{"id":18631,"date":"2022-03-30T12:40:06","date_gmt":"2022-03-30T20:40:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/03\/30\/news-12364\/"},"modified":"2022-03-30T12:40:06","modified_gmt":"2022-03-30T20:40:06","slug":"news-12364","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/03\/30\/news-12364\/","title":{"rendered":"New Milestones for Deep Panda: Log4Shell and Digitally Signed Fire Chili Rootkits"},"content":{"rendered":"<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12\">\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\"><\/div>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2><a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs.html?utm_source=blog&amp;utm_medium=campaign&amp;utm_campaign=FortiGuardLabs\">FortiGuard Labs<\/a>\u00a0Research<\/h2>\n<p><b>Affected Platforms: <\/b>Windows<br \/> <b>Impacted Users: <\/b>Windows Users<br \/> <b>Impact: <\/b>Collects sensitive information from victim machines<br \/> <b>Severity Level:<\/b> Critical <\/p>\n<p>During the past month, FortiEDR detected a campaign by Deep Panda, a Chinese APT group. The group exploited the infamous <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228\" target=\"_blank\">Log4Shell<\/a> vulnerability in VMware Horizon servers. The nature of targeting was opportunistic insofar that multiple infections in several countries and various sectors occurred on the same dates. The victims belong to the financial, academic, cosmetics, and travel industries.<\/p>\n<p>Following exploitation, Deep Panda deployed a backdoor on the infected machines. Following forensic leads from the backdoor led us to discover a novel kernel rootkit signed with a stolen digital certificate. We found that the same certificate was also used by another Chinese APT group, named Winnti, to sign some of their tools.<\/p>\n<p>In this blog, we share our analysis of the flow of infection, the backdoor, and new rootkit, along with our attribution of this campaign to these Chinese nation-state threat actors.<\/p>\n<h2>Chain of Attack<\/h2>\n<p>While examining customer alerts and telemetry, we noticed several infiltrations into victim networks that were achieved via a Log4Shell exploitation of vulnerable VMware Horizon servers. These attacks spawned a new PowerShell process to download and execute a chain of scripts that ended with the installation of a malicious DLL.\u00a0<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--7 aem-GridColumn--offset--default--3\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\/_jcr_content\/root\/responsivegrid\/image.img.jpeg\/1648592108349\/img1.jpeg\" alt=\"Figure 1: Flow of events from Log4Shell exploitation to execution of the final payload\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 1: Flow of events from Log4Shell exploitation to execution of the final payload<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The encoded PowerShell command downloads another PowerShell script from a remote server and executes it.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn aem-GridColumn--default--12\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\/_jcr_content\/root\/responsivegrid\/image_818968596.img.png\/1648592141440\/fig2.png\" alt=\"Figure 2: The decoded PowerShell command\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 2: The decoded PowerShell command<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The next stage PowerShell script downloads three additional files from the same server: <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">1.bat<\/span><span style=\"font-family: Calibri , sans-serif;\">, <\/span><span style=\"font-family: &quot;Courier New&quot;;\">syn.exe<\/span><\/span> and <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">1.dll<\/span><\/span>.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\/_jcr_content\/root\/responsivegrid\/image_592041026.img.png\/1648592170922\/fig3.png\" alt=\"Figure 3: Content of the p.txt PowerShell script downloaded from the server\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 3: Content of the p.txt PowerShell script downloaded from the server<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The script then executes <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">1.bat<\/span><\/span>, which in turn executes <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">syn.exe<\/span><\/span> and proceeds to delete all three files from the disk.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--offset--default--4 aem-GridColumn--default--4\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\/_jcr_content\/root\/responsivegrid\/image_1581523226.img.png\/1648592211204\/fig4.png\" alt=\"Figure 4: Content of 1.bat script downloaded from the server\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 4: Content of 1.bat script downloaded from the server<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">syn.exe<\/span><\/span> is a program that loads its first command-line argument using <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">LoadLibrary<\/span><\/span>, in this case, <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">1.dll<\/span><\/span>. The <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">1.dll<\/span><\/span> module is the final payload, a backdoor that we have dubbed Milestone. Its code is based on the leaked source code of\u00a0<a href=\"https:\/\/github.com\/sin5678\/gh0st\" target=\"_blank\">Gh0st RAT<\/a>\/Netbot Attacker and is packed with Themida.<\/p>\n<p>The backdoor copies itself to <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">%APPDATA%newdev.dll<\/span><\/span> and creates a service named <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">msupdate2\u00a0<\/span><\/span>by creating the service entry directly in the registry. Several other service names and descriptions have been observed among different samples.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\/_jcr_content\/root\/responsivegrid\/image_1347657128.img.png\/1648592264213\/fig5.png\" alt=\"Figure 5: \u201cmsupdate2\u201d service registered by Milestone\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 5: \u201cmsupdate2\u201d service registered by Milestone<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>While it has the same name as the legitimate Microsoft <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">newdev.dll<\/span><\/span>, it has only two of the real <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">newdev.dll&#8217;s<\/span><\/span> exports plus an additional <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">ServiceMain\u00a0<\/span><\/span>export.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\/_jcr_content\/root\/responsivegrid\/image_1821554724.img.png\/1648592289844\/img6.png\" alt=\"Figure 6: Exports of the malicious Milestone\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 6: Exports of the malicious Milestone<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Overall, the backdoor has capabilities similar to Gh0st RAT\u2019s, with notable differences. Its C2 communication is uncompressed, unlike Gh0st RAT communication which is zlib-compressed. There are differences in commands as well. For example, in the CMD command, some variants first copy<span style=\"font-size: 12.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">\u00a0<\/span><span style=\"font-family: &quot;Courier New&quot;;\">cmd.exe<\/span><\/span> to <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">dllhost.exe<\/span><\/span> to avoid detection by security products that monitor CMD executions. Additionally, the backdoor supports a command that sends information about the current sessions on the system to the server. This command does not exist in the original Gh0st RAT source code.<\/p>\n<p>Among the many backdoor samples we hunted down, there are two distinguishable versions: binaries compiled in 2016 contain the version string <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">MileStone2016<\/span><\/span>, while those compiled in 2017 contain <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">MileStone2017<\/span><\/span>. The samples used in the recent infections we detected are only the 2017 variants.<\/p>\n<p>There are several differences between the 2016 and 2017 Milestones. First, 2017 Milestones are typically packed with Themida, while 2016 ones are unpacked. Secondly, although 2016 Milestones have plausible timestamps, all 2017 Milestones share an identical timestamp, which leads us to believe they are forged. Combined with the fact that 2017 backdoors are used in attacks to this day, it is uncertain whether they were compiled in 2017 or much later.<\/p>\n<p>The two versions also slightly differ in commands and communication. 2016 Milestones apply XOR encryption to their communication, as well as support a command to execute as a new user with administrator privileges. To do so, the backdoor first creates a new administrator user on the system, with the username <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">ANONYMOUS<\/span><\/span> and the password <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">MileSt0ne2@16<\/span><\/span>. It then executes another instance of itself as that user with <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">CreateProcessAsUser\u00a0<\/span><\/span>and proceeds to remove the user from the system immediately thereafter.<\/p>\n<h2>A Stone\u2019s Throw Away<\/h2>\n<p>In addition to the backdoors, we obtained a third type of sample \u2013 a dropper. It writes three files to the disk:<\/p>\n<ul>\n<li>Benign executable \u2013 <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">%APPDATA%syn.exe<\/span><\/span><\/li>\n<li>Milestone loader \u2013 <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">%APPDATA%newdev.dll<\/span><\/span><\/li>\n<li>Driver \u2013 <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">C:Windowssystem32driverscrtsys.sys<\/span><\/span><\/li>\n<\/ul>\n<p>The payloads above are stored XOR-encrypted and LZMA-compressed. The XOR key is a hardcoded DWORD that changes between samples.<\/p>\n<p>The dropper carries two builds of the driver for 32-bit and 64-bit systems. Using the Service Control Manager (SCM) API, it installs the build compliant with the operating system architecture as a driver named <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">FSFilter-Min<\/span><\/span>.<\/p>\n<p>The dropper patches the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">.data<\/span><\/span> section of the loader binary to add its configuration before it writes it to disk. Next, the dropper executes\u00a0<span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">syn.exe<\/span><\/span>, a benign executable signed by Synaptics, in order to side-load the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">newdev.dll<\/span><\/span> loader module.<\/p>\n<p>The loader also contains a XOR-encrypted and LZMA-compressed payload, which is a Milestone backdoor. It decrypts the configuration with <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">XOR 0xCC<\/span><\/span> \u200b\u200b\u200b\u200b\u200b\u200b\u200b and, like the dropper, patches the backdoor\u2019s <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">.data<\/span><\/span> section with it. The configuration contains the backdoor\u2019s version, C2 server address and service parameters.<\/p>\n<p>Finally, the loader reflectively loads the Milestone backdoor and calls its exports.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\/_jcr_content\/root\/responsivegrid\/image_907694491.img.png\/1648592324624\/fig7.png\" alt=\"Figure 7: Example of a decrypted configuration\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 7: Example of a decrypted configuration<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2>Fire Chili Rootkit<\/h2>\n<p>As part of our research, we have collected four driver samples \u2014 two pairs of 32-bit and 64-bit samples. One pair was compiled in early August 2017 and the second pair was compiled ten days later. All four driver samples are digitally signed with stolen certificates from game development companies, either the US-based Frostburn Studios or the Korean 433CCR Company (433\uc528\uc528\uc54c \uc8fc\uc2dd\ud68c\uc0ac). The signatures made with Frostburn Studios\u2019 certificate are even timestamped.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\/_jcr_content\/root\/responsivegrid\/image_540717795.img.jpeg\/1648592370458\/fig8.jpeg\" alt=\"Figure 8: Digital signature of a crtsys.sys driver\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 8: Digital signature of a crtsys.sys driver<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Two of the samples are on VirusTotal and have a very low detection rate.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\/_jcr_content\/root\/responsivegrid\/image_697338576.img.png\/1648592418192\/img9.1.png\" alt=\"Figure 9: Detection rates of the rootkit samples from VirusTotal\"\/>         <\/noscript>                   <\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\/_jcr_content\/root\/responsivegrid\/image_1007668414.img.png\/1648592448331\/9.2.png\" alt=\"Figure 9: Detection rates of the rootkit samples from VirusTotal\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 9: Detection rates of the rootkit samples from VirusTotal<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The rootkit starts by ensuring the victim machine is not running in safe mode. It then checks the operating system version. The rootkit uses Direct Kernel Object Modification (DKOM), which involves undocumented kernel structures and objects, for its operations. For this reason, it relies on specific OS builds as otherwise it may cause the infected machine to crash. In general, the latest supported build is Windows 10 Creators Update (Redstone 2), released in April 2017.<\/p>\n<p>The purpose of the driver is to hide and protect malicious artifacts from user-mode components. This includes four aspects: files, processes, registry keys and network connections. The driver has four global lists, one for each aspect, that contain the artifacts to hide. The driver\u2019s IOCTLs allow dynamic configuration of the lists through its control device <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">Devicecrtsys<\/span><\/span>. As such, the dropper uses these IOCTLs to hide the driver\u2019s registry key, the loader and backdoor files, and the loader process.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn--default--none aem-GridColumn--default--9 aem-GridColumn aem-GridColumn--offset--default--3\">      <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h5>Files<\/h5>\n<p>The rootkit implements a filesystem minifilter using code based on Microsoft\u2019s official driver code samples. Prior to registering the minifilter instance, it dynamically creates an instance in the registry named <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">Sfdev32TopInstance\u00a0<\/span><\/span>with altitude <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">483601<\/span><\/span>.<\/p>\n<p>The rootkit sets only one callback for a postoperation routine for <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">IRP_MJ_DIRECTORY_CONTROL<\/span><\/span>. When it receives an IRP with a minor function of <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">IRP_MN_QUERY_DIRECTORY<\/span><\/span> and a filename from the global file list, the callback changes the filename to \u201c.\u201d and the filename length to 0 (in the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">FILE_BOTH_DIR_INFORMATION<\/span><\/span> structure).<\/p>\n<p>The global file list is initialized with the path of the driver by default (<span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">*SYSTEM32DRIVERSCRTSYS.SYS<\/span><\/span>).<\/p>\n<h5>Processes<\/h5>\n<p>There are two mechanisms pertaining to processes:<\/p>\n<ul>\n<li>Preventing process termination.<\/li>\n<li>Hiding a process.<\/li>\n<\/ul>\n<p>To prevent the termination of a process, the rootkit denies the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">PROCESS_TERMINATE<\/span><\/span> access right of the processes it protects. Using <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">ObRegisterCallbacks<\/span><\/span>, it registers a preoperation callback routine that triggers whenever a handle to a process or thread is created or duplicated in the system. When the handle access originates from user-mode and the image path or PID of the handle target are in the global process list, the driver removes the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">PROCESS_TERMINATE<\/span><\/span> permission from the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">DesiredAccess<\/span><\/span> parameter. This results in restricting user-mode processes from acquiring the permissions needed to terminate the threat actor\u2019s malicious processes using standard APIs.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\/_jcr_content\/root\/responsivegrid\/image_1226590469.img.png\/1648592490338\/fig10.png\" alt=\"Figure 10: Unsetting the PROCESS_TERMINATE bit of DesiredAccess\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 10: Unsetting the PROCESS_TERMINATE bit of DesiredAccess<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>To hide a process, the rootkit monitors all newly created processes on the system by registering a callback using the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">PsSetCreateProcessNotifyRoutine<\/span><\/span> API. Whenever a new process is created on the system, the rootkit checks if its path is in the global process list. If so, the process is removed from the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">ActiveProcessLinks<\/span><\/span> list of the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">EPROCESS<\/span><\/span> structure, which is a circular doubly-linked list of all running processes on the system. The driver removes the process\u2019s list entry from <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">ActiveProcessLinks<\/span><\/span> \u200b\u200b\u200b\u200b\u200b\u200b\u200bby linking its Flink (the next entry) to its Blink (the previous entry). As a result, the process is hidden from utilities such as Task Manager.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\/_jcr_content\/root\/responsivegrid\/image_27980676.img.jpeg\/1648592519015\/fig11.jpeg\" alt=\"Figure 11: Removing a process from ActiveProcessLinks\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 11: Removing a process from ActiveProcessLinks<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Since the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">EPROCESS<\/span><\/span> structure changes between Windows builds, the rootkit resolves the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">ActiveProcessLinks<\/span><\/span> offset dynamically during runtime. It traverses the process\u2019s <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">EPROCESS<\/span><\/span> \u200b\u200b\u200b\u200b\u200b\u200b\u200bstructure, comparing each member to its PID, to locate the offset of the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">UniqueProcessId\u00a0<\/span><\/span>field. When found, the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">ActiveProcessLinks<\/span><\/span> offset is also easily located as it is the next field in the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">EPROCESS<\/span><\/span> structure. The older rootkit samples use the hiding mechanism on Windows 8 and below, while the newer samples use it on only Windows 7 and below.<\/p>\n<p>By default, the global process list is initialized with the path <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">*qwerty.exe<\/span><\/span>. However, we have not observed any file with this name related to the campaign.<\/p>\n<h5>Registry Keys<\/h5>\n<p>The rootkit hides registry keys from users using Microsoft\u2019s Registry Editor. The code is based on an open-source\u00a0<a href=\"https:\/\/github.com\/geemion\/Record\/blob\/master\/HideReg.c\" target=\"_blank\">project<\/a>\u00a0published by a Chinese developer.<\/p>\n<p>The <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">HHIVE-&gt;GetCellRoutine<\/span><\/span> functions of keys in the global registry keys list are replaced with a filter function. When the path of the querying process is <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">*WINDOWSREGEDIT.EXE<\/span><\/span>, the function simply returns 0 in place of the key node.<\/p>\n<p>By default, the global registry list is initialized with the rootkit\u2019s registry key <span style=\"font-size: 12.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">(<\/span><span style=\"font-family: &quot;Courier New&quot;;\">REGISTRYMACHINESYSTEMCURRENTCONTROLSETSERVICESCRTSYS<\/span><span style=\"font-family: Calibri , sans-serif;\">)<\/span><\/span>.<\/p>\n<h5>Network Connections<\/h5>\n<p>The rootkit is capable of hiding TCP connections from tools such as netstat. Much of the code for this part seems to be copied from an open-source\u00a0<a href=\"https:\/\/github.com\/bowlofstew\/rootkit.com\/blob\/master\/cardmagic\/PortHidDemo_Vista.c\" target=\"_blank\">project<\/a>.<\/p>\n<p>The rootkit attaches to <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">nsiproxy.sys<\/span><span style=\"font-family: Calibri , sans-serif;\">\u2019s<\/span><\/span> device stack and intercepts IOCTLs of type <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">IOCTL_NSI_GETALLPARAM<\/span><\/span> <span style=\"font-size: 12.0pt;\"><span style=\"font-family: Calibri , sans-serif;\">(<\/span><span style=\"font-family: &quot;Courier New&quot;;\">0x12000B<\/span><span style=\"font-family: Calibri , sans-serif;\">)<\/span><\/span> that are sent to it. This IOCTL is used to retrieve information about the active network connections on the system. When it is intercepted, the driver replaces the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">IoCompletion<\/span><\/span> routine with a function that filters the results to hide its own network connections.<\/p>\n<p><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">IOCTL_NSI_GETALLPARAM<\/span><\/span> returns the information about network connections in an <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">NSI_PARAM<\/span><\/span> structure. <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">NSI_PARAM<\/span><\/span> contains connection data such as IP, port, connection state, and process IDs of the executables in charge of creating the connection. The filter function iterates this structure, searching for connections involving a process or port number from its global network list. All identified connections are removed from the structure, rendering them hidden from the process that sent the IOCTL. It is interesting to note that the newer build of the 64-bit rootkit added support to filter IOCTLs from 32-bit processes as well.<\/p>\n<p>If attaching to <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">nsiproxy.sys<\/span><\/span> fails, the rootkit attaches to <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">DeviceTcp<\/span><\/span> instead, intercepting <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">IOCTL_TCP_QUERY_INFORMATION_EX<\/span><\/span> <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">(0x120003)<\/span><\/span> and hiding network connections in a similar manner.<\/p>\n<p>By default, the global network list is initialized with the following process paths:<\/p>\n<ul>\n<li><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">*SYN.EXE<\/span><\/span><\/span><\/span><\/li>\n<li><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">*SVCHOST.EXE<\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<p>As a result, TCP connections of all services running under svchost.exe are hidden, not just the ones of the Milestone backdoor.<\/p>\n<h2>Attribution<\/h2>\n<p>The Milestone backdoor is actually the same Infoadmin RAT that was used by Deep Panda back in the early 2010s, referenced in blogs from\u00a0<a href=\"https:\/\/paper.seebug.org\/papers\/APT\/APT_CyberCriminal_Campagin\/2014\/AdversaryIntelligenceReport_DeepPanda_0%20%281%29.pdf\" target=\"_blank\">2013<\/a>\u00a0and\u00a0<a href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2015\/02\/FBI-Flash-Warning-Deep-Panda.pdf\" target=\"_blank\">2015<\/a>. Although many backdoors are based on Gh0st RAT code, Milestone and Infoadmin are distinguishable from the rest. Besides having profoundly similar code, both backdoors incorporate identical modifications of Gh0st RAT code not seen in other variants.<\/p>\n<p>Both backdoors share a XOR encryption function for encrypting communication and have abandoned the zlib compression of the original Gh0st RAT. Both also modified Gh0st RAT code in an identical way, specifically the CMD and screen capture functions. Moreover, the backdoors share two commands that are not present in other Gh0st RAT variants: the session enumeration command and the command to execute as an administrative user.<\/p>\n<p>Additional evidence indicates affiliation to Winnti. The rootkits are digitally signed with certificates stolen from game development companies, which is a known characteristic of Winnti. Searching for more files signed with one of the certificates led to a malicious DLL uploaded to VirusTotal with the name <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">winmm.dll<\/span><\/span>. Further examination revealed it as the same tool referenced in a blog about Winnti that was published in\u00a0<a href=\"https:\/\/securelist.com\/winnti-1-0-technical-analysis\/37002\/\" target=\"_blank\">2013<\/a>. Yet another connection to Winnti is based on a C2 domain. Two of the <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">newdev.dll<\/span><\/span> loaders are configured with the server <span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Courier New&quot;;\">gnisoft[.]com<\/span><\/span>, which was attributed to Winnti in\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2020\/05\/21\/no-game-over-winnti-group\/\" target=\"_blank\">2020<\/a>.<\/p>\n<h2>Conclusion<\/h2>\n<p>In this blog, we have attributed a series of opportunistic Log4Shell infections from the past month to Deep Panda. Though previous technical publications on Deep Panda were published more than half a decade ago, this blog also relates to a more recent\u00a0<a href=\"https:\/\/www.ahnlab.com\/kr\/site\/securityinfo\/secunews\/secuNewsView.do?menu_dist=2&amp;seq=29904\" target=\"_blank\">report<\/a>\u00a0about the Milestone backdoor, which shows that their operations have continued throughout all these years.<\/p>\n<p>Furthermore, we introduced the previously unknown Fire Chili rootkit and two compromised digital signatures, one of which we also directly linked to Winnti. Although both Deep Panda and Winnti are known to use rootkits as part of their toolset, Fire Chili is a novel strain with a unique code base different from the ones previously affiliated with the groups.<\/p>\n<p>The reason these tools are linked to two different groups is unclear at this time. It\u2019s possible that the groups\u2019 developers shared resources, such as stolen certificates and C2 infrastructure, with each other. This may explain why the samples were only signed several hours after being compiled.<\/p>\n<h2>Fortinet Solutions<\/h2>\n<p>FortiEDR detects and blocks these threats out-of-the-box without any prior knowledge or special configuration. It does this using its post-execution prevention engine to identify malicious activities:<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn aem-GridColumn--default--12\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\/_jcr_content\/root\/responsivegrid\/image_1902735513.img.png\/1648592573579\/fig12.png\" alt=\"Figure 12: FortiEDR blocking communication for download &amp; execute after Log4Shell exploitation\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 12: FortiEDR blocking communication for download &amp; execute after Log4Shell exploitation<\/span>         <\/div>\n<div class=\"cmp cmp-image aem-GridColumn aem-GridColumn--default--12\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\/_jcr_content\/root\/responsivegrid\/image_833210946.img.png\/1648592586628\/fig13.png\" alt=\"Figure 13: FortiEDR blocking the backdoor from communicating with the C2 post-infection\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 13: FortiEDR blocking the backdoor from communicating with the C2 post-infection<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>All network IOCs have been added to the FortiGuard WebFiltering blocklist.<\/p>\n<p>The FortiGuard Antivirus service engine is included in Fortinet\u2019s FortiGate, FortiMail, FortiClient, and FortiEDR solutions. FortiGuard Antivirus has coverage in place as follows:<\/p>\n<p style=\"margin-left: 40.0px;\">W32\/Themida.ICD!tr<br \/> BAT\/Agent.6057!tr<br \/> W64\/Agent.A10B!tr<br \/> W32\/Agent.0B37!tr<br \/> W32\/GenKryptik.FQLT!tr<br \/> W32\/Generic.AC.F834B!tr<br \/> W32\/GenKryptik.ATCY!tr<br \/> W32\/Generic.AP.33C2D2!tr<br \/> W32\/GenKryptik.AQZZ!tr<br \/> W32\/Generic.HCRGEJT!tr<br \/> W32\/Agent.DKR!tr<br \/> W32\/Agent.QNP!tr<br \/> W32\/Agent.RXT!tr<br \/> W32\/Agentb.BXIQ!tr<br \/> W32\/Agent.DA3E!tr<br \/> W32\/Agent.D584!tr<br \/> W32\/Agent.0F09!tr<br \/> W32\/Agent.3385!tr<br \/> W64\/Agent.D87B!tr.rkit<br \/> W32\/Agent.69C1!tr.rkit<\/p>\n<p>In addition, as part of our membership in the Cyber Threat Alliance, details of this threat were shared in real-time with other Alliance members to help create better protections for customers.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2>Appendix A: MITRE ATT&amp;CK Techniques<\/h2>\n<table cellspacing=\"0\" class=\"Table\" style=\"border: none;width: 624.0px;\">\n<tbody>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: 1.0px solid black;vertical-align: top;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><u><span style=\"font-size: 12.0pt;\">ID<\/span><\/u><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: 1.0px solid black;vertical-align: top;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><u><span style=\"font-size: 12.0pt;\">Description<\/span><\/u><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">T1190<\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">Exploit Public-Facing Application<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">T1569.002<\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">System Services: Service Execution<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">T1059.001<\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;vertical-align: top;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">Command and Scripting Interpreter: PowerShell<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">T1027<\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">Obfuscated Files or Information:\u00a0Software Packing<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">T1041<\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">Exfiltration Over C2 Channel<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">T1082<\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">System Information Discovery<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">T1036<\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">Masquerading<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">T1083<\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">File and Directory Discovery<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">T1059.003<\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">Command and Scripting Interpreter: Windows Command Shell<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">T1592<\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">Gather Victim Host Information<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">T1588.003<\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">Obtain Capabilities: Code Signing Certificates<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">T1014<\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">Rootkit<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">T1574.002<\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">Hijack Execution Flow: DLL Side-Loading<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">T1620<\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">Reflective Code Loading<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1.0px solid black;border-left: 1.0px solid black;border-right: 1.0px solid black;border-top: none;width: 187.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">T1113<\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"border-bottom: 1.0px solid black;border-left: none;border-right: 1.0px solid black;border-top: none;width: 437.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\">Screen Capture<\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Appendix B: IOCs<\/h2>\n<table cellspacing=\"0\" class=\"MsoTable15Plain4\" style=\"width: 639.0px;\">\n<tbody>\n<tr>\n<td style=\"background-color: rgb(217,226,243);vertical-align: top;width: 416.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 14.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">IOC<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(217,226,243);vertical-align: top;width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 14.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Type<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(217,226,243);vertical-align: top;width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 14.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Details<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">ece45c25d47ba362d542cd0427775e68396bbbd72fef39823826690b82216c69<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">517c1baf108461c975e988f3e89d4e95a92a40bd1268cdac385951af791947ba<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">a573a413cbb1694d985376788d42ab2b342e6ce94dd1599602b73f5cca695d8f<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">9eeec764e77bec58d366c2efc3817ed56371e4b308e94ad04a6d6307f2e12eda<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">d005a8cf301819a46ecbb1d1e5db0bf87951808d141ada5e13ffc4b68155a112<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">69c69d71a7e334f8ef9d47e7b32d701a0ecd22ce79e0c11dabbc837c9e0fedc2<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">dfd2409f2b0f403e82252b48a84ff4d7bc3ebc1392226a9a067adc4791a26ee7<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">07c87d036ab5dca9947c20b7eb7d15c9434bb9f125ac564986b33f6c9204ab47<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">c0a2a3708516a321ad2fd68400bef6a3b302af54d6533b5cce6c67b4e13b87d3<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">f8b581393849be5fc4cea22a9ab6849295d9230a429822ceb4b8ee12b1d24683<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">14930488158df5fca4cba80b1089f41dc296e19bebf41e2ff6e5b32770ac0f1e<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">a9fa8e8609872cdcea241e3aab726b02b124c82de4c77ad3c3722d7c6b93b9b5<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">e92d4e58dfae7c1aadeef42056d5e2e5002814ee3b9b5ab1a48229bf00f3ade6<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">855449914f8ecd7371bf9e155f9a97969fee0655db5cf9418583e1d98f1adf14<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">a5fd7e68970e79f1a5514630928fde1ef9f2da197a12a57049dece9c7451ed7b<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">f5eb8949e39c8d3d70ff654a004bc8388eb0dd13ccb9d9958fd25aee47c1d3ae<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">64255ff02e774588995b203d556c9fa9e2c22a978aec02ff7dea372983b47d38<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">b598cb6ba7c99dcf6040f7073fe313e648db9dd2f6e71cba89790cc45c8c9026<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">2d252c51a29f86032421df82524c6161c7a63876c4dc20faffa47929ec8a9d60<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">2de6fb71c1d5ba0cd8d321546c04eaddddbf4a00ce4ef6ca6b7974a2a734a147<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">bd5d730bd204abaddc8db55900f307ff62eaf71c0dc30cebad403f7ce2737b5c<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">412464b25bf136c3780aff5a5a67d9390a0d6a6f852aea0957263fc41e266c8b<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">0d096d983d013897dbe69f3dae54a5f2ada8090b886ab68b74aa18277de03052<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">cfba16fa9aa7fdc7b744b2832ef65558d8d9934171f0d6e902e7a423d800b50f<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">a71b3f06bf87b40b1559fa1d5a8cc3eab4217f317858bce823dd36302412dabc<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">235044f58c801955ed496f8c84712fdb353fdd9b6fda91886262234bdb710614<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">e1a51320c982179affb26f417fbbba7e259f819a2721ab9eb0f6d665b6ea1625<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">d1be98177f8ae2c64659396277e7d5c8b7dba662867697feb35282149e3f3cbb<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">ab3470a45ec0185ca1f31291f69282c4a188a46e<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA1<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">10de515de5c970385cd946dfda334bc10a7b2d65<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA1<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">eb231f08cce1de3e0b10b69d597b865a7ebac4b3<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA1<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">66c3dfcb2cc0dfb60e40115e08fc293276e915c2536de9ed6a374481279b852b<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Loader<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">73640e8984ad5e5d9a1fd3eee39ccb4cc695c9e3f109b2479296d973a5a494b6<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Loader<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">7777bd2bdeff2fd34a745c350659ee24e330b01bcd2ee56d801d5fc2aceb858c<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Loader<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">8bf4e301538805b98bdf09fb73e3e370276a252d132e712eae143ab58899763e<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Loader<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">18b2e1c52d0245824a5bac2182de38efb3f82399b573063703c0a64252a5c949<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Loader<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">d5c1a2ca8d544bedb0d1523db8eeb33f0b065966f451604ff4715f600994bc47<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">ZIP<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">0939b68af0c8ee28ed66e2d4f7ee6352c06bda336ccc43775fb6be31541c6057<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">BAT<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">0595a719e7ffa77f17ac254134dba2c3e47d8c9c3968cda69c59c6b021421645<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Dropper<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">7782fdc84772c6c5c505098707ced6a17e74311fd5c2e2622fbc629b4df1d798<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Dropper<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">18751e47648e0713345552d47752209cbae50fac07895fc7dd1363bbb089a10b<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Driver 64-bit<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">e4e4ff9ee61a1d42dbc1ddf9b87223393c5fbb5d3a3b849b4ea7a1ddf8acd87b<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Driver 64-bit<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">395dbe0f7f90f0ad55e8fb894d19a7cc75305a3d7c159ac6a0929921726069c1<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Driver 32-bit<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">befc197bceb3bd14f44d86ff41967f4e4c6412604ec67de481a5e226f8be0b37<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Driver 32-bit<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">1c617fd9dfc068454e94a778f2baec389f534ce0faf786c7e24db7e10093e4fb<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Legitimate Synaptics Setup.exe<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">bde7b9832a8b2ed6d33eb33dae7c5222581a0163c1672d348b0444b516690f09<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">syn.exe<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">8b88fe32bd38c3415115592cc028ddaa66dbf3fe024352f9bd16aed60fd5da3e<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">syn.exe<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">ba763935528bdb0cc6d998747a17ae92783e5e8451a16569bc053379b1263385<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">syn.exe<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">9908cb217080085e3467f5cedeef26a10aaa13a1b0c6ce2825a0c4912811d584<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">syn.exe<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">c6bcde5e8185fa9317c17156405c9e2c1f1887d165f81e31e24976411af95722<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">winmm.dll<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);vertical-align: top;width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">3403923f1a151466a81c2c7a1fda617b7fbb43b1b8b0325e26e30ed06b6eb936<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">SHA256<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Backdoor<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">9BCD82563C72E6F72ADFF76BD8C6940C6037516A<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Certificate thumbprint<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);width: 416.0px;\">\n<p style=\"text-align: justify;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: Consolas;\">2A89C5FD0C23B8AF622F0E91939B486E9DB7FAEF<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Certificate thumbprint<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">192.95.36[.]61<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Network<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\"><span style=\"color: black;\">vpn2.smi1egate[.]com<\/span><\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Network<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">svn1.smi1egate[.]com<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Network<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">giga.gnisoft[.]com<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Network<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">giga.gnisoft[.]com<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Network<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">104.223.34[.]198<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Network<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">103.224.80[.]76<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Network<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">hxxp:\/\/104.223.34[.]198\/111.php<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Network<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">hxxp:\/\/104.223.34[.]198\/1dll.php<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Network<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">hxxp:\/\/104.223.34[.]198\/syn.php<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Network<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">hxxp:\/\/104.223.34[.]198\/p.txt<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Network<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">msupdate2<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Service name<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">WebService<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Service name<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">alg<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Service name<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">msupdate<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Service name<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">msupdateday<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Service name<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">DigaTrack<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">Service name<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">crtsys.sys<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">File name<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">%APPDATA%syn.exe<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">File name<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: rgb(242,242,242);width: 416.0px;\">\n<p><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">%APPDATA%newdev.dll<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 94.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">File name<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<td style=\"background-color: rgb(242,242,242);width: 129.0px;\">\n<p style=\"text-align: center;\"><span style=\"font-size: 11.0pt;\"><span style=\"font-family: Calibri , sans-serif;\"><span style=\"font-size: 12.0pt;\"><span style=\"font-family: &quot;Calibri Light&quot; , sans-serif;\">&#8211;<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p><i>Learn more about Fortinet\u2019s <a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?utm_source=blog&amp;utm_campaign=fortiguard-labs\">FortiGuard Labs<\/a> threat research and intelligence organization and the FortiGuard Security Subscriptions and Services <a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?tab=security-bundles&amp;utm_source=blog&amp;utm_campaign=security-bundles\">portfolio<\/a>.<\/i><\/p>\n<\/p><\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\">\n<div id=\"om-b2dxtopzidsdt3fkzfsv-holder\"><\/div>\n<\/div><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/fortinet\/blog\/threat-research<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"\/blog\/threat-research\/deep-panda-log4shell-fire-chili-rootkits\/_jcr_content\/root\/responsivegrid\/image.img.jpeg\/1648592108349\/img1.jpeg\"\/><br \/>During the past month, FortiEDR detected a campaign by Deep Panda, a Chinese APT group. In this blog, FortiGuard Labs researchers share their analysis of the flow of infection, the backdoor, and new rootkit, along with the attribution of this campaign to these Chinese nation-state threat actors.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-18631","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18631"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18631\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18631"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}