe232dfc8eaeb01d1605b3859
SHA164cd956ec5f89cb2a5bb1eade02dd7e414ae8e8b
SHA25640d9fbe0d973e3f774717122c9b9be47ac34722d3a0f87022fe56ea38369955b
SHA5124e96dd4ba36c7799e838753d1024f5a30617ae761df4e4aad8b411a4b42935362888bb5a2e3a23bd1c826c6b138fc6eea6634579e4bed3a7e4695c865ff9c3d0
-
Filesize
594KB
MD534662e076beb789cd8759a60f3233c05
SHA11c534f6e985299579d26d4869a1a36a09b52dc0b
SHA256690d24eb175e03469a78cf2c5732b5b5f053770f894ae7b00dd954ecc337c91e
SHA5122fc576cb0e9e94b3118f38488a4ba59b47fb03b701aa619ca92d3c49051b96c01277780974d358da9f6599f9d041b399c35c795eb80ad47543bca90ef0498c98
-
Filesize
552KB
MD553c5e55df119c68f1bae2adc078a206c
SHA1b833b66e15c76020f46ca0bf0efd61e712c168b4
SHA2568b2146be7d2afbad740c944bf5102bf489f6b6827f8c295d4f5846207d4a780d
SHA512e8f749d7a25ae202ee9cfa3625fb5ef401d66596b8e97cb862466c791f904bed548d33f0b3d3d283f8c8832c965032ca9a3ef7b21e3c7deb4e0af1b3381d7393
-
Filesize
496KB
MD564ee75042c0f5f6851dcb49eb7be25b7
SHA1ffe7e98f9e0f8945f33bb792001a4e8c1ef426cc
SHA256e10dc78b6168764755a86d94194a1b42f4db0ed671fa4a724b3f8d5c27d4a943
SHA512362b126a59d7457febc151c32caf77b1da895be36af4e101f7fa564aeff45d3c86d6b53ff5f2ac20de87196f0ed704a0d37b696a280e24270114999cde8f1ca8
-
Filesize
496KB
MD5164c6cbde7d61780a521534e47341051
SHA1a525e86ca742d9b789ae5d156cfcd66bcb9a53ab
SHA256009a4a1c6a98efe13f926616e96a81f0ee42f3f6c95051cd40bc8185e0cf1c0e
SHA512c60f4d3651ddc182c6da89f85b1afb61574a0e71cedbe0d693a099b83598ef46c0e00ef9e3cf4222201f9895478460aa3949a08bb6c517da8fcccb55b5474263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
Filesize2KB
MD55668164eb963fe09048b527314036d40
SHA1bb0e06ae9d59f4f47a8f95ecb651a6ce6916d09f
SHA256ea9e21ca506dcacf78c8935b241d1b018d78250a38fa265294b4c83f1d5f02a7
SHA512f008d664bd96fa7b164d5e2535bb842200aa1054af727acc1317c61783e914fe7d436b98b88e6406a64a8787693745fbf2b147113db0ded6ba1a406edb199ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_268232F9B7ADFD0751C3D83F667CFB78
Filesize472B
MD54409f9540813d8809b0f92f65ff349c3
SHA18e1307f50dcb5b5155ab91b0873a789c4d9c891b
SHA256acf57e17a04092a4e4cad5951de3b4cf8bfddbf73062eff0eb5c06cb5fc147ee
SHA512e487189eb87575263a488ebbef2d11b40d705eeaece0c75ca649da1d21cfe71872a2c1cb434875b281894f2b53907168e37da67111ab93c81d6f1f506424a334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5d06e4d85c8c9d9d1ea0cfa6bedbdd7af
SHA1f754bf54e36c78a95e590253b27886c820fae8e8
SHA2560b6f62fb10638c8ec2ef069d9421cafef677d0418306fa9abed18a7ab06a83b5
SHA5126c22f8eece2046ffae578f878a85b6911dd78ea090653a6996b7e58b8601d17107f8448b7163451d1fd0b3d79a54247fd64e3934e62d516680e2bf59040201e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
Filesize484B
MD570c77c508edb7799c04b21adc2013c61
SHA13903b5721f79b443e5e04a0b151bf6b3b5562008
SHA2566478267c4b14824a0a9d06dec611aa4c048f6bf4923588403abbcbca09c62ef4
SHA512c1b3b0cdd7188e139d7021400a668eade7400f6b7c6e9cca6af3b7aed103d663eb892f5d3052e563e0db0d72a44e9c06a6cc394ced5fbfaa1e1e2baa4600fd8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_268232F9B7ADFD0751C3D83F667CFB78
Filesize488B
MD5a3d1b53140ec83d53d9ff463d005c901
SHA1f417ab6a2eca4a1e50af1de2531e0e0b157ca1c5
SHA25623fff8b24a862f71fe72c8579f5681d924834acd64ba87b1c9cb35d3e1970c3d
SHA5126a590f03a164654a8249b356462241fa0d304db0e7bfa10eb50d8ab4f50a5776423e8d845c295f959aeb8a5ea8008f84d4843cd860d157beaa8e171e6ced2a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5919b0a1c7070e4e99389755c70dfb1ac
SHA1b3fda183eaa5db3d2dad194521d5641e8f897e2b
SHA256e68e0a4bb1d83eb26d2eb4b941bc1e6a3d206bf90b963762c97eff774511dd48
SHA51257dbce5a8df48661855c4ea5f6d224ac0e713fc1197efdd2b2f4363e00fa93478ad38d047df08bb6cb28e00cdc570d78755cd09155932dc685d3c1188a966120
-
Filesize
18KB
MD52ecbd831dd268171871be3a7341717ee
SHA1a1365aa4ddd52cc873c9def7f26aa9848db6434e
SHA25683006c3ef95cac56570e99cbcff4b7e22120eecbea5f1957cdbd7d40a52cb077
SHA5124e5ff688f7a714dbefdd3673d9ea765c5beee762de365d233efd3715e1777ffe0d966c7d382ea0d34b50ce857ad90f14b373adcd7bf43bcc925e8ebc06c882e6
-
Filesize
190B
MD56ebbeb8c70d5f8ffc3fb501950468594
SHA1c06e60a316e48f5c35d39bcf7ed7e6254957ac9e
SHA256a563426e24d132cd87b70d9cb5cd3d57c2e1428873a3f3eb94649cf42e37b6a1
SHA51275cfab1c9f5a05c892cf3b564aed06d351c6dc40048faea03ae163154ff7635252817d66b72a6ef51c4f895eebf7728f302df51148acce2a0c285502bf13652c
-
Filesize
1B
MD593b885adfe0da089cdf634904fd59f71
SHA15ba93c9db0cff93f52b521d7420e43f6eda2784f
SHA2566e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d
SHA512b8244d028981d693af7b456af8efa4cad63d282e19ff14942c246e50d9351d22704a802a71c3580b6370de4ceb293c324a8423342557d4e5c38438f0e36910ee
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2025-04-21_8981ec8170d7378709b0f9989b04a922_darkgate_elex_neshta_zeppelin.exe
Filesize211KB
MD5f42abb7569dbc2ff5faa7e078cb71476
SHA104530a6165fc29ab536bab1be16f6b87c46288e6
SHA256516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd
SHA5123277534a02435538e144dea3476416e1d9117fcddef3dcb4379b82f33516c3e87767c3b0d2b880e61a3d803b583c96d772a0bdeecbfc109fe66444e9b29216af
-
Filesize
326KB
MD50acffb8012d650608df4c2890c858e2e
SHA139cb5ec11c97431eff36553ebe47bc11c9fcf276
SHA256c33bd9fceb75009975dc73318156a181700b32ec21ffd505bb4dc55c1d3a2f7d
SHA51251e47cc46f7f701f06452bb6a26e82e724bf9a9d144ee8cc526ac1e91aed91d7d5e460c3a8b4e7c67ee68cb7f3009a31f7c0ed55a9bb4da26105fad401bc162f
-
Filesize
306KB
MD5fa666c0c27144fc52e02016572489b02
SHA128c9bcd9d0302e68c2bf3418c58abd4af8d853c9
SHA256cc48f207b79fc4e6ae55387d85af7b46a6c4470fa48eab7e19106f0e14697c42
SHA51214eb29d27c6f5409b21f8875678e3c86015f1c45f5dbcab140ac14d79228ae0084dc3e4f3e1f15704a3de4c86186f51ff19cf5dcfb0afdfb792a5389e9e29d65
-
Filesize
660KB
MD596a8d01a2af9659a0ee572b30245a088
SHA130418fb247cbfe6380af66aef639fcc1b75c8141
SHA256f41a2511309f1110f294272db2caa25299d1df35120ee67ccf3bad63b671b416
SHA51268a569d4e2b8702418576a6a401aaa3b671e45a4d8587face1794394c99d89ee3616384259d549465793d6d296caea8b9aa1072b29b4193ded0271cac4da26bd
-
Filesize
385KB
MD59fc96ccc69f2ee556c4a1e1cd944915f
SHA186c355b87579066b7fd4ae0a1ecd79408e2e52c6
SHA256070e20ff8ad4320aa2b4c49c828456b0d3f8baddc55e42dd7ddfaf5d7eeef144
SHA512598d025841e548e9b52448a728a9fb35cc829d7fcdf06a43988b62a530629bf4309f1996f8f64e5293bc41a61e09359c65422f83005465ab9c5edc1a6d4683e2
-
Filesize
964KB
MD59032a5c93528eca43c8bc3a81234f237
SHA17658665ec64c30af3274fdaa6e08110b2e10e9f9
SHA25607251095998b90c8c1d4d69413c87dd730f79c28dd10ca511cf9175004b43685
SHA5129db9b7ae7b58a4b7d1971e57f6ab06ef987e5d7b4e020f82c4e1383fdfd0564ee78b8653972bcd8340725b2828d048cf185c70293f6c0eb3d406638b8698c2c1
-
Filesize
247KB
MD5d7ad4cd4e47671805a7228994f4d2404
SHA1a861ebb75532440165db4e570f47a5b5e2ab2967
SHA25606aef5c2b384a56d9a0f9cc7ca575ed72349562a1d619fc6801a227713b788d1
SHA5123d21aa1a302862d7f10a1b4998e2c8ec51c7f157451933127c729135892196e6170497407b09c11f221df6cd036f89c60cb8a82a86729511540088d8a3da787a
-
Filesize
15KB
MD583e43afb7e35ddb127772ada3bad53ad
SHA1d1a3dc4486d8eff8254cde1bd477aa233764e210
SHA256c8758819feb020f3a5ba5f16f6736fecd9b9c48baa6c17d87003dc61cf31a694
SHA512ef4f748a244859b32f7d18746225dbca29e82c115f2d97a432a6421b10952fd4e657f13cfe801551a2336f242023eca25c0a36c1d8d57047fd7ac9deac388e7f
-
Filesize
503KB
MD5aed4d7e25473945738168b8e665849ff
SHA1afe83b7a0f6c398771fe7b45652ba3e992bb4950
SHA256c266a400e2d4ba0a89f308063a7386482b269937f172bf462c501a67488ff632
SHA5124f996bc0ee0545772287d294c38708ccf898c79bbdffe95da01a74092abff88f439f71b22f84a6b952c20e2501e333c4f258147a35ac6d9672eef9b3c796123a
-
Filesize
679KB
MD55e9fcf7eefbae550b32e08a28ef156c3
SHA13e3c0ecda544b2d1124dfe7a1f67ffc9864ab78d
SHA2563730a89290dd4f8ef3913b684b0013307c0147d2f63db6c9fad84e7addb88155
SHA5125c986a721bc492359304ee5278e77823c451ea1cf3657201208ace878c8890f077715ff8cabc57fccb10b204e8558500087d77ecbbd4520c6c3738d3153fce73
-
Filesize
365KB
MD501608c31c6fb0c8a6e048dd8669a17f7
SHA1829a35df0ce36b51fef2e286a37fe1db66810ce9
SHA2561270c45c097a1b45c87e13949dff34e49ef1f48d3bd1b2c418fabde7d4a78bb1
SHA512978ae8ec5e650e395daed03262ca4dd59fa9d1d54147b3411c0e481a98aef71b93cdf01fd3a7dff196468502c679d723661a6be65afee60210229835b2f4435f
-
Filesize
463KB
MD5122fb4c6305a30364c14eb1e8a8858c8
SHA1b74337f48d62fd54d4773af34052c53e4b4c2887
SHA2565c7670b8278986e57758f80e14b316586095991f102fbb1259272d80679f7a3c
SHA5128e18024e0f42b9939d76a0bb4045eaeac760f7c7090fa6bbb89ca1bb68e26a17e79b14189577c2459f0c3c8e890e2413b6d8622c13c831f4f85e819c5752ed09
-
Filesize
444KB
MD52b766e50958808c6f923bdd98d7a090a
SHA17e0704aa9fb52d67567de0b879420af87d13a7c9
SHA256448cb6b597199ab77a7d3fed8b87ed880d6d79755c15733642e6c3a0595d2603
SHA512a7f604bf80bcb6ffd882a07d8b153d62d22173dc11b35746f758945e50a86fdf3ec72f6a9b401e298e674120fbebef75339dfb35d3f95a1d3ae4a02cbde68caa
-
Filesize
522KB
MD54980fc6de483f0b77c223b9beb108ef1
SHA16bc22c968ea0fe1a7aaa8f9a417e0c078942313a
SHA256872fa51d0c0d91e0bbd9fcec55b1fbf1e894da01deb70e6fa12d55cb118051e5
SHA512c4eff54ecff0c91e18ce720abaebcee4803ff6d9b6cf9d49f961d53cf8b4e44328dd7140d94634397cc21cb6ac571b39e355c34bb5acdadb919af80f2c39f38a
-
Filesize
581KB
MD523ef2c4016330447cf53b90dc8388103
SHA1088cf955e68f572a3a5e1c6b6a4e09097d4ca304
SHA2567e37c8530d93ea505aca131f1545d253b7fa7330d133a2260c4bcd6d3b77e023
SHA512c1b0f27d30fcb106a658710300a7370423b04004dc39d514279169d9d540e44c67ef7712278cc4f23383f6f042b70047f38439f063cd8cb197b0a76b6190554c
-
Filesize
620KB
MD5aebe81ccddbf69e708980b0ba95a931b
SHA18640f98b5ac25f088d7a302f9550efb0ae120595
SHA25658390e0ba1510f86075580a53d37a0187ce9a064ed1d21678d409a241ca1d610
SHA51219b8cb2ab453d813ae9c28e143183e79ccac4d95382ca6aa92c2a693a0de61afaba37224d27a021895bcedd3b5fbff47b13ce0e526164edf7d30dace2c4f8cbb
-
Filesize
286KB
MD541fbc279c07730b59cee21e19cf0e995
SHA1f0bc147fa2245dca00b5ad1085bf5ff49504bd00
SHA25618a7bd39ade5ea15c4ab84b4c29a118ff8c871ea76c1f12833f89b69a411c0f1
SHA51247b7f975d6e578770c428c8c43a6d0c86f5e8a23a7de5cd77c7c2c5da73a4e23440e0256622af980d71209153f82aed0dbc8bc9ccb19707ce1e6606c5da2bc0a
-
Filesize
345KB
MD5e92e4a69706108c35d67b6f206cfdfe1
SHA17c0e640c31360ab3d1ffe6979283f00153501828
SHA256377df4b5c5d4b84436caf00dc9eead3416ffafcfb18b29c7c336c52f0fdba5b7
SHA5129bdd599d3ed7ff476a40cd480536bac483878b2e802d7c32e865d29d19ef0a1fd4846ea97f5e021b78bd5356026bd29d460ab8b8be0592391359b6ee382aff69
-
Filesize
19KB
MD552abb30dc0257e1c1095cdb2e2d3ab83
SHA155463256683d5a9d3bb4599a09c656b18c50a5ae
SHA2562c26f57b91fdf2880afacd123d3e3183122dbf59e99237a5f415b9c911892f59
SHA5121da21ea7d539d0dad304d981ca9a8267aa8f23a4963d8496e46f1843cc1de4cccd09b62dd9a750759ac2ec0260fcf058e89899b9173a315e8b224520ab040c03
-
Filesize
562KB
MD57cf4f7e9edc42dd8d80eb9218d1f632a
SHA12910ac8b6c197d4eca11e39da48e8ae164994413
SHA256b60dd832f757477dbabf5313e1eea1a306138532705099f4b73a3cf1d783e1a3
SHA5129006661918d02930f52815f933a727b487b15bcd000d112477b67dc6d31e8ec516d2235313ffe48dd9f1e787ef0835819a1234b6d0cf6ee5c305db0bd8168582
-
Filesize
601KB
MD5785e1b8f94cb325f21f394f4d99dfdab
SHA1c1f1beeb3bfd075cc2ed61a447968192d16139ba
SHA25629accf0c05521a54354297bd45a450116b01394948e9710f2ef7586b3a6849b5
SHA5126e86adc1014d09bd7b991eb036331c8a0bdcde1f0cfe02a5540a7a73c8d253161fa645c84d70c37a87e3b0d926242849d26c0d23b79e869e9412cdca01709bdd
-
Filesize
267KB
MD5250e75d89f35ab8af09fad78a57b3c95
SHA1469970d71698e68d108b869b21092f89ecf47cb8
SHA2563cdf0d59acc2986d3323af73a9c16832cc1b27f39ba337acbb4baafaf4c01ca4
SHA51259c9f9f4580755101ac3e1ba918a0986422516fa00a8b13468c07b6716a4642d1ff819fb99e1f23b59ac8ce375156f301016d0ba7af978e1f3812c1c3f821afb
-
Filesize
542KB
MD5c2ed08ac9364ae71d9bb406b038ef0a7
SHA1ae6c561ddc05a138a4383a408b187d93acb155a4
SHA2567e15d7ab15df8aefbb0f19a7671f8063515bb7fc3ffb7a771055ffcdbf975204
SHA512b82581bdfb5d7407610b0575ffd866ca82534e037c91ccc1ab79f0a5b73226967fe6859b689fe0cab520597cbb46c6ad7736789fa5ee2f4856fc5a1af2597b16
-
Filesize
404KB
MD53d9a719bc21dd465176064f659a94c11
SHA1687182933c91cb37c75794b21516995ba4b8b167
SHA256d303a7e0e74a138ec48d6258813752969faa9f873694031c183da9db1d84ecc6
SHA512eb878ccca45f140c77ee9b30b28852aa9872cc50333f96e484ffd0c94f402eff01300ef4528f99d19b0a12721c5282ef47ac70d7b3b311ccb49a4ecc875fc1a4
-
Filesize
20KB
MD5890bb3cafb149dde37af1a28992b0d0d
SHA17101d1cd54acfcb4f63d306745643b64caaa2bd5
SHA2562a9dffa1b1e75c4d05454902ba4d5d594c1bcbaa6410ca8238947fee1e73bbc5
SHA51250ca21534b50cf1e8a0ba0b7f4f668d43a671b3e161bd90580bcde574101125f2c9ef6261d5cd6e1131803723d784816a4ac299dcdee21c1c66a8b95cfeaca8f
-
Filesize
699KB
MD589cd7e4582bbb84796b9be1e32dc6396
SHA15b4ac5af8f8c018494f9ad4cc6d56da6586c68cd
SHA256fc23cc369be346fe3b6368c4bbbdcbbdc2d84cef8f685adc9a6196b6ee83987b
SHA5120b3150d13a2277131f52f34e10e17be215aa2cd1998ecc47d6c782b7534be3dd2f11e7a839dd3adfcf42f026f619a66180713beb23d57abe6f9beaf48332c7dd
-
Filesize
483KB
MD5bd228f859deb5cbfbbb16e22d0dbc6ed
SHA131256f566080f394a20c85fc69e9ca6eb54c078b
SHA256fd41847aaf8765cc1fb6715cf372ece6f2de68dfd83da33d7a44a37ca79d93b6
SHA5120ca9d34c8768c136747ef4d6de696db4da0ca9dac0e82ae3c5ed154cca1cbcd22ec0a7e144a2130e4d0a9cdf586ad605be0bbfb7ee4b326fe28e0b1010d4a4a1
-
Filesize
424KB
MD5aa29d7cc0c2c46a06e80ff7ee2b25b7f
SHA12544c8ad75ffdc42ce0821dd63988e205c23e538
SHA256d3a7826d0f8028f9a55e3a77dd7aab714b7af992cf71283155c1fb187a42d8f3
SHA512ab74f4ab675d36855097bc373e7e506dc1974c5813dd0ebcecbc00024c73fcbe7efc9981fe16ca837bf8731dd9f8b954003b67df8f9850f597d699113774a07d