Analysis
-
max time kernel
750s -
max time network
754s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2023, 07:03
Static task
static1
Behavioral task
behavioral1
Sample
TunnelBear-Installer.exe
Resource
win10v2004-20230220-en
General
-
Target
TunnelBear-Installer.exe
-
Size
144.2MB
-
MD5
42d02ea7377e502f2598ecc381fe0a3b
-
SHA1
9194c5e6908480cb7feed10efb406a58bb1cc106
-
SHA256
528fa41b114782af6d2cbda2947c73ecae5cdd971c9d12f0faceb2a2ee70ac6c
-
SHA512
dfc569440e81b57571010710e21c24f47102f00d57c30c542d0a20f2a1d40e61a730396f0eee9c0bf7374921aa43f00bcf95098a43d282da1fcd70b14fea1137
-
SSDEEP
3145728:M2XCodnJUxGc6XUHrNwUDhCMDIPOO0hRA9eNkdkYXyqod4ZV68:M2XCxxYX4NzYQIP0RAsIU4ZVT
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 41 3892 msiexec.exe 43 3892 msiexec.exe -
Drops file in Drivers directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\SET1A78.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET1A78.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap-tb-0901.sys DrvInst.exe File opened for modification C:\Windows\system32\drivers\etc\hosts TunnelBear.Maintenance.exe -
Modifies Installed Components in the registry 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\Version = "11,1081,19041,0" ie4uinit.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383} ie4uinit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\IsInstalled = "1" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383} ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\Locale = "*" ie4uinit.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce TunnelBear-Installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{44103b82-9412-4f6e-9f7d-e011ac692e8b} = "\"C:\\ProgramData\\Package Cache\\{44103b82-9412-4f6e-9f7d-e011ac692e8b}\\TunnelBear-Installer.exe\" /burn.runonce" TunnelBear-Installer.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Public\Desktop\desktop.ini rundll32.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation TunnelBear-Installer.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation rundll32.exe -
Drops file in System32 directory 30 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\{4f1384d2-73c6-f34c-8a4c-7560e647966a}\SET172F.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4f1384d2-73c6-f34c-8a4c-7560e647966a}\tap-tb-0901.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\tap-tb-0901.inf_amd64_a087624970f7fef3\tap-tb-0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4f1384d2-73c6-f34c-8a4c-7560e647966a} DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache TunnelBear.Maintenance.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\IsolatedStorage\1mfvuydq.mda\0vyhufky.o3l\Zone.MyComputer\Url.1zhmqa4cjvwiuqhpb5bwh3xzcbthtmcj\Files\__PolarBearSettings TunnelBear.Maintenance.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4f1384d2-73c6-f34c-8a4c-7560e647966a}\tap-tb-0901.sys DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\tap-tb-0901.inf_amd64_a087624970f7fef3\tap-tb-0901.PNF tapinstall.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\IsolatedStorage\1mfvuydq.mda\0vyhufky.o3l\Zone.MyComputer\Url.1zhmqa4cjvwiuqhpb5bwh3xzcbthtmcj\identity.dat TunnelBear.Maintenance.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content TunnelBear.Maintenance.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0968A1E3A40D2582E7FD463BAEB59CD TunnelBear.Maintenance.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\IsolatedStorage\1mfvuydq.mda\0vyhufky.o3l\Zone.MyComputer\info.dat TunnelBear.Maintenance.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4f1384d2-73c6-f34c-8a4c-7560e647966a}\SET172E.tmp DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\IsolatedStorage\1mfvuydq.mda\0vyhufky.o3l\Zone.MyComputer\Url.eik1pxc0s0s11uon3zzphsd4ngd1ag0b\identity.dat TunnelBear.Maintenance.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4f1384d2-73c6-f34c-8a4c-7560e647966a}\tap-tb-0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\tap-tb-0901.inf_amd64_a087624970f7fef3\tap-tb-0901.cat DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\30D802E0E248FEE17AAF4A62594CC75A TunnelBear.Maintenance.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\IsolatedStorage\1mfvuydq.mda\0vyhufky.o3l\Zone.MyComputer\identity.dat TunnelBear.Maintenance.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4f1384d2-73c6-f34c-8a4c-7560e647966a}\SET172F.tmp DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData TunnelBear.Maintenance.exe File created C:\Windows\System32\DriverStore\Temp\{4f1384d2-73c6-f34c-8a4c-7560e647966a}\SET172E.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{4f1384d2-73c6-f34c-8a4c-7560e647966a}\SET172D.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\tap-tb-0901.inf_amd64_a087624970f7fef3\tap-tb-0901.inf DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\30D802E0E248FEE17AAF4A62594CC75A TunnelBear.Maintenance.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4f1384d2-73c6-f34c-8a4c-7560e647966a}\SET172D.tmp DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0968A1E3A40D2582E7FD463BAEB59CD TunnelBear.Maintenance.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft TunnelBear.Maintenance.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\IsolatedStorage\1mfvuydq.mda\0vyhufky.o3l\Zone.MyComputer\Url.1zhmqa4cjvwiuqhpb5bwh3xzcbthtmcj\Files\__PolarBearSettings TunnelBear.Maintenance.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4_1\6\14.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\bearpin_23.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\bear_tunnel_animation_09_hover.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4\8\6.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4\14\15.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4\10\1.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\SQLitePCLRaw.nativelibrary.dll msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\bearpin_02.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4_1\6\7.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4_1\15\12.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\bearpin_22.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Login_follow_bear\login_follow_bear_129.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Secured_connection\secured_connection_bear_139.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Secured_connection\secured_connection_bear_76.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4_1\5\0.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\PolarSDK.Firewall.dll msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Login_follow_bear\login_follow_bear_77.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4_1\10\6.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Ratings\good_desktop_00028.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4\8\7.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\lib\vlc\plugins\video_chroma\libswscale_plugin.dll msiexec.exe File created C:\Program Files (x86)\TunnelBear\PolarSDK.Wireguard.dll msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Ratings\bad_desktop_00043.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4\15\3.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4\6\5.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\bearpin_01.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Drivers\x64\WdfCoinstaller01009.dll msiexec.exe File created C:\Program Files (x86)\TunnelBear\Bins\x64\libssl-1_1-x64.dll msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Secured_connection\secured_connection_bear_105.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4_1\2\9.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4\9\12.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Secured_connection\secured_connection_bear_136.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4_1\15\15.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4_1\10\10.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4\9\7.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\System.Diagnostics.EventLog.dll msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Secured_connection\secured_connection_bear_02.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Login_follow_bear\login_follow_bear_127.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Drivers\x64\tap-tb-0901.inf msiexec.exe File created C:\Program Files (x86)\TunnelBear\PolarSDK.Client.dll msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Ratings\good_desktop_00021.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Secured_connection\secured_connection_bear_124.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4\13\12.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Secured_connection\secured_connection_bear_143.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4\4\1.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\TunnelBear.Maintenance.exe msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4_1\1\11.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Secured_connection\secured_connection_bear_85.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4\8\2.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Login_follow_bear\login_follow_bear_19.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Bins\x86\wireguard.exe msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Ratings\good_desktop_00008.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Secured_connection\secured_connection_bear_28.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Moq.dll msiexec.exe File created C:\Program Files (x86)\TunnelBear\ko\Microsoft.Expression.Interactions.resources.dll msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Login_follow_bear\login_follow_bear_47.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\fr\TunnelBear.ViewModels.resources.dll msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4_1\2\15.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\System.Numerics.Vectors.dll msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\bearpin_outofdata_05.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4_1\8\7.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Images\Login_follow_bear\login_follow_bear_78.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4\9\5.png msiexec.exe File created C:\Program Files (x86)\TunnelBear\Assets\Maps\4_1\12\4.png msiexec.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI4DA6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI53D1.tmp-\Microsoft.Win32.TaskScheduler.dll rundll32.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\D8A1AB6A83B07DA4C94D6A5CFE7B7BC1\4.7.1\msvcp140.dll.E281B893_10D7_34CE_BB0E_B69D88E154A5 msiexec.exe File opened for modification C:\Windows\Installer\MSIDE50.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI4DA6.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI4DA6.tmp-\Microsoft.Win32.TaskScheduler.resources.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI53D1.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\D8A1AB6A83B07DA4C94D6A5CFE7B7BC1\4.7.1 msiexec.exe File created C:\Windows\Installer\e5709a5.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI108A.tmp-\Microsoft.Win32.TaskScheduler.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI108A.tmp-\Microsoft.Win32.TaskScheduler.resources.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI4DA6.tmp-\TunnelBear.Setup.Actions.dll rundll32.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\D8A1AB6A83B07DA4C94D6A5CFE7B7BC1\4.7.1\F_CENTRAL_vccorlib120_x86.194841A2_D0F2_3B96_9F71_05BA91BEA0FA msiexec.exe File opened for modification C:\Windows\Installer\MSI44A.tmp-\TunnelBear.Setup.Actions.dll rundll32.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\Installer\$PatchCache$\Managed\D8A1AB6A83B07DA4C94D6A5CFE7B7BC1\4.7.1\F_CENTRAL_msvcp120_x86.194841A2_D0F2_3B96_9F71_05BA91BEA0FA msiexec.exe File opened for modification C:\Windows\Installer\{A6BA1A8D-0B38-4AD7-9CD4-A6C5EFB7B71C}\TunnelBear.ico msiexec.exe File opened for modification C:\Windows\Installer\MSI44A.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\Installer\MSI44A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI108A.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\D8A1AB6A83B07DA4C94D6A5CFE7B7BC1 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\D8A1AB6A83B07DA4C94D6A5CFE7B7BC1\4.7.1\vccorlib140.dll.E281B893_10D7_34CE_BB0E_B69D88E154A5 msiexec.exe File opened for modification C:\Windows\Installer\MSI2E1.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File created C:\Windows\Installer\$PatchCache$\Managed\D8A1AB6A83B07DA4C94D6A5CFE7B7BC1\4.7.1\vccorlib140.dll.E281B893_10D7_34CE_BB0E_B69D88E154A5 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\D8A1AB6A83B07DA4C94D6A5CFE7B7BC1\4.7.1\vcruntime140.dll.E281B893_10D7_34CE_BB0E_B69D88E154A5 msiexec.exe File opened for modification C:\Windows\Installer\MSI169.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSI2E1.tmp-\Microsoft.Win32.TaskScheduler.resources.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI2BE4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI53D1.tmp-\Microsoft.Win32.TaskScheduler.resources.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI108A.tmp-\TunnelBear.Setup.Actions.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI53D1.tmp-\TunnelBear.Setup.Actions.dll rundll32.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSI4DA6.tmp-\Microsoft.Win32.TaskScheduler.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIDE50.tmp-\Microsoft.Win32.TaskScheduler.resources.dll rundll32.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI169.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDE50.tmp-\Microsoft.Win32.TaskScheduler.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIDE50.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSI2E1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2E1.tmp-\TunnelBear.Setup.Actions.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI2720.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4DA6.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\D8A1AB6A83B07DA4C94D6A5CFE7B7BC1\4.7.1\concrt140.dll.E281B893_10D7_34CE_BB0E_B69D88E154A5 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\D8A1AB6A83B07DA4C94D6A5CFE7B7BC1\4.7.1\msvcp140.dll.E281B893_10D7_34CE_BB0E_B69D88E154A5 msiexec.exe File opened for modification C:\Windows\Installer\MSI2E1.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSI108A.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI53D1.tmp-\CustomAction.config rundll32.exe File created C:\Windows\Installer\e5709a8.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIDE50.tmp-\TunnelBear.Setup.Actions.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI2E1.tmp-\Microsoft.Win32.TaskScheduler.dll rundll32.exe File created C:\Windows\Installer\SourceHash{A6BA1A8D-0B38-4AD7-9CD4-A6C5EFB7B71C} msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\D8A1AB6A83B07DA4C94D6A5CFE7B7BC1\4.7.1\F_CENTRAL_msvcp120_x86.194841A2_D0F2_3B96_9F71_05BA91BEA0FA msiexec.exe File opened for modification C:\Windows\Installer\MSI988C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDE50.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\D8A1AB6A83B07DA4C94D6A5CFE7B7BC1\4.7.1\F_CENTRAL_msvcr120_x86.194841A2_D0F2_3B96_9F71_05BA91BEA0FA msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\D8A1AB6A83B07DA4C94D6A5CFE7B7BC1\4.7.1\F_CENTRAL_vccorlib120_x86.194841A2_D0F2_3B96_9F71_05BA91BEA0FA msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\{A6BA1A8D-0B38-4AD7-9CD4-A6C5EFB7B71C}\TunnelBear.ico msiexec.exe File opened for modification C:\Windows\Installer\MSI169.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI44A.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\e5709a5.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Executes dropped EXE 11 IoCs
pid Process 3488 TunnelBear-Installer.exe 2236 TunnelBear-Installer.exe 532 vcredist140_x86.exe 2120 vcredist140_x86.exe 512 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 800 TunnelBear.exe 1880 TunnelBear.UI.exe 3256 tapinstall.exe 1944 TunnelBear.exe 4072 TunnelBear.UI.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 396 sc.exe 4424 sc.exe -
Loads dropped DLL 64 IoCs
pid Process 3488 TunnelBear-Installer.exe 3488 TunnelBear-Installer.exe 3488 TunnelBear-Installer.exe 3488 TunnelBear-Installer.exe 3488 TunnelBear-Installer.exe 2120 vcredist140_x86.exe 3120 MsiExec.exe 1212 rundll32.exe 1212 rundll32.exe 1212 rundll32.exe 1212 rundll32.exe 1212 rundll32.exe 3120 MsiExec.exe 3120 MsiExec.exe 3340 rundll32.exe 3340 rundll32.exe 3340 rundll32.exe 3340 rundll32.exe 3340 rundll32.exe 3120 MsiExec.exe 4476 rundll32.exe 4476 rundll32.exe 4476 rundll32.exe 4476 rundll32.exe 4476 rundll32.exe 4476 rundll32.exe 4476 rundll32.exe 2980 MsiExec.exe 2980 MsiExec.exe 3728 rundll32.exe 3728 rundll32.exe 3728 rundll32.exe 3728 rundll32.exe 3728 rundll32.exe 512 TunnelBear.Maintenance.exe 512 TunnelBear.Maintenance.exe 512 TunnelBear.Maintenance.exe 512 TunnelBear.Maintenance.exe 512 TunnelBear.Maintenance.exe 512 TunnelBear.Maintenance.exe 512 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2980 MsiExec.exe 1844 rundll32.exe -
Registers COM server for autorun 1 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\WOW6432Node\CLSID\{8816027c-d5cf-4c23-89ab-b01f6d5bed4e}\LocalServer32\ = "\"C:\\Program Files (x86)\\TunnelBear\\TunnelBear.UI.exe\" -ToastActivated" TunnelBear.UI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0002DF01-0000-0000-C000-000000000046}\LocalServer32 ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\WOW6432Node\CLSID\{8816027c-d5cf-4c23-89ab-b01f6d5bed4e}\LocalServer32 TunnelBear.UI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\WOW6432Node\CLSID\{8816027c-d5cf-4c23-89ab-b01f6d5bed4e}\LocalServer32\ = "\"C:\\Program Files (x86)\\TunnelBear\\TunnelBear.UI.exe\" -ToastActivated" TunnelBear.UI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters DrvInst.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Filters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Capabilities\Hidden = "0" ie4uinit.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Capabilities ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\BrowserEmulation\CVListTTL = "0" ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\OperationalData = "12" ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\TunnelBear.UI.exe = "1" TunnelBear.UI.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\BrowserEmulation ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\Main ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_96DPI_PIXEL TunnelBear.UI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\TunnelBear.UI.exe = "0" TunnelBear.UI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\TunnelBear.UI.exe = "0" TunnelBear.UI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_96DPI_PIXEL\TunnelBear.UI.exe = "1" TunnelBear.UI.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING TunnelBear.UI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\TunnelBear.UI.exe = "1" TunnelBear.UI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_96DPI_PIXEL\TunnelBear.UI.exe = "1" TunnelBear.UI.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA TunnelBear.Maintenance.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates TunnelBear.Maintenance.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs tapinstall.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\System32\ci.dll,-100 = "Isolated User Mode (IUM)" tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates TunnelBear.Maintenance.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root TunnelBear.Maintenance.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs TunnelBear.Maintenance.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed TunnelBear.Maintenance.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" TunnelBear.Maintenance.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed TunnelBear.Maintenance.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs tapinstall.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs TunnelBear.Maintenance.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs TunnelBear.Maintenance.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs TunnelBear.Maintenance.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs TunnelBear.Maintenance.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs TunnelBear.Maintenance.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My TunnelBear.Maintenance.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\D89E3BD43D5D909B47A18977AA9D5CE36CEE184C\Blob = 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 TunnelBear.Maintenance.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" TunnelBear.Maintenance.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\System32\wuaueng.dll,-400 = "Windows Update" tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates TunnelBear.Maintenance.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs TunnelBear.Maintenance.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\System32\SimAuth.dll,-1001 = "EAP-SIM" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA tapinstall.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\System32\fveui.dll,-844 = "BitLocker Data Recovery Agent" tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople TunnelBear.Maintenance.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates TunnelBear.Maintenance.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs TunnelBear.Maintenance.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs tapinstall.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\system32\NgcRecovery.dll,-100 = "Windows Hello Recovery Key Encryption" tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing tapinstall.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{46CFE871-9E2E-37C9-BDDA-1E1809567D12}\InprocServer32\Class = "PolarSDK.OpenVPN.Services.Implementations.Logger.ExampleLoggerService" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{A06BF257-07E2-3941-8DFC-5EC29D2EC6D3}\ProgID msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{C2351956-A740-366B-AE7F-C658099722F7}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.AppCenter.CancellationException\ = "Microsoft.AppCenter.CancellationException" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PolarSDK.Common.Models.DataUsageResponse\CLSID\ = "{228B77B2-442F-3302-A293-78B51FA2FA08}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF0FFD1A-A930-380B-86E4-89572624CACB} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.Win32.TaskScheduler.TaskService\ = "Microsoft.Win32.TaskScheduler.TaskService" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E4788F25-8418-3693-85ED-B8683B5CD0EC}\ = "Microsoft.Win32.TaskScheduler.ShowMessageAction" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{DDAE3C7B-7FC8-3ED4-91B6-20723F70351F} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D6D47D1C-F528-3A6C-A9F2-5A9A1655F3DC}\InprocServer32\1.7.0.0\Class = "DnsClient.DnsQueryAndServerOptions" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAEA3FE3-6941-312F-B2ED-E1E5B0E3E312}\InprocServer32\RuntimeVersion = "v4.0.30319" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{B9CFC665-6151-31C9-9B0E-0F99D24CCD5B}\4.2.0.1\RuntimeVersion = "v4.0.30319" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{AA34901D-D6CC-303F-BE2C-674D1915D138} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C2351956-A740-366B-AE7F-C658099722F7}\InprocServer32\Class = "TunnelBear.Services.Models.VpnServiceSettings" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A468604-34E8-3617-959C-40DA097CC8C6}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29}\ msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{89B29FAB-20E7-384A-87B8-2006AA7FB7B5}\Implemented Categories msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{9A829252-FEA5-360E-AE08-10DD9A1AABA1}\0.0.0.0\Class = "Microsoft.AppCenter.Ingestion.Models.ValidationException+Rule" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PolarSDK.API.Models.RequestCompleteEventArgs\ = "PolarSDK.API.Models.RequestCompleteEventArgs" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{86B31909-680F-3BC7-9598-76948210C82E} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{9FEB24EB-921E-3FB2-8CEB-A7F085A704DC}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FEB24EB-921E-3FB2-8CEB-A7F085A704DC}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.QueryStringDotNET.QueryString\ = "Microsoft.QueryStringDotNET.QueryString" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77A10244-F96D-3CFA-BE68-DC7E48C975DC}\InprocServer32\0.0.0.0\RuntimeVersion = "v4.0.30319" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DE1C727C-FBB6-3578-9E94-C283C3AAB2B8}\Implemented Categories msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{728C8EEB-8D6F-3CA4-BCE8-622B10CD779C}\InprocServer32\1.32.13.0\Class = "PolarSDK.Common.Models.Results.DeviceDataUsageResult" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{2C302860-6675-334B-B762-9FB1343093D6}\5.6.1.0\Assembly = "Polly, Version=5.6.1.0, Culture=neutral, PublicKeyToken=null" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{0F457819-694D-3054-99E3-7E3024982827}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\CommandId = "IE.Protocol" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CECD60AD-0AAB-3B77-8974-C9D5E3CF9CD7}\InprocServer32\Assembly = "Microsoft.Toolkit.Uwp.Notifications, Version=5.0.0.0, Culture=neutral, PublicKeyToken=null" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{6E7A0555-CA7B-39EA-827F-2A2EF85D8520} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BA994712-5CDC-33BF-A4F2-223721D00096}\ProgID\ = "TunnelBear.Services.ApiResponses.CountriesResponse" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56A0829D-3C12-3747-8534-AB6C5B6376DB}\Implemented Categories msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{7B0D1DBF-7D48-3D66-A09F-38BEAE0ECBD7}\InprocServer32\1.1.0.0 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{7CCF74CD-5C82-31F2-9110-D322C06C0690}\5.0.0.0\Assembly = "Microsoft.Toolkit.Uwp.Notifications, Version=5.0.0.0, Culture=neutral, PublicKeyToken=null" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{DA1AD478-3AE0-3251-88AC-F2D44BB57475}\2.7.0.0\RuntimeVersion = "v4.0.30319" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E4451A56-C28B-31C1-8450-916AB218C7A2}\ProgID\ = "PolarSDK.Common.Models.Results.StartVpnResult" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{D6FF724E-5FA9-3F26-881B-C3A2AB1165FF}\1.7.0.0\Assembly = "DnsClient, Version=1.7.0.0, Culture=neutral, PublicKeyToken=4574bb5573c51424" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{C6E650BE-8FE6-30D9-8948-ABF09078660C}\InprocServer32\1.6.4.0 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{46AEE9E5-7BA2-31C5-8882-067313F9736D}\InprocServer32\1.32.13.0\RuntimeVersion = "v4.0.30319" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{22FC8AC2-0AE0-3C18-BC10-440ED2986B49}\5.6.1.0\CodeBase = "file:///C:\\Program Files (x86)\\TunnelBear\\Polly.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Record\{0B917538-9AC4-3D4D-B1F5-34E69F195D55}\4.0.1.1 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\TunnelBear.Models.CountryMap msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1F654610-BCE1-3D86-8003-23047F637D46}\InprocServer32\1.0.0.0\CodeBase = "file:///C:\\Program Files (x86)\\TunnelBear\\TunnelBear.Models.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{54ABD027-36BF-3DF9-96F6-463F453A9123}\1.0.0.0\Class = "TunnelBear.Services.Core.ThemeSelector" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Record\{E57A9486-8AA9-3737-AA8E-261D48585EF5}\1.7.0.0 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{79A44CDC-3AAF-38DF-9DD8-DD2F078F8DA4}\2.7.0.0\Assembly = "Microsoft.Win32.TaskScheduler, Version=2.7.0.0, Culture=neutral, PublicKeyToken=c416bc1b32d97233" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{79A44CDC-3AAF-38DF-9DD8-DD2F078F8DA4}\2.7.0.0\RuntimeVersion = "v4.0.30319" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{DA1AD478-3AE0-3251-88AC-F2D44BB57475} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Record\{7E006FF7-F98D-35A9-B24F-370988FD4150}\1.0.0.0 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Microsoft.AppCenter.Utils.ApplicationLifecycleHelper msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Record\{7CCF74CD-5C82-31F2-9110-D322C06C0690}\5.0.0.0 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{BDE30F46-4A2B-3290-947E-638B584B6099}\4.0.1.1\Assembly = "System.Memory, Version=4.0.1.1, Culture=neutral, PublicKeyToken=cc7b13ffcd2ddd51" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{C198D057-00AF-346D-A01E-8AB8A144425E}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{9BD0EBBF-E95B-3823-BF7F-6898D37D80A5}\1.0.0.0\Class = "TunnelBear.Models.PlanType" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8816027C-D5CF-4C23-89AB-B01F6D5BED4E}\ProgID msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{E3B6940B-71E3-3156-8095-D806C80C7A4A} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{FAEA01BB-FABF-3D59-BC35-1D5E667B922C} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F670EF0-95CC-383A-B518-5DF8F55AF8CA}\ = "Microsoft.AppCenter.Utils.Files.File" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{974B120F-A3F8-3869-AA26-D6ED15B35D71}\InprocServer32\ = "mscoree.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{63ACD17A-750A-3E6A-B647-220298F8A824}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B912B4BB-4A0E-3FAD-8837-856010D9315A}\InprocServer32\1.1.0.0\Assembly = "SQLite-net, Version=1.1.0.0, Culture=neutral, PublicKeyToken=null" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{9729E04C-D135-39F0-B009-22C48910CC89} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{B1F2D9DE-AC22-34EA-B2EF-BC602A4B276B}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shellex\IconHandler ie4uinit.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 19000000010000001000000063664b080559a094d10f0a3c5f4f62900300000001000000140000002796bae63f1801e277261ba0d77770028f20eee41d000000010000001000000099949d2179811f6b30a8c99c4f6b4226140000000100000014000000d2c4b0d291d44c1171b361cb3da1fedda86ad4e3620000000100000020000000c3846bf24b9e93ca64274c0ec67c1ecc5e024ffcacd2d74019350e81fe546ae409000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030153000000010000004800000030463021060b6086480186fd6d0107170330123010060a2b0601040182373c0101030200c03021060b6086480186fd6e0107170330123010060a2b0601040182373c0101030200c00b000000010000005200000047006f00200044006100640064007900200043006c00610073007300200032002000430065007200740069006600690063006100740069006f006e00200041007500740068006f00720069007400790000000f00000001000000140000005d82adb90d5dd3c7e3524f56f787ec537261877620000000010000000404000030820400308202e8a003020102020100300d06092a864886f70d01010505003063310b30090603550406130255533121301f060355040a131854686520476f2044616464792047726f75702c20496e632e3131302f060355040b1328476f20446164647920436c61737320322043657274696669636174696f6e20417574686f72697479301e170d3034303632393137303632305a170d3334303632393137303632305a3063310b30090603550406130255533121301f060355040a131854686520476f2044616464792047726f75702c20496e632e3131302f060355040b1328476f20446164647920436c61737320322043657274696669636174696f6e20417574686f7269747930820120300d06092a864886f70d01010105000382010d00308201080282010100de9dd7ea571849a15bebd75f4886eabeddffe4ef671cf46568b35771a05e77bbed9b49e970803d561863086fdaf2ccd03f7f0254225410d8b281d4c0753d4b7fc777c33e78ab1a03b5206b2f6a2bb1c5887ec4bb1eb0c1d845276faa3758f78726d7d82df6a917b71f72364ea6173f659892db2a6e5da2fe88e00bde7fe58d15e1ebcb3ad5e212a2132dd88eaf5f123da0080508b65ca565380445991ea3606074c541a572621b62c51f6f5f1a42be025165a8ae23186afc7803a94d7f80c3faab5afca140a4ca1916feb2c8ef5e730dee77bd9af67998bcb10767a2150ddda058c6447b0a3e62285fba41075358cf117e3874c5f8ffb569908f8474ea971baf020103a381c03081bd301d0603551d0e04160414d2c4b0d291d44c1171b361cb3da1fedda86ad4e330818d0603551d230481853081828014d2c4b0d291d44c1171b361cb3da1fedda86ad4e3a167a4653063310b30090603550406130255533121301f060355040a131854686520476f2044616464792047726f75702c20496e632e3131302f060355040b1328476f20446164647920436c61737320322043657274696669636174696f6e20417574686f72697479820100300c0603551d13040530030101ff300d06092a864886f70d01010505000382010100324bf3b2ca3e91fc12c6a1078c8e77a03306145c901e18f708a63d0a19f98780116e69e4961730ff3491637238eecc1c01a31d9428a431f67ac454d7f6e5315803a2ccce62db944573b5bf45c924b5d58202ad2379698db8b64dcecf4cca3323e81c88aa9d8b416e16c920e5899ecd3bda70f77e992620145425ab6e7385e69b219d0a6c820ea8f8c20cfa101e6c96ef870dc40f618badee832b95f88e92847239eb20ea83ed83cd976e08bceb4e26b6732be4d3f64cfe2671e26111744aff571a870f75482ecf516917a002126195d5d140b2104ceec4ac1043a6a59e0ad595629a0dcf8882c5320ce42b9f45e60d9f289cb1b92a5a57ad370faf1d7fdbbd9f tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\B762BA83B609A957A69BB4EBCEF3923FBA4EA854 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 TunnelBear.Maintenance.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\6AF0CF1D7FBD54EC6E797659CC023D8BF92E5667 TunnelBear.Maintenance.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\6AF0CF1D7FBD54EC6E797659CC023D8BF92E5667\Blob = 0300000001000000140000006af0cf1d7fbd54ec6e797659cc023d8bf92e5667040000000100000010000000f233fe2fa290ab96c24ea5bde578e1820f0000000100000020000000b4939065341c4383b71881417d82d7e6f0c4e0be22c3c4e94f4b8f21cda62ec51400000001000000140000000e26bf98b014a2774bdb0baaf5407b09246bcbef1900000001000000100000000d2b7abaf1bcd154e7cb16d4007116e25c000000010000000400000000080000180000000100000010000000fc741b3b78cfb31e075744fe5d0eeb964b000000010000000200000000002000000001000000420600003082063e30820526a00302010202110091994337d5265c83ec4a985341602bac300d06092a864886f70d01010b050030818f310b3009060355040613024742311b30190603550408131247726561746572204d616e636865737465723110300e0603550407130753616c666f726431183016060355040a130f5365637469676f204c696d69746564313730350603550403132e5365637469676f2052534120446f6d61696e2056616c69646174696f6e2053656375726520536572766572204341301e170d3232303631363030303030305a170d3233303731363233353935395a301d311b301906035504030c122a2e6c617a657270656e6775696e2e636f6d30820122300d06092a864886f70d01010105000382010f003082010a0282010100c164c34b00fe0cd0f3fc8a311a008f90844a367c01d8df4bd7c82a541583aa313b77e638457130c39bdfbfad399a36896adb2691e7b1d656a76033035560f9e529af9fe0d3acbb9d9b98af52025098c1c6cd3a16b9dc1f92fb47037661f191d7d863e6dc1a2ba22dba7cc9b1ee8762472c5e94dc3c54858fb51fe305f6c310b5c67dfc14c70b8a94297abcf6d002cceb4ab39811392c5af6a1e8ab433b42ce82644f3039dadda26b541ba66df4440be90f19e7e9679fbca75538ebf42b17f30d01f2955709ab7456da93e7b6becf705f9e43f599e0023004af1a519daceb91e1d7be3482faded75cd2f3a4993650cdb7b031fcef4e8fb533c20249362694f51b0203010001a382030430820300301f0603551d230418301680148d8c5ec454ad8ae177e99bf99b05e1b8018d61e1301d0603551d0e041604140e26bf98b014a2774bdb0baaf5407b09246bcbef300e0603551d0f0101ff0404030205a0300c0603551d130101ff04023000301d0603551d250416301406082b0601050507030106082b0601050507030230490603551d20044230403034060b2b06010401b231010202073025302306082b06010505070201161768747470733a2f2f7365637469676f2e636f6d2f4350533008060667810c01020130818406082b0601050507010104783076304f06082b060105050730028643687474703a2f2f6372742e7365637469676f2e636f6d2f5365637469676f525341446f6d61696e56616c69646174696f6e53656375726553657276657243412e637274302306082b060105050730018617687474703a2f2f6f6373702e7365637469676f2e636f6d302f0603551d110428302682122a2e6c617a657270656e6775696e2e636f6d82106c617a657270656e6775696e2e636f6d3082017c060a2b06010401d6790204020482016c048201680166007600adf7befa7cff10c88b9d3d9c1e3e186ab467295dcfb10c24ca858634ebdc828a000001816cf9fa4e0000040300473045022100cd0417b913499b6e8c25fbb296c25e02650a6d8c18ab6a8767765878e1b8499002204be55585cdcffe529dac3d646496b057d09166e8f72207b30c6b98ffa5bea0730075007a328c54d8b72db620ea38e0521ee98416703213854d3bd22bc13a57a352eb52000001816cf9fa3d000004030046304402205ae94c2f66402210e9aad1bdbbe9d105335e063a59d3a52a6f82653d92de82da02207ad11fe30bc2f4c48b6a2609125970732124f245b0bc285b4a2d4ba24c4769bc007500e83ed0da3ef5063532e75728bc896bc903d3cbd1116beceb69e1777d6d06bd6e000001816cf9f9eb000004030046304402202fed17608eabc63477a77d8dab754bd40489f06b8910969a6db7b6fd96d8a77c022021f33a1cb222cc5c442a243f36f4de3c18b5589b0586033b48edcf295856028c300d06092a864886f70d01010b05000382010100bc89fac982fc48f2af7acdc0b92e9edd881efef6068dfc750b04121d93518cd1e8262a3e8d240450719504c1c269ac738753f2606954ab54d7f3d57cb65400a7c586b3a42be399b3433cda7a7896d44aaad0199e14503689363e6b1885dc33e6cc36f343d8bd0bc5ea65a2a3d7f96d01775f8c4577142d475480bcd8d7bd36cb1d97f4ec48af13c6b8e8588bd04a5b2b626f5f3cba1d70d5cb9f0c1f1064560813980ccf1a9be3eba89177c802f7b33d231b9c911b5b604debfd5dd16ea284b74af2deae14be4b0316b22831eda5c86bc63b88bc9db7835820f98cb79901ccaa15e36924c83f99b151fff596e0e652c13da205013a79c18759dc22332485debd TunnelBear.Maintenance.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\B762BA83B609A957A69BB4EBCEF3923FBA4EA854\Blob = 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 TunnelBear.Maintenance.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\B762BA83B609A957A69BB4EBCEF3923FBA4EA854\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 TunnelBear.Maintenance.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\B762BA83B609A957A69BB4EBCEF3923FBA4EA854 TunnelBear.Maintenance.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 TunnelBear.Maintenance.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\33E4E80807204C2B6182A3A14B591ACD25B5F0DB TunnelBear.Maintenance.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\33E4E80807204C2B6182A3A14B591ACD25B5F0DB\Blob = 03000000010000001400000033e4e80807204c2b6182a3a14b591acd25b5f0db1400000001000000140000008d8c5ec454ad8ae177e99bf99b05e1b8018d61e1040000000100000010000000adab5c4df031fb9299f71ada7e18f6130f00000001000000300000008b612b2190a95b28b866b9be5d0b95f368c17534ab1da61a42dfb32766f9ae2908fe6bfd1669be140eddaf0d33e95235190000000100000010000000fc741b3b78cfb31e075744fe5d0eeb965c000000010000000400000000080000180000000100000010000000ea6089055218053dd01e37e1d806eedf4b0000000100000044000000300037004300450046003200460036003500340045003300450044003600300035003000460046004300390042003600450042003800340034003200350030005f00000020000000010000001706000030820613308203fba00302010202107d5b5126b476ba11db74160bbc530da7300d06092a864886f70d01010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3138313130323030303030305a170d3330313233313233353935395a30818f310b3009060355040613024742311b30190603550408131247726561746572204d616e636865737465723110300e0603550407130753616c666f726431183016060355040a130f5365637469676f204c696d69746564313730350603550403132e5365637469676f2052534120446f6d61696e2056616c69646174696f6e205365637572652053657276657220434130820122300d06092a864886f70d01010105000382010f003082010a0282010100d67333d6d73c20d000d21745b8d63e07a23fc741ee3230c9b06cfdf49fcb12980f2d3f8d4d010c820f177f622ee9b84879fb16834eadd7322593b707bfb9503fa94cc3402ae939ffd981ca1f163241da8026b9237a87201ee3ff209a3c95446f8775069040b4329316091008233ed2dd870f6f5d51146a0a69c54f017269cfd3934c6d04a0a31b827eb19ab9edc59ec537789f9a0834fb562e58c4090e06645bbc37dcf19f2868a856b092a35c9fbb8898081b241dab3085aeafb02e9e7a9dc1c0421ce202f0eae04ad2ef900eb4c14016f06f85424a64f7a430a0febf2ea3275a8e8b58b8adc319178463ed6f56fd83cb6034c474bee69ddbe1e4e5ca0c5f150203010001a382016e3082016a301f0603551d230418301680145379bf5aaa2b4acf5480e1d89bc09df2b20366cb301d0603551d0e041604148d8c5ec454ad8ae177e99bf99b05e1b8018d61e1300e0603551d0f0101ff04040302018630120603551d130101ff040830060101ff020100301d0603551d250416301406082b0601050507030106082b06010505070302301b0603551d200414301230060604551d20003008060667810c01020130500603551d1f044930473045a043a041863f687474703a2f2f63726c2e7573657274727573742e636f6d2f55534552547275737452534143657274696669636174696f6e417574686f726974792e63726c307606082b06010505070101046a3068303f06082b060105050730028633687474703a2f2f6372742e7573657274727573742e636f6d2f555345525472757374525341416464547275737443412e637274302506082b060105050730018619687474703a2f2f6f6373702e7573657274727573742e636f6d300d06092a864886f70d01010c0500038202010032bf61bd0e48c34fc7ba474df89c781901dc131d806ffcc370b4529a31339a5752fb319e6ba4ef54aa898d401768f811107cd2cab1f15586c7eeb3369186f63951bf46bf0fa0bab4f77e49c42a36179ee468397aaf944e566fb27b3bbf0a86bdcdc5771c03b838b1a21f5f7edb8adc4648b6680acfb2b5b4e234e467a93866095ed2b8fc9d283a174027c2724e29fd213c7ccf13fb962cc53144fd13edd59ba96968777ceee1ffa4f93638085339a284349c19f3be0eacd52437eb23a878d0d3e7ef924764623922efc6f711be2285c6664424268e10328dc893ae079e833e2fd9f9f5468e63bec1e6b4dca6cd21a8860a95d92e85261afdfcb1b657426d95d133f6391406824138f58f58dc805ba4d57d9578fda79bfffdc5a869ab26e7a7a405875ba9b7b8a3200b97a94585ddb38be589378e290dfc0617f638400e42e41206fb7bf3c6116862dfe398f413d8154f8bb169d91060bc642aea31b7e4b5a33a149b26e30b7bfd028eb699c138975936f6a874a286b65eebc664eacfa0a3f96e9eba2d11b6869808582dc9ac2564f25e75b438c1ae7f5a4683ea51cab6f19911356ba56a7bc600b0e7f8be64b2adc8c2f1ace351eaa493e079c8e18140c90a5be1123cc1602ae397c08942ca94cf46981269bb98d0c2d30d724b476ee593c43228638743e4b0323e0ad34bbf239b1429412b9a041f932df1c739483cad5a127f TunnelBear.Maintenance.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D89E3BD43D5D909B47A18977AA9D5CE36CEE184C TunnelBear.Maintenance.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D89E3BD43D5D909B47A18977AA9D5CE36CEE184C\Blob = 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 TunnelBear.Maintenance.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1212 rundll32.exe 1212 rundll32.exe 3892 msiexec.exe 3892 msiexec.exe 3488 TunnelBear-Installer.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 3064 chrome.exe 3064 chrome.exe 3816 chrome.exe 3816 chrome.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 2508 TunnelBear.Maintenance.exe 4988 Taskmgr.exe 4988 Taskmgr.exe 4988 Taskmgr.exe 4988 Taskmgr.exe 4116 Taskmgr.exe 4116 Taskmgr.exe 4116 Taskmgr.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 3404 vssvc.exe Token: SeRestorePrivilege 3404 vssvc.exe Token: SeAuditPrivilege 3404 vssvc.exe Token: SeShutdownPrivilege 2236 TunnelBear-Installer.exe Token: SeIncreaseQuotaPrivilege 2236 TunnelBear-Installer.exe Token: SeSecurityPrivilege 3892 msiexec.exe Token: SeCreateTokenPrivilege 2236 TunnelBear-Installer.exe Token: SeAssignPrimaryTokenPrivilege 2236 TunnelBear-Installer.exe Token: SeLockMemoryPrivilege 2236 TunnelBear-Installer.exe Token: SeIncreaseQuotaPrivilege 2236 TunnelBear-Installer.exe Token: SeMachineAccountPrivilege 2236 TunnelBear-Installer.exe Token: SeTcbPrivilege 2236 TunnelBear-Installer.exe Token: SeSecurityPrivilege 2236 TunnelBear-Installer.exe Token: SeTakeOwnershipPrivilege 2236 TunnelBear-Installer.exe Token: SeLoadDriverPrivilege 2236 TunnelBear-Installer.exe Token: SeSystemProfilePrivilege 2236 TunnelBear-Installer.exe Token: SeSystemtimePrivilege 2236 TunnelBear-Installer.exe Token: SeProfSingleProcessPrivilege 2236 TunnelBear-Installer.exe Token: SeIncBasePriorityPrivilege 2236 TunnelBear-Installer.exe Token: SeCreatePagefilePrivilege 2236 TunnelBear-Installer.exe Token: SeCreatePermanentPrivilege 2236 TunnelBear-Installer.exe Token: SeBackupPrivilege 2236 TunnelBear-Installer.exe Token: SeRestorePrivilege 2236 TunnelBear-Installer.exe Token: SeShutdownPrivilege 2236 TunnelBear-Installer.exe Token: SeDebugPrivilege 2236 TunnelBear-Installer.exe Token: SeAuditPrivilege 2236 TunnelBear-Installer.exe Token: SeSystemEnvironmentPrivilege 2236 TunnelBear-Installer.exe Token: SeChangeNotifyPrivilege 2236 TunnelBear-Installer.exe Token: SeRemoteShutdownPrivilege 2236 TunnelBear-Installer.exe Token: SeUndockPrivilege 2236 TunnelBear-Installer.exe Token: SeSyncAgentPrivilege 2236 TunnelBear-Installer.exe Token: SeEnableDelegationPrivilege 2236 TunnelBear-Installer.exe Token: SeManageVolumePrivilege 2236 TunnelBear-Installer.exe Token: SeImpersonatePrivilege 2236 TunnelBear-Installer.exe Token: SeCreateGlobalPrivilege 2236 TunnelBear-Installer.exe Token: SeRestorePrivilege 3892 msiexec.exe Token: SeTakeOwnershipPrivilege 3892 msiexec.exe Token: SeRestorePrivilege 3892 msiexec.exe Token: SeTakeOwnershipPrivilege 3892 msiexec.exe Token: SeBackupPrivilege 4884 srtasks.exe Token: SeRestorePrivilege 4884 srtasks.exe Token: SeSecurityPrivilege 4884 srtasks.exe Token: SeTakeOwnershipPrivilege 4884 srtasks.exe Token: SeBackupPrivilege 4884 srtasks.exe Token: SeRestorePrivilege 4884 srtasks.exe Token: SeSecurityPrivilege 4884 srtasks.exe Token: SeTakeOwnershipPrivilege 4884 srtasks.exe Token: SeDebugPrivilege 1212 rundll32.exe Token: SeRestorePrivilege 3892 msiexec.exe Token: SeTakeOwnershipPrivilege 3892 msiexec.exe Token: SeRestorePrivilege 3892 msiexec.exe Token: SeTakeOwnershipPrivilege 3892 msiexec.exe Token: SeRestorePrivilege 3892 msiexec.exe Token: SeTakeOwnershipPrivilege 3892 msiexec.exe Token: SeRestorePrivilege 3892 msiexec.exe Token: SeTakeOwnershipPrivilege 3892 msiexec.exe Token: SeRestorePrivilege 3892 msiexec.exe Token: SeTakeOwnershipPrivilege 3892 msiexec.exe Token: SeRestorePrivilege 3892 msiexec.exe Token: SeTakeOwnershipPrivilege 3892 msiexec.exe Token: SeRestorePrivilege 3892 msiexec.exe Token: SeTakeOwnershipPrivilege 3892 msiexec.exe Token: SeRestorePrivilege 3892 msiexec.exe Token: SeTakeOwnershipPrivilege 3892 msiexec.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1880 TunnelBear.UI.exe 1880 TunnelBear.UI.exe 1880 TunnelBear.UI.exe 1880 TunnelBear.UI.exe 1880 TunnelBear.UI.exe 1880 TunnelBear.UI.exe 1880 TunnelBear.UI.exe 1880 TunnelBear.UI.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 1880 TunnelBear.UI.exe 4072 TunnelBear.UI.exe 4072 TunnelBear.UI.exe 4072 TunnelBear.UI.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1880 TunnelBear.UI.exe 1880 TunnelBear.UI.exe 1880 TunnelBear.UI.exe 1880 TunnelBear.UI.exe 1880 TunnelBear.UI.exe 1880 TunnelBear.UI.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 1880 TunnelBear.UI.exe 4072 TunnelBear.UI.exe 4072 TunnelBear.UI.exe 4072 TunnelBear.UI.exe 4072 TunnelBear.UI.exe 4072 TunnelBear.UI.exe 4072 TunnelBear.UI.exe 4988 Taskmgr.exe 4988 Taskmgr.exe 4988 Taskmgr.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 1836 chrome.exe 184 chrome.exe 184 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 184 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1176 wrote to memory of 3488 1176 TunnelBear-Installer.exe 84 PID 1176 wrote to memory of 3488 1176 TunnelBear-Installer.exe 84 PID 1176 wrote to memory of 3488 1176 TunnelBear-Installer.exe 84 PID 3488 wrote to memory of 2236 3488 TunnelBear-Installer.exe 88 PID 3488 wrote to memory of 2236 3488 TunnelBear-Installer.exe 88 PID 3488 wrote to memory of 2236 3488 TunnelBear-Installer.exe 88 PID 2236 wrote to memory of 532 2236 TunnelBear-Installer.exe 98 PID 2236 wrote to memory of 532 2236 TunnelBear-Installer.exe 98 PID 2236 wrote to memory of 532 2236 TunnelBear-Installer.exe 98 PID 532 wrote to memory of 2120 532 vcredist140_x86.exe 100 PID 532 wrote to memory of 2120 532 vcredist140_x86.exe 100 PID 532 wrote to memory of 2120 532 vcredist140_x86.exe 100 PID 3892 wrote to memory of 3120 3892 msiexec.exe 103 PID 3892 wrote to memory of 3120 3892 msiexec.exe 103 PID 3892 wrote to memory of 3120 3892 msiexec.exe 103 PID 3120 wrote to memory of 1212 3120 MsiExec.exe 104 PID 3120 wrote to memory of 1212 3120 MsiExec.exe 104 PID 3120 wrote to memory of 1212 3120 MsiExec.exe 104 PID 1212 wrote to memory of 820 1212 rundll32.exe 105 PID 1212 wrote to memory of 820 1212 rundll32.exe 105 PID 1212 wrote to memory of 4688 1212 rundll32.exe 106 PID 1212 wrote to memory of 4688 1212 rundll32.exe 106 PID 820 wrote to memory of 3364 820 ie4uinit.exe 108 PID 820 wrote to memory of 3364 820 ie4uinit.exe 108 PID 820 wrote to memory of 1844 820 ie4uinit.exe 107 PID 820 wrote to memory of 1844 820 ie4uinit.exe 107 PID 3120 wrote to memory of 3340 3120 MsiExec.exe 110 PID 3120 wrote to memory of 3340 3120 MsiExec.exe 110 PID 3120 wrote to memory of 3340 3120 MsiExec.exe 110 PID 3120 wrote to memory of 4476 3120 MsiExec.exe 111 PID 3120 wrote to memory of 4476 3120 MsiExec.exe 111 PID 3120 wrote to memory of 4476 3120 MsiExec.exe 111 PID 3892 wrote to memory of 2980 3892 msiexec.exe 112 PID 3892 wrote to memory of 2980 3892 msiexec.exe 112 PID 3892 wrote to memory of 2980 3892 msiexec.exe 112 PID 2980 wrote to memory of 3728 2980 MsiExec.exe 114 PID 2980 wrote to memory of 3728 2980 MsiExec.exe 114 PID 2980 wrote to memory of 3728 2980 MsiExec.exe 114 PID 3728 wrote to memory of 512 3728 rundll32.exe 116 PID 3728 wrote to memory of 512 3728 rundll32.exe 116 PID 3728 wrote to memory of 512 3728 rundll32.exe 116 PID 2508 wrote to memory of 1992 2508 TunnelBear.Maintenance.exe 118 PID 2508 wrote to memory of 1992 2508 TunnelBear.Maintenance.exe 118 PID 2508 wrote to memory of 1992 2508 TunnelBear.Maintenance.exe 118 PID 1992 wrote to memory of 396 1992 cmd.exe 120 PID 1992 wrote to memory of 396 1992 cmd.exe 120 PID 1992 wrote to memory of 396 1992 cmd.exe 120 PID 2980 wrote to memory of 1844 2980 MsiExec.exe 121 PID 2980 wrote to memory of 1844 2980 MsiExec.exe 121 PID 2980 wrote to memory of 1844 2980 MsiExec.exe 121 PID 3120 wrote to memory of 2644 3120 MsiExec.exe 122 PID 3120 wrote to memory of 2644 3120 MsiExec.exe 122 PID 3120 wrote to memory of 2644 3120 MsiExec.exe 122 PID 2980 wrote to memory of 2156 2980 MsiExec.exe 123 PID 2980 wrote to memory of 2156 2980 MsiExec.exe 123 PID 2980 wrote to memory of 2156 2980 MsiExec.exe 123 PID 3488 wrote to memory of 800 3488 TunnelBear-Installer.exe 125 PID 3488 wrote to memory of 800 3488 TunnelBear-Installer.exe 125 PID 3488 wrote to memory of 800 3488 TunnelBear-Installer.exe 125 PID 800 wrote to memory of 1880 800 TunnelBear.exe 126 PID 800 wrote to memory of 1880 800 TunnelBear.exe 126 PID 800 wrote to memory of 1880 800 TunnelBear.exe 126 PID 2508 wrote to memory of 5080 2508 TunnelBear.Maintenance.exe 130 PID 2508 wrote to memory of 5080 2508 TunnelBear.Maintenance.exe 130 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TunnelBear-Installer.exe"C:\Users\Admin\AppData\Local\Temp\TunnelBear-Installer.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\Temp\{7A066889-73C2-441A-99CD-02A227DE3E83}\.cr\TunnelBear-Installer.exe"C:\Windows\Temp\{7A066889-73C2-441A-99CD-02A227DE3E83}\.cr\TunnelBear-Installer.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\TunnelBear-Installer.exe" -burn.filehandle.attached=536 -burn.filehandle.self=5122⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\Temp\{35202366-DAA6-440D-B75A-AC223BF639E4}\.be\TunnelBear-Installer.exe"C:\Windows\Temp\{35202366-DAA6-440D-B75A-AC223BF639E4}\.be\TunnelBear-Installer.exe" -q -burn.elevated BurnPipe.{C112AF50-43B9-4C10-BE16-0347FC980F46} {10536F44-F973-4068-B7F3-130A5F17CEC8} 34883⤵
- Adds Run key to start application
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\ProgramData\Package Cache\72211BD2E7DFC91EA7C8FAC549C49C0543BA791B\vcredist140_x86.exe"C:\ProgramData\Package Cache\72211BD2E7DFC91EA7C8FAC549C49C0543BA791B\vcredist140_x86.exe" /install /quiet /norestart4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
C:\ProgramData\Package Cache\72211BD2E7DFC91EA7C8FAC549C49C0543BA791B\vcredist140_x86.exe"C:\ProgramData\Package Cache\72211BD2E7DFC91EA7C8FAC549C49C0543BA791B\vcredist140_x86.exe" /install /quiet /norestart -burn.unelevated BurnPipe.{C7DA08DA-2DA0-4ED4-99C2-23EB0D50F445} {CCCFE52A-9FE4-4B48-95AF-D0AF0DA2FB7E} 5325⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2120
-
-
-
-
C:\Program Files (x86)\TunnelBear\TunnelBear.exe"C:\Program Files (x86)\TunnelBear\TunnelBear.exe" -createAccount3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\TunnelBear\TunnelBear.UI.exe"C:\Program Files (x86)\TunnelBear\TunnelBear.exe" -createAccount4⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1880
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0C68F49A7CEBC6BE4B48A08C8DA7FA012⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSI108A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240587609 2 TunnelBear.Setup.Actions!TBear.Setup.Actions.CustomActions.PrepareInstall3⤵
- Checks computer location settings
- Drops file in Windows directory
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\system32\ie4uinit.exe"C:\Windows\Sysnative\ie4uinit.exe" -ClearIconCache4⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m /05⤵PID:1844
-
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m /05⤵PID:3364
-
-
-
C:\Windows\system32\ie4uinit.exe"C:\Windows\Sysnative\ie4uinit.exe" -Show4⤵
- Modifies Installed Components in the registry
- Registers COM server for autorun
- Modifies Internet Explorer settings
- Modifies registry class
PID:4688
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSI4DA6.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240603031 14 TunnelBear.Setup.Actions!TBear.Setup.Actions.CustomActions.DesktopConfiguration3⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Loads dropped DLL
PID:3340
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSI53D1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240604953 19 TunnelBear.Setup.Actions!TBear.Setup.Actions.CustomActions.InstallCleanup3⤵
- Drops file in Windows directory
- Loads dropped DLL
PID:4476
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSI2E1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240648937 35 TunnelBear.Setup.Actions!TBear.Setup.Actions.CustomActions.SetInstallFolderPermissions3⤵
- Drops file in Windows directory
PID:2644
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B1D318EA98BA06455A2BD5F1E51CBA14 E Global\MSI00002⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIDE50.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240639671 25 TunnelBear.Setup.Actions!TBear.Setup.Actions.CustomActions.InstallMaintenance3⤵
- Drops file in Windows directory
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Program Files (x86)\TunnelBear\TunnelBear.Maintenance.exe"C:\Program Files (x86)\TunnelBear\TunnelBear.Maintenance.exe" -install4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:512
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSI169.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240648593 30 TunnelBear.Setup.Actions!TBear.Setup.Actions.CustomActions.LoadTunnelBearConfiguration3⤵
- Drops file in Windows directory
- Loads dropped DLL
PID:1844
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSI44A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240649296 40 TunnelBear.Setup.Actions!TBear.Setup.Actions.CustomActions.UninstallOldVersion3⤵
- Drops file in Windows directory
PID:2156
-
-
-
C:\Program Files (x86)\TunnelBear\TunnelBear.Maintenance.exe"C:\Program Files (x86)\TunnelBear\TunnelBear.Maintenance.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\sc.exesc failure TunnelBearMaintenance reset= 0 actions= restart/03⤵
- Launches sc.exe
PID:396
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:5080
-
C:\Program Files (x86)\TunnelBear\Bins\x64\tapinstall.exetapinstall.exe install "C:\Program Files (x86)\TunnelBear\Drivers\x64\tap-tb-0901.inf" tap-tb-09013⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Executes dropped EXE
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
- Modifies system certificate store
PID:3256
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:4400
-
C:\Windows\SysWOW64\sc.exesc query polarbear-split-tunneling3⤵
- Launches sc.exe
PID:4424
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:3700
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Eaphost1⤵
- Modifies data under HKEY_USERS
PID:2264
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:2824 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "9" "c:\program files (x86)\tunnelbear\drivers\x64\tap-tb-0901.inf" "9" "4f0f7913b" "0000000000000148" "Service-0x0-3e7$\Default" "0000000000000154" "208" "c:\program files (x86)\tunnelbear\drivers\x64"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4676
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "201" "ROOT\NET\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:3beb73aff103cc24:tap-tb-0901.ndi:9.0.0.9:tap-tb-0901," "4f0f7913b" "0000000000000148"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3064 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff982f29758,0x7ff982f29768,0x7ff982f297782⤵PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:22⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3212 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3340 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4528 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4676 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4828 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4972 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5012 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4832 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4764 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:1844
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff60a937688,0x7ff60a937698,0x7ff60a9376a83⤵PID:4384
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5216 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3488 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4484 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4836 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3224 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5180 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=2816 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5224 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=4664 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5712 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=5724 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4604 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5996 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6140 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=6056 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=6068 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6232 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3256 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5860 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6112 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=37 --mojo-platform-channel-handle=5724 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6008 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6316 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6124 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6244 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2864 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6512 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6112 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6468 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6424 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵
- Suspicious use of SetWindowsHookEx
PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=47 --mojo-platform-channel-handle=5840 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:12⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵
- Suspicious use of SetWindowsHookEx
PID:184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6364 --field-trial-handle=1840,i,13620137889199658766,10371906727996361451,131072 /prefetch:82⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3424
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x404 0x4d41⤵PID:1600
-
C:\Program Files (x86)\TunnelBear\TunnelBear.exe"C:\Program Files (x86)\TunnelBear\TunnelBear.exe"1⤵
- Executes dropped EXE
PID:1944 -
C:\Program Files (x86)\TunnelBear\TunnelBear.UI.exe"C:\Program Files (x86)\TunnelBear\TunnelBear.exe"2⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4072
-
-
C:\Windows\system32\launchtm.exelaunchtm.exe /21⤵PID:1636
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe" /22⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
PID:4988
-
-
C:\Windows\system32\launchtm.exelaunchtm.exe /21⤵PID:1808
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe" /22⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
C:\Windows\system32\launchtm.exelaunchtm.exe /21⤵PID:3664
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe" /22⤵PID:2340
-
-
C:\Windows\system32\launchtm.exelaunchtm.exe /21⤵PID:64
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe" /22⤵PID:3592
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
878KB
MD50a1379262c510c8b73ff059aec45a991
SHA13e46a1f841be9c4468e744efe8fe5045c8ddaf3a
SHA256ba9e424c8f8f03c9085e2b154c1a659ad7407500b9ba0502c9a3d112dc835a67
SHA5120fe983e8ea6af5474af1ee99e42982cc70c9dd5a9fe67b1f8999367b59fa1e84dbb950b108a6fbfa4f6d18fd6f4d4c785f0e544ac7ed65d39b953597063f9013
-
Filesize
13KB
MD5c80570a852c6daefec79987003be4dfe
SHA12fb2c5fd29f5778939a56edee7c80deb26ff2657
SHA25661c7712fa8f92fe8a3e4c0c838faff9a83a393ad98f17f37502856311b8181f8
SHA5124c2c4687f62956e91cd1d8b109f3195bb3a1861261f0858f3a0bbc18a4ef4b39ca04ae1a78d6625863896339e77d7ffe70779713cfd384e49ce6a94c6bb388d2
-
Filesize
1KB
MD5fbd3f3cf7e0aca4b6665824caa1f8e53
SHA138bd67d1427d6c27bff33c390d39685664ce6af3
SHA256ea8a58fc943cca477a2cc7565114f713b3a77fc38a3219995314e26e9666435c
SHA51238af1be0164bb224cefcc3bf91bad9486db54822e3d31c14b06804426cc774c867f3e5f9629dd77229d73fdbd3e08767e724276e888e72bf012ec2d718579368
-
Filesize
1KB
MD507886979ec16a7de530589f280607c9a
SHA1fac2b2047e825d9dc39427dfd07972e7f0f5e40a
SHA25699edfc9b56d15e2688f96a2158c04c88f49cfef5a656ee5503f487e13bf2570a
SHA51271778c262081b7f19f20165baaeec63a763376671db805755992c60ccaa8f4ff9c3edd4305ab319a135010c26d8f2939096b8f8b5db0818d3176aca7bf488242
-
Filesize
3KB
MD5838d71a29d2361d990385e4f0c0275d2
SHA1ed4300ff8e5b3a5c667c474faf8f0c745c336211
SHA25697bcd7edb574810c2d753f0dde625d4172c9c467fb71111066f18cf0e4affaca
SHA5124cc21f5e4ee3990d3879e76a0aa775d2d2bacc647c50cbe12bfc85b7d33d09dcd54b58e4617f238dd12113a7c7846333997f1e5681f13d12c745c89c27b32704
-
Filesize
3KB
MD5e71064e62b76ca8658b71707820dad61
SHA1f91a22b0b13ed03d237ab99f853c0a2a165d6d8f
SHA256efa80d7293f778d4955986a829dda10ee1cb3250f68f4fe5348879d30f438824
SHA5124f3e207b6813e749cac98a7f6ada60bb642cc4d0d14e946dc318a89beb06c2cfece8c9314b3d4034301299df8f41b1611aee40a88b5670a6cb68b1a8ea11154a
-
Filesize
103B
MD5cc440e7c5db7633117340ba05c217a41
SHA15a4d9375f63604771e18bb4f27ac8149f5f24266
SHA2567fc097bc5d3e6bb9196a709aec21bf3a9e0dadeb41bd1a87d96d18716edf9a15
SHA512e7e44b948e58b98ae27fbb63139a16c26bbfef672cf8458cd92a24e1b346f9e07f92f61160a989a4822cf8197af51499bf872283edcf2aa74e429aadfd19de0d
-
Filesize
103B
MD528b8ea112aa450a5e2c4bf071736ca3f
SHA18c4a655bf7077f2fc21b1432cf069ec73e8669c9
SHA256aa6a1adbca3d51843d4ebdbe8a0aa6cc4baa2cee9a90547f358c293e013d9ea8
SHA5127af86894a53bb72204483f61aba3081894e6eaddcff811112985ede26d648b9bcb44c348140246de7f51729a70297a3d8debd0fd5aa1e59d89eb8d7b243d72c4
-
Filesize
906B
MD53492ce4355ee0491ce8563074e6817bd
SHA1528f38cbda085037f87a95e66d614defdff472fb
SHA25657c41ce29d0cfac2ba7ce06ff62c5a051fa761df99bd63afa228b872a668cd64
SHA5122980c7f40b1e58512e83e382eb54a4cb05feed87544b1b2a765dff1cd08c8f31deb61a554c0b15f08cd7a375607647db4d9a134616f31af749958b273c863080
-
Filesize
906B
MD57c9b44bfd3dba23397a9384bf75d17c2
SHA174a85c5366dcd046ef530e9066cec9c7d9b656f3
SHA256318ee724e6450cd4d1c3fd9676264cdcbc450d2c2708bf473eceb952e65c46cc
SHA512dccf2a484539121f7337577485ba23235934effed0d36264c19d4d85dbbbb6757daeb9ed0f8e719a5649eaacd492afcb8163e22e561e9a577a4356da6d061bd9
-
Filesize
129KB
MD55a8ace13abe6fe64b56762e0f7387d4b
SHA1c87c6b98981b5543e3f0159138d0645f0205c4bf
SHA2560e79d97ea9c8e0ae82ad15a1d3aa3f73f43a792b95752fcb38dc72ea72d971bd
SHA51230110f13aedd5e546fff62b62f4a29bc25df302b9ea1e57afdd738c356ef833e45e705d36b75d87d470eae6a053c7d812bc30ec847f5b919e49818931ed0f62b
-
Filesize
129KB
MD55a8ace13abe6fe64b56762e0f7387d4b
SHA1c87c6b98981b5543e3f0159138d0645f0205c4bf
SHA2560e79d97ea9c8e0ae82ad15a1d3aa3f73f43a792b95752fcb38dc72ea72d971bd
SHA51230110f13aedd5e546fff62b62f4a29bc25df302b9ea1e57afdd738c356ef833e45e705d36b75d87d470eae6a053c7d812bc30ec847f5b919e49818931ed0f62b
-
Filesize
129KB
MD55a8ace13abe6fe64b56762e0f7387d4b
SHA1c87c6b98981b5543e3f0159138d0645f0205c4bf
SHA2560e79d97ea9c8e0ae82ad15a1d3aa3f73f43a792b95752fcb38dc72ea72d971bd
SHA51230110f13aedd5e546fff62b62f4a29bc25df302b9ea1e57afdd738c356ef833e45e705d36b75d87d470eae6a053c7d812bc30ec847f5b919e49818931ed0f62b
-
Filesize
303B
MD54bfacebd3d5c61e0a9ea7aa64cf8fbf2
SHA1a081d793a00e1333b39ec5b501a66b1b2d899614
SHA256b6670efea4330d6cb8d6b2da20525b623e4a4ab9708bf0da6e5b12268d07a9aa
SHA512c1bd4b40e9022658776010e22a645092e4b3f9b4e68e675cbb496836d10e3169e31fd9490a0b05c750dd9029b5a74bb05804007408f7e88a6b62d9fa312ae4a0
-
Filesize
30KB
MD5555807910b820383d51c9ad736286e4b
SHA1524795d4d012537bddef87f306e4d82998d70321
SHA256d758e187c412f21757b38cde1d2d83cb38d70500d728ef93544cff10bf83f723
SHA512455dd189bcdc5e4ebbf267cb5a69955ea8b12b7ae230d802a6fe9e3c815965219791c900af3b6579442142059f5374291c236c0a493923f818fc2df68ccbb216
-
Filesize
30KB
MD5555807910b820383d51c9ad736286e4b
SHA1524795d4d012537bddef87f306e4d82998d70321
SHA256d758e187c412f21757b38cde1d2d83cb38d70500d728ef93544cff10bf83f723
SHA512455dd189bcdc5e4ebbf267cb5a69955ea8b12b7ae230d802a6fe9e3c815965219791c900af3b6579442142059f5374291c236c0a493923f818fc2df68ccbb216
-
Filesize
30KB
MD5555807910b820383d51c9ad736286e4b
SHA1524795d4d012537bddef87f306e4d82998d70321
SHA256d758e187c412f21757b38cde1d2d83cb38d70500d728ef93544cff10bf83f723
SHA512455dd189bcdc5e4ebbf267cb5a69955ea8b12b7ae230d802a6fe9e3c815965219791c900af3b6579442142059f5374291c236c0a493923f818fc2df68ccbb216
-
Filesize
30KB
MD5555807910b820383d51c9ad736286e4b
SHA1524795d4d012537bddef87f306e4d82998d70321
SHA256d758e187c412f21757b38cde1d2d83cb38d70500d728ef93544cff10bf83f723
SHA512455dd189bcdc5e4ebbf267cb5a69955ea8b12b7ae230d802a6fe9e3c815965219791c900af3b6579442142059f5374291c236c0a493923f818fc2df68ccbb216
-
Filesize
30KB
MD5555807910b820383d51c9ad736286e4b
SHA1524795d4d012537bddef87f306e4d82998d70321
SHA256d758e187c412f21757b38cde1d2d83cb38d70500d728ef93544cff10bf83f723
SHA512455dd189bcdc5e4ebbf267cb5a69955ea8b12b7ae230d802a6fe9e3c815965219791c900af3b6579442142059f5374291c236c0a493923f818fc2df68ccbb216
-
Filesize
42KB
MD5f54b4a9f87af5abfcda4cb5287e4a87e
SHA1640a37a8bfbb5cc0e62b398deb97c9cfd32149e6
SHA256d891f0066baf8bc00ad03a3cdb2c02e7227a51032c28a7ac6a59eb5d339372b6
SHA512d658e8dbcc724ac1a75d2cd783852dcc5059bc1481a23930917aadcaf464ae34f1a164bf86c99f3143fcfe30d9972149c8eb0bd05243d8e32621646f3117df72
-
Filesize
42KB
MD5f54b4a9f87af5abfcda4cb5287e4a87e
SHA1640a37a8bfbb5cc0e62b398deb97c9cfd32149e6
SHA256d891f0066baf8bc00ad03a3cdb2c02e7227a51032c28a7ac6a59eb5d339372b6
SHA512d658e8dbcc724ac1a75d2cd783852dcc5059bc1481a23930917aadcaf464ae34f1a164bf86c99f3143fcfe30d9972149c8eb0bd05243d8e32621646f3117df72
-
Filesize
42KB
MD5f54b4a9f87af5abfcda4cb5287e4a87e
SHA1640a37a8bfbb5cc0e62b398deb97c9cfd32149e6
SHA256d891f0066baf8bc00ad03a3cdb2c02e7227a51032c28a7ac6a59eb5d339372b6
SHA512d658e8dbcc724ac1a75d2cd783852dcc5059bc1481a23930917aadcaf464ae34f1a164bf86c99f3143fcfe30d9972149c8eb0bd05243d8e32621646f3117df72
-
Filesize
139KB
MD59cb10e46400b752cfacfadae0bcfbe20
SHA1fc8256b846f3bbc0ef66bbe7cd6ac08973fa5129
SHA256cd4037859b10a7c389bc1c031556e5bdc860b98f98d48054f4a26ee65cc3a943
SHA512b8770955f8187b6f10e03ae7c9be629df2af47a83c073fac9acbf18defb351b542c1ea336de4672b40e75b378af35ac2ea3a3387f0db2728a29fb7607d140165
-
Filesize
139KB
MD59cb10e46400b752cfacfadae0bcfbe20
SHA1fc8256b846f3bbc0ef66bbe7cd6ac08973fa5129
SHA256cd4037859b10a7c389bc1c031556e5bdc860b98f98d48054f4a26ee65cc3a943
SHA512b8770955f8187b6f10e03ae7c9be629df2af47a83c073fac9acbf18defb351b542c1ea336de4672b40e75b378af35ac2ea3a3387f0db2728a29fb7607d140165
-
Filesize
139KB
MD59cb10e46400b752cfacfadae0bcfbe20
SHA1fc8256b846f3bbc0ef66bbe7cd6ac08973fa5129
SHA256cd4037859b10a7c389bc1c031556e5bdc860b98f98d48054f4a26ee65cc3a943
SHA512b8770955f8187b6f10e03ae7c9be629df2af47a83c073fac9acbf18defb351b542c1ea336de4672b40e75b378af35ac2ea3a3387f0db2728a29fb7607d140165
-
Filesize
136KB
MD527a20d01a693a28e77a7b68c0902cff8
SHA108a8762a0895f15174216d9bbe8a9ea90c02124e
SHA256d84c68bab7a8074fb2963612fbf183dbac1fa65808079dfe9fb64068edf800c8
SHA512d1ad685feebb2f3e59c4d9930893159802bfa698f43cd323d74e03d9e53b0475e2c1fc5a079dbcb6fa9c1ef59277bd0b3f5579cd100518ff569bebeb7fcf11d4
-
Filesize
2KB
MD5c7f38a377f80f56c9cf32eb21a8677e1
SHA17c3e20afcab438008c08d1724f442fd454190c3b
SHA25611d3ab7a7a98369ff447f46d11e68b9a9232c0cbe032d9f70dd4de81148242ab
SHA512ee05c0cc65a5ff3bb87fdb7147ef363c6154cd9f1aa6fcbaaad8d54c956ce2f4db6b59193acb6a1668c9ad18595072c353af1a4e9d29a582c80e411aba36ae10
-
Filesize
2KB
MD54f48c87de1a22f752974f21d5ce2aeca
SHA104ef45f5f99c362e0d92aee7e16011ad35768fa7
SHA2569a5898931cc96be0e19ddc39ac27bbb10285ccbfc5c6d6a48dd60364defde3ec
SHA5128364f6ad2ca14f52762564d4d4392d547560c2f67b356cfc55df9f39f06de518e42ee65dc8ebb66e7b6ddfbfc2dc3267f5a1384a145ccab3837ab63e3b48fe44
-
Filesize
1KB
MD5e152bddf771aec556b4748dd2ebd5fde
SHA13c3a081ddf760f282fbd1bfc3968daacecb79ed3
SHA256e81d53e5b826aa80e30003c5785bf51be83ae406f6300143deaa239e66ae7df1
SHA51298c1d442c81d757d1869afe055800d31039e4cbc4f795906b265c2ceee12252d167cf6c1342ec45ada46ea147e88394fbe223845acb3abe837f77d2102700ade
-
Filesize
13.8MB
MD5a3cb49daa1347ffe34b517f1a12f40ab
SHA172211bd2e7dfc91ea7c8fac549c49c0543ba791b
SHA25612a69af8623d70026690ba14139bf3793cc76c865759cad301b207c1793063ed
SHA512e3d96cc4c822793893fc3831cbe40d7a53ee8eca3a73021aea2193bbf5c5a05ef5fa4a9fc314c29ad5392f980997a25507caa9cf3a1e3362674ac913fbaebb17
-
Filesize
13.8MB
MD5a3cb49daa1347ffe34b517f1a12f40ab
SHA172211bd2e7dfc91ea7c8fac549c49c0543ba791b
SHA25612a69af8623d70026690ba14139bf3793cc76c865759cad301b207c1793063ed
SHA512e3d96cc4c822793893fc3831cbe40d7a53ee8eca3a73021aea2193bbf5c5a05ef5fa4a9fc314c29ad5392f980997a25507caa9cf3a1e3362674ac913fbaebb17
-
Filesize
40B
MD5b6b1c6f86742f7346412dd6d4940f02a
SHA15dfef7ef71df9870055998f6cfa417ef1b08fe8c
SHA256b898f96a4ae7372c4c528b916868a26400ba61aac2c5fc2a3ce78e09a5c17719
SHA5121aba509aa709d3199521cf9c8f40616907fedcf5a52925fa1ef0baa2beb16b88200f9831edf3ec21f7880b246838ec75f261a9508538548c6a35743288a6b8f4
-
Filesize
37KB
MD5519005befdbc6eedc73862996b59a9f7
SHA1e9bad4dc75c55f583747dbc4abd80a95d5796528
SHA256603abe3532b1cc1eb1c3da44f3679804dd463d07d4430d55c630aba986b17c44
SHA512b210b12a78c6134d66b14f46f924ebc95328c10f92bfed22a361b2554eca21ee7892f7d9718ae7415074d753026682903beba2bd40b35a4eeb60bf186dcdf589
-
Filesize
20KB
MD5923a543cc619ea568f91b723d9fb1ef0
SHA16f4ade25559645c741d7327c6e16521e43d7e1f9
SHA256bf7344209edb1be5a2886c425cf6334a102d76cbea1471fd50171e2ee92877cd
SHA512a4153751761cd67465374828b0514d7773b8c4ed37779d1ecfd4f19be4faa171585c8ee0b4db59b556399d5d2b9809ba87e04d4715e9d090e1f488d02219d555
-
Filesize
309KB
MD520120ec6c1f05ba463028873ba5d392e
SHA1e6ed410fcc4c8660c567cb7cfb0776fc1ab5463d
SHA256e200a44dd90dcb91e53c0df5ce75b96da45b60cfbb8fa56ddd790b17fd01d742
SHA5124a9980f09c41ab4b3e7ec13fa694ac921ca61108085b405c92f46a4d4ca817029977b1cac98113a21c381d7537c7b87ce18b6532180f5f84f5b72262624d4e74
-
Filesize
76KB
MD5636db1ea1234dfbea65c37e844ebdbff
SHA1503be88301c78b096d383ec6d4eb51b54bf8e82f
SHA25651a192f2780fe0ad722c5248978f71ae96ad255e4383fd7856386df4d2d5447b
SHA512a808b40460947db546247f1005d081ae1cc82439572be4a392906c299ce973bd7b2a16e19ad69fa520c5eee88c668ae9f3e46e89b2a90db042bd5b5e0a4c7e64
-
Filesize
65KB
MD5b073d577d7e4df41dfac73ee1d0270fa
SHA16204b9242f8df0124de9ae7b31cbebfc85201fca
SHA25666fe4c2a21e0f0cc46184a7b679e1562f3a7cda9cd8a16a9a446b9fbfe18000f
SHA512c397bc9f8f0c3dec9b38d07ca35473fa103c96e58c414fde3352dcb47db262a887443865bdf1ef36e6b8aee461775feb34ac1eb3deed736673cf13c5dc828a0b
-
Filesize
624B
MD52ae0bb1918f6598a6da2620b54b4be89
SHA1eaa26662371249c9447a921ea3deb2ce46ddff5f
SHA25695dc641602192be67865934a7c201657b1b3e5068eea4eb7bfbb404157c9d4c6
SHA512f3714d1cfa4b37ff865f2803876fe16cfcecc86c164cc493a1478b3357d31b83177e1f5927390a0b3176bf19d3a3005dff89e60cbd4b0b2f5f5defa981f83aae
-
Filesize
576B
MD50710ae7294198d81fb709f17e5bfb382
SHA112c3845761a27b29ed602ca22197913e17eb123c
SHA256f76edde48769595a2fcf1145b1a0489e56b747b2d45f67575de71bfb93df554c
SHA51275cc25c3fc04bf8042665039874dd148a377d14fff1d2c021622ffba4e7da152b0c988064bb63b5ad66ef28a9270cd9ce3994661370885e0d69c448a9c766179
-
Filesize
768B
MD525a8b0709d8170dddb6a1c68a3973a55
SHA1bb2348361f703f1c1696c8769314bf4476722b4b
SHA256ec3b30a6ad7e08cd8895228f4a2da67de0865918059b5004fe481cd5bfee02e8
SHA5121549385233f4c78a1e9e4374e4745c5e25172197e70d37ac2fba456db3f7f33f941478616d31330a5976db15a16f2939c9b463b90fdfb95420e1aee7bf8a6665
-
Filesize
1KB
MD59362a3a8798304b6310257978e63e326
SHA191d0f73b1287077c7cc81c825aaecbae1bf57add
SHA256e6f7c486bd88017f2760df7bf7d91a7c26d2c9d5823e70dc1cc7a012c9e53f4a
SHA5123f666b8dd9a942e30bd7a6b90aae354d14e45b274c635838020c94fbf548425ec1f21bb9b92d6899cf21fde92bd0e95e516deb192ac290e494394f5d311c41b9
-
Filesize
1KB
MD5d42fa2d734222d6f50949bd8b0973b25
SHA19ceb9adeac55f1e134e1084c8a012a8eaf7ea0a8
SHA25621cbf213b1941b17f48975c4c53d84018867615b4881f1e1f873bd87aa63509f
SHA512f39847ed0767dd5bded38de8080ded7c1c6288b2ba4b24de79b3e7b397102dbe6429118c2c3354f568f619fdb4907545ef39b64ed8dfc057eaf4f942f889813c
-
Filesize
2KB
MD5c06641d781bf8f8239339c8266331418
SHA1fc804f18c1e26bf8d4b0297dcb64c6d2101e22a3
SHA256c8cea1faaf4d08e8b1d34111f1ba9204b40d315316e59e1633deb4a269eb780e
SHA5124f201ee19f93b064fcecbf27f7a2b3a0449499c83a05e7945b227da28f8bb2a9d3c4bddc4dd0b2c6f2888238572b87ae6bfce88a09df3a36cc00cacbfee0b00c
-
Filesize
3KB
MD5c0dd3a0b12a144918ddc0a27f38043f0
SHA1d996bc0c149e30edbc9c28c6077940a98117061c
SHA25686d3b37a5105c4f3e7cda1a79590bf7255c4ed55e9a8760c9bdd7fb58df2cb74
SHA512168e5b4c36fc76bda9bd6be11663aefee3f642521bcef2d8b4c8954e7d90a4411b9fd38f0982ad9ec382b52c877b562c7e4c162fefeb810c1c9b210655759771
-
Filesize
3KB
MD59860350d48ecffd0c4e572a52850cb82
SHA12e34da65b02bbbb00a5d80c5540228f7831d72e2
SHA256bea1a0e5cdf5987afc5033e1354c859fe47a1e57075bce5d4b6e0eb311d27bf8
SHA5126233e082c76b08f37062ce7f419720b10d7e5e837d97d2b927e2aea98891e645a0398a3bded667f9f0192861402885ed4acdf79b0239df4cbcf7e1d65ab184de
-
Filesize
4KB
MD52be7a3bb8b83389a4fc651e2a8fa2558
SHA16dcf17ee13a02f2c8695ea14bb3fc5355b42232d
SHA256bab6dc8abb448af5b72d802bbe46c3f68c40b909424fcfdf5210f3604236bfbe
SHA5129e069d886040f2d797e2192f9bf9ce4d5c9e7ba50e84ffcdd303c8f294dab384576f98901c850a4e00fd3255e2d6234effa37782c986b5b7f65f3d309fb5f9b6
-
Filesize
4KB
MD5558a37b3d4ca556586c4e9c2aee96e80
SHA1bf47371b5da2062caf73ea2294cf0e750e57e82e
SHA256a11135586d2b5a959b803345942a38a658dc1febd49c54f2891c434c08df72f4
SHA512c9c6576004bd0d293eb0349f38f407e51d965a3c7331ccdd155dcb3e5570d714ebc7e1b32490add9c7d7a717a32c0d895968857e6c3741eecae3b8a9f20cddf2
-
Filesize
4KB
MD5aaca60d4b9a9e5a61cd02ad16cc8b3ea
SHA1e4bb25f7fd95c725b4227cae9044b7f176c10250
SHA2560b07ac75a0949df693c0401786dc104dcdf249252f43865985494be4d90b332f
SHA51297f28509cc75968950f082b280cf044d9fc6bcabb0a4b6b983f5e33824457e286a874d241e850a78dcb9726dde25637825ec2ac498dc9632f48d9be21315f60e
-
Filesize
1KB
MD543e07503b78c3ecba237d7aca5f088f8
SHA1440d3689c516b5c0ca41510e755e227b8cd99067
SHA256fd7fdefa5ca8b45cba4a58e1cdef6cca38514e697d4a790dea1f6d886ef0c921
SHA5123b67fa13f54fcc163eb561b644ab5957eb5d828b2374f7f6922f549a62722b4a23eb22c34d92b541c699ff919fbc7ec1774383334474a9a780d29ced10dd7b6e
-
Filesize
1KB
MD53d0e65bae12fc71c562b13ac1fd988c5
SHA173e7726c9c47fef195a53a907a66eb942210a0af
SHA256a8832667cd95f9ae9eea092d048f0c5cd076847b279d431058491f497b6ad5d1
SHA512b4d1a7310b87cee80c20754ac1f1fb1634f3ffe47d1603a7783ad415cfaad2260cf9c3e20e2417c1d9c63800b200c5d663679c52fe34e3ab5b82816689c57a1a
-
Filesize
1KB
MD54e7d3bbed739bef022b6356fadd11efd
SHA13aea296640eb4f16dc89deea293eec64bd47dd46
SHA25672bce9580c6c88d5c244bffbce1bd0f467becf134f56fbeb2a4d584a515918d9
SHA512d732598a76fd9f88bf292aba39d6b21175257945e506a28507cabb2d873a29cfb65844118a8f1a438db5cab8e361de6dc6dfdb6446abf3d9d68803c3bc3b46fb
-
Filesize
1KB
MD5fdb5de0cac39ba82adc80c406f29a449
SHA19375ff79ea62c2d11611dc9637ab15133f3331f9
SHA256bc15451388c30f564f0474a43d3dc90c4b3d50024124e8506a6853696ab66571
SHA512d93fb93c3324439ad47ee3a6ce8707490a42a8d15e357b1d9fca1776ed377fdbf124b45acd3f10bdd392675bc9b098fbfccb538a8f3b42757645ebe6c4a496c4
-
Filesize
1KB
MD554ee4100d3116e4c3d2e7fc0fd1ddc99
SHA1e23d4f19d7356b58c927bd4f826d1aa30b18df1d
SHA256f257ca478b0acf0fdebf121cfa1099d411795846c909dcb0a9d4c0a72117fc28
SHA51215d41123c9914bf431ad3aada55851814ce0c96111bc7aa2de1b0d220baac8d5fadda8f18886ea1ef25b39a16e6097176933ae952f85ce1fa1228d3b27c8b533
-
Filesize
1KB
MD5b3ce99ad4c1e4659e139ed53200d9d6f
SHA153d7ffd36d40345c4c84a664943c4adfc98ee34f
SHA256e406981a99c7c280612bc80bfdeecdc97f32217330d33413f694c49d2de5cf3f
SHA51243535b49e5568922fcccfef891a646bc29a277cba5c75f3914b3e9b7f255bd1314b5a991d72e071db20712fdb8bbe217124f590294c648c4ac775facf4646d39
-
Filesize
1KB
MD5e45ef21c649f194677186e5ed50c8f39
SHA1da9c644e92e0c066975f0e6f72025f1483f4d232
SHA25642f85f23d23892d294281ff08be9aaa33d5f367eca2d1a7e4929d544e51d73f7
SHA51232c0210f870ca115e783521762ddf052c97be4557d33825fdc9da57867a2d012c0b5f348b6927693e1a0d1e242790e926e4dd391075fd327c10bf0168b1b77ac
-
Filesize
1KB
MD5f34deaead1dfc5716aa0698a5eb0948d
SHA16c6dcbf8c78321ef9c0ec69bcde2099d8e46120e
SHA256f5cf9b391378c2189205c1b044e44a228a1ff4d65f11a5d7feaec926ada091fa
SHA5129cbf40886a9beb97b1e739753dba2205522cb4f6193590f53eaa8b8a1694f64dd9bde1a38bb7df3b7a8b761ab79910c1c01e29f247e5a8b83ffc91d0b3240ede
-
Filesize
1KB
MD5fe578a08568a882c4d30712e3b2c8226
SHA1ad75d2df0d2823b1dbc75031de4c5291fdf48add
SHA2564d7afde9e9abf736223ff2b46f3aecd2ecd0af80a6252a609137aa4920d9671c
SHA5122cd092e872cf4bc9420b24ad4f493421cd824225fc814685b000ac18d1bf5034327425fba86389ae0a817d170a3ca38433548b1eadf8cebb3b1f83b05a14077e
-
Filesize
1KB
MD5d2d5ffd58632b9816c2208f12ce84837
SHA10d0efe6849acf82d54ec924bdc523ad5ef446b06
SHA256e317aaeeaca82068253aa4dcd757f70670637e8f976dc8ea0c39488c689ce948
SHA51284c638a15fe1ffcae57746f249883a95bb4a7c0dd875db07607e1a93fd60f4bcfbc10edef1b6136f058da811d4cb30b6fac196a43b700f2edac943f1a9647d24
-
Filesize
1KB
MD5465386b422828c6e9386aa970faeade4
SHA1ffb59ea8d928f3155915b51340a8353d4aafbf72
SHA256cec5e1f67352a2739f82a59c1bd924ee8f3678c510cca736bb1a0e033eb8383f
SHA5128eb52c54c1a34d489115169a5d20a0e8a736ea404b4c67be47388f0d6956eac4726008c1a7368c6bf8547d3e03a299ec2f1946151b86c3e0a5b63d97e22fb07d
-
Filesize
1KB
MD5564e5cbf3280fdbc2bcbb8bacf579381
SHA1b86fc6f6b42103fb1b059758c0c82123a4eedb38
SHA25619ad4c92f2f2ff207f560ed13d35fd913e9082fddf0af3652793d800c7fbb64d
SHA512cc7c6e772308c593f43d3da269b4be47891a9e5228874633c3bd9d4d973b2999105811c59e35f9f8332e649123cf1552d18fc15c2eb07c96adc4cc2dd80af79b
-
Filesize
1KB
MD506724665356f100bb57acb66d2c7e39e
SHA11c352596d59550e758edc95b93075bf660ba1270
SHA2562c2e4e910bb8408a586bdb30021b72a8b4b361682616cef129095f7af61e322a
SHA512e89be8384644bd09b1cf53596bf41376651973bf4165d350be996fec0faffbc1e17c7174aa6e07aa25eb60078d89c9678097306d3ad71b1b2d70b9b18976a604
-
Filesize
6KB
MD54ef350b307c7c256058391cfc23f8aef
SHA17506542e6913259c3724a351f0c848529405a140
SHA256641490764a4f9446e05a28d6df323680dc2eba2e0651fcf255e4c4f5ae8a9eae
SHA5121ccac36c06bc5ea95a7867cf4e600816d123dc39039e19969ec0c67eab77ad694f027d82b79d3ce058c082f84b695a02441995f4943fdfb7e3f26f24728ab264
-
Filesize
7KB
MD514c75b46c95581c86fcbce96929c0c78
SHA1155fa29e491947f5e2fe6d9d8d4ed0facf527ee5
SHA256a11168004c515a5795e69b53b991bdfb26c8d1fdbe73d1e8e8ea57289aae4295
SHA512bc668104393cbd8a6876b4b8a70ee436011c11f2bdad82d240deea1ddf0c50a54776466fecddb99065d4bf98c133c356c69967924f9bc7276bb57eabc565b71f
-
Filesize
7KB
MD571456520eb24fa39b2f34994a1b0752f
SHA1bcf2a723e650c0b52a71cc47566c929ee40ae3b1
SHA25681b73c9274b217742b17909c61b32b726cc41d07946e3f9c5882d3dde3e04057
SHA512db94f2449e8b3672e95945b3277b7d28dfa4a2269bd8161c6ae464938943ca8cb75e42de320bac290cde37f32bbba58e3383389bbe04afe5451fdc64dc3a27b4
-
Filesize
7KB
MD5f0b0eb02133409544a09b6162e9030f1
SHA121ea99d84585ac7cb75a0eac08233713c08ad95c
SHA256f66417ead48c514e9ebd6e0062e3e602124dfae597b7d789cd568c394237d04e
SHA51272afb93a85668be3f18721adedd941e23d512e3fd6068734bd214450957c46be312b04a6291ad8cf6044bad3d73259c9bd31287ce51fe5eb1329b1d18a1067ce
-
Filesize
7KB
MD5d68a07a1fc804b69414978b9bce382e3
SHA1fd2cd023bba83c5035ecb43806f3870952909a65
SHA2563eeeff55a61fc9a246e627eb0f3ae6f0af19788478f428f9fa481b4a8a8b47a1
SHA5123519eb6ba05a3ff14f5d988b9058991bb95e309844dd619b4b3c7af2fa1031b6856dfddedcd05b71a21231fd345e58c83e0aee9a9b975141a4221dc58ee80095
-
Filesize
7KB
MD50ff3b005acf17e9300ab4c278096bece
SHA16ec6997af864fbdeace9d3d592c07bf5657b0a8c
SHA256c86ae6eb10fcaecddd7783ec00c207e6a208cec4e5a4a624bda243de0354c95b
SHA512288da3821c4dc49e6b5078e372c7147a350aecde2aa52c362c0caa7ee5a59a7db612951404382d6b550d7ffcb9089fb9c932c6bd51b04283091b542f461cb091
-
Filesize
7KB
MD597dd7823fa53912a37071b866ce335ad
SHA1b026da64ed0d6d9776ca4f71a81acf0956f05a06
SHA25642df31f18ae8046f1f5b7899f59576a3fcd534422c2f56d104f64270599ec3ae
SHA51291e06f3c9297077bc9e1c72c585cc29fdb5a86a22f1cf1bd1ee74bac0b796f80926ccc74f912a5c8273f6af680eca6289bb117716db220ebabc221b311845544
-
Filesize
7KB
MD589a3a40a0141d68461d26c2bcd40e149
SHA1b1932c46fe455462562e8c6549c729b2226bc81f
SHA2564a9263ac1c2466b47a560882aae829d3e5be69fa9a848e64f675f22757fa3a86
SHA512922ca5bd3d1e818d319518821212348efc5f3a7ddf2ea3b3a028c4d32f8d9e77c0be5c67ecfaa199a2899a930ef0e6fc3a75e2fb2ce255357cbe1bb6aa8dd44c
-
Filesize
7KB
MD50e613815cc59b8ae397df3b5b54aad1c
SHA13438c580cdebc23b780ee161632e55dbea1e0366
SHA25614f79028f4764e60fbfafc3a04804908dc1f9d70822304c8e8d77a43c59ccaeb
SHA512236b57736301f2e2bb0ff9e0791108dd08d269a35c78e2dc334613e462e3438b63350ddd162ea2a6ae21b80673fa8d8847bf3d67a0e5275d627dbbcdbba3ef64
-
Filesize
7KB
MD5dee64dd9b57e7936971ff49800b68185
SHA1af62d65e9782eb88ef45eb022b32b27b3ea50641
SHA2563d7b9836f3f5b6f14581ee1d24bd2df6b476f8747195cdce1775cdbd95520578
SHA5125d3c7d1cda11df542e9042ea2462fc9f1b0c84656737db444c4066962d41cd90d0e225288a4ec3534d2438875a40614299f7fe756031b6632cff7a1ae071fa46
-
Filesize
7KB
MD5d766979cb781111ff7a54700048f4e99
SHA19623d7bffd50ef1db572a4cbd957b502319ac5eb
SHA256611d82cfa2ff9454d2416326fff6303b0bbfb895576eeb934a716e345e2a6615
SHA512afffba0a6babd02431143757f04d4bf9c01616e03ebc48889c9593584fcc69c93684d42cdb1bbbfd61c6775950ba67cb2a5b4bfe8ac01aeeb09012a01e6562e6
-
Filesize
1KB
MD5add37bbb2d046503277ea35037f88fe6
SHA191982b242bc4f50f440749d00869243dfe4d3b41
SHA2563d8d1bdf42ecb7589ff25934db76c396691e25265d1757bc831082b764bb3f52
SHA512b7b71cf9f5d8c8af0f539edebf63ea37edc864109f1c0c80cb452a3a52e9fa79577e77852cda4e145666694d2dd157167d0ed9f4ed4d9a122a896a8adda690dc
-
Filesize
4KB
MD5de5f2c000ce95f538d339abbadb12c08
SHA1bd3da19b31dfe543ef3d16ad0474d73d8bdfdc96
SHA256c6040ca82201a917456969cd7ff7187fa823d90bfc198c2d1d06744e402ddcff
SHA5121a31a31cb6cbcf161b568c576cf36b043ea859c67e877d0586c585ed570e29c9bd6ef8a20067abdf31c07935c5b7404f0dad070f1510383063cafa7b757c219f
-
Filesize
15KB
MD51ed8187a7b9ebac46c82144464ca3d92
SHA1f0a02efc793b5f91b44ffc73cd5144feafdfbb8b
SHA2567c683ed6da61323dfcd06ec716dc4c5b362e48ddd86516d6c20bbc2d91d2ab1e
SHA512e0c19e980237f8a6c01353097b9e876bba6410010dec0eae9a7e90686c7dba944cbeabe187647d105f3231d7d990f8e62281217df4511dd7f971a6fcae13d0b9
-
Filesize
154KB
MD506139a782c1178a5f5b9ac56cb8fde8f
SHA15ec87d46837e5bad4f86273e16c4745b1a036701
SHA256af116715235be052ef1db71897fae3c0433815687e72f5c8eeed4903792f4c2c
SHA512498345f1139f6ab1319c6376551439f36fbd5dd43a257d52e7226036670ae8312a380c78cb097fe33b19a37cd96a30fda6908daa7f02c68740fe0b0d12966ac9
-
Filesize
154KB
MD5245537d37e7dfef117b407edb3515d58
SHA1a7c0ee72e552b8280b681f68db368031f01cef52
SHA25679a0f108ef41a6dddee3f31d0b6399fbb26263c3cb2300d1b8860eeb97fef461
SHA512b6b6a1f02e96c40ced1bdb848bec3f785395bdbd799e36c3cd1c7364bb8babb2b822d822be3c2cce767992531e6c3f4554d94acd39e9d9309059276efb92ad52
-
Filesize
154KB
MD5ea1461632ee7281787c5aee898199aa4
SHA18559db8f3c10b4d95d147598dcfdbcd9d890b7c0
SHA256ed9ce78fb20c9a06798010436a2fb89d2b0655a9981c6088a9e3a995c738c760
SHA512e93618dc8bbd312ce42c60440e2c7f01f9487af46d4b3c10f64b057b5f498ce118294555356df1a4d781d4f4d7e8450a8f8ddcd7cf97f2afd9305b39843d271e
-
Filesize
154KB
MD5f13c2bde47690fa40116627fe66c39a8
SHA1e2b46a3b3f081d0647c165ed54a71fc638b24929
SHA25675da6518279266e4fb31470e4883b5f1d0631f2e2335190a1023b12c4f1e8462
SHA51263d989a6979d4e658e46c9e1ec4bbaae872c23b80926f4b61a93ad3469d5028306032491f39fb4f656c8f926afdeb44582dd4e370b7423d14367a3e907188a0f
-
Filesize
154KB
MD57fd548e8a1472f692496a6a8192621da
SHA1f5119c0866ff9e140e307be8b89721c19ebfef7d
SHA256f85770a11c9747acc575f3495601e04399971a62d7d47cc0958e636bc8bd53ca
SHA512d1a0ad80d693b1bfb821bc64daee43431ddda28ae376673f356a5b51dfcd83ec257e0a65efe43c7ebd073b2efc483efc1c362b938ee00ed4072414ed3354317a
-
Filesize
154KB
MD55a00feed4504f1a8acab3f6a7c005953
SHA1355f7a672135338bcbd0565f9a5e2a89608eeeff
SHA25688397dcc420699972f49d6ee37a1e8f012749a8fb530a458ed9b6855f7cc2973
SHA512fdfacdb1c16ffe25eba9ea4a02ca1473e994e35ab60ba04b40c8fa9d1783ca5a8eed0ba67d76aff7aefb6dfc7a32b45580fbb7188dddac73305c8270e6110022
-
Filesize
154KB
MD5481122bcc13a4a4a7d88f89502b614a6
SHA1f67af6278e72f178851a02e21723e855eb4ed49c
SHA25656b2f4c11b93caf60afe418d6d9bdcd8e27cfbb037cf61f2407ebf2669d24e60
SHA51246da82a369c66c0cf847519e85abeb24dac9c10d8df91fb04e2e890e1766a73d35e89af108c62df93ea264f22c072b129ec7097448bcef616040208197e13206
-
Filesize
99KB
MD5f96b28dd6d77db3e7498ca82911b3421
SHA175d7e8d8dc21a3a2b8ee41a5400cab2b6212ae6a
SHA256175222bea37d417e22f3f4cd76286437dc4d4f425616fc94bb49d3f48dce30ba
SHA51256ea06f72a48b28527f9d81456981accd9b6dd3fefcfa1bae971ad93282a66e943ca54bd6705354a4f3cc6ed8878d5662cd4556d27c669084adc577d52d70014
-
Filesize
97KB
MD5c52d9dbb408f34bdec7bd27bfc96ecb9
SHA19b3e3244d45921560e47f2df7a2f4d8c59a5f911
SHA2564c35f03eb58f4ed62cb8677130850e3a0d3f96611672a33a3052ff1bfba00ccd
SHA512a9a2b6c70a743775a41cf856228e3c5e647d1ddc1bedcfb548d7158886a80997dfa124e26869e223faa248578deff0901ad6ca6314bf6e1ba022b522ec77cde7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
152B
MD5029ccde68fc0a5147332474bf7c5521f
SHA1816a4b4cb02c8006ae37896a888d6926066018f7
SHA256f4145a00f1d2bad97fff6bb88a45bd85d94f47b0b258e655b86cac6e44b49ad8
SHA5123252eb5ed49e12b95ace5311ee620ca93075c4cc03b659d883dc55d071322a6997a041b77862a26a7a6d85ce524b323597ef099902f83316d6b8a1fd1205826e
-
Filesize
651B
MD59bbfe11735bac43a2ed1be18d0655fe2
SHA161141928bb248fd6e9cd5084a9db05a9b980fb3a
SHA256549953bd4fc8acc868a9374ec684ebd9e7b23939adf551016f3433b642697b74
SHA512a78c52b2ddc057dabf260eeb744b9f55eab3374ad96e1938a291d2b17f204a0d6e1aa02802de75f0b2cd6d156540d2ddee15e889b89d5e619207054df4c1d483
-
Filesize
87KB
MD5b0d10a2a622a322788780e7a3cbb85f3
SHA104d90b16fa7b47a545c1133d5c0ca9e490f54633
SHA256f2c2b3ce2df70a3206f3111391ffc7b791b32505fa97aef22c0c2dbf6f3b0426
SHA51262b0aa09234067e67969c5f785736d92cd7907f1f680a07f6b44a1caf43bfeb2df96f29034016f3345c4580c6c9bc1b04bea932d06e53621da4fcf7b8c0a489f
-
Filesize
237KB
MD5783b8cf45e1d5fc113448eead9bf72a7
SHA100c34d748ea77411a2eae71b455acf5504e45309
SHA256d7367f379e450af3483ee19431e25131da59a81bdeb5197330da01bd7873d944
SHA512eaf000e28dec64f5197680dac217f2e2df6929da1b2f9731611e25a1ee15b0f0ab5578ab941a223531fe926f7349ec31a00bf24e6a41e27cd7e6205710196108
-
Filesize
1KB
MD5eb952322f793995fd7dd05936ae06ab4
SHA1496dcadfe5ce304ba1098d1230f35b49051f868f
SHA2564a2c61a546ac6e9045cf7dc78b4370d4a0bd711d450523ac9c2777a5104cd0c8
SHA512bb4e6e4d5a52f12d309bd86e5323c05220e6e7d894adc93f0e43cbbab04a62a4af30c423fc886b08bf4b21fa1f6ff63e083c133a9215a236154cf6d6446e34ad
-
Filesize
171B
MD5edcb863ded41c01aaad31d0f96fbe953
SHA1466cca83b4220555a2ef084dcb3a99a0ab22ec6d
SHA256fa7db1057c312a08179d8b9dc340cdb039a2ca83e987bd90589cf021f666ddef
SHA5124ed4e1728f610132b48946b5edd9e2cb81c3c8b8df2ae9f2b6e2a6b7b00e99dd088fe3652f24edb7de93a2b1941dad9bcbcf07f995820ff291b963b10dcb969b
-
Filesize
4KB
MD5e339b405c51aed7d2a1f1b73bebc6ffe
SHA172c668d9d8e85a4ad549a201dd32d61fbe551f7c
SHA256524151c3115b0a8d9574784812df314e2b850ddb6a63fa5e69bf151af8e9fcc3
SHA512069d8f73fba86cbf0e50aee19fb335f48a6c462ab34534d2c136abc9230985a26286e841d62e35f32079dabedf5487dd7339c2f0455dacaebc3f61a8a171f3f2
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
118KB
MD54d20a950a3571d11236482754b4a8e76
SHA1e68bd784ac143e206d52ecaf54a7e3b8d4d75c9c
SHA256a9295ad4e909f979e2b6cb2b2495c3d35c8517e689cd64a918c690e17b49078b
SHA5128b9243d1f9edbcbd6bdaf6874dc69c806bb29e909bd733781fde8ac80ca3fff574d786ca903871d1e856e73fd58403bebb58c9f23083ea7cd749ba3e890af3d2
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
3.7MB
MD52277b03d795c56173f6b44112740d5d8
SHA162bbee4c5c0f8d953d9d278bf242b44fe89165cd
SHA256727fb4452808e6d896a48422a95e45a4c3b6d9ebdd42c1e12f370bee520f4715
SHA5121da33757d85146b3ad547845ced66336c23b37ffd2f12caa3393b58f465d323adfb783a32f67e9ffe5b3c0b98fc0f92deb799dc293de76ee1a7bef32656f7d09
-
Filesize
3.7MB
MD52277b03d795c56173f6b44112740d5d8
SHA162bbee4c5c0f8d953d9d278bf242b44fe89165cd
SHA256727fb4452808e6d896a48422a95e45a4c3b6d9ebdd42c1e12f370bee520f4715
SHA5121da33757d85146b3ad547845ced66336c23b37ffd2f12caa3393b58f465d323adfb783a32f67e9ffe5b3c0b98fc0f92deb799dc293de76ee1a7bef32656f7d09
-
Filesize
3.7MB
MD52277b03d795c56173f6b44112740d5d8
SHA162bbee4c5c0f8d953d9d278bf242b44fe89165cd
SHA256727fb4452808e6d896a48422a95e45a4c3b6d9ebdd42c1e12f370bee520f4715
SHA5121da33757d85146b3ad547845ced66336c23b37ffd2f12caa3393b58f465d323adfb783a32f67e9ffe5b3c0b98fc0f92deb799dc293de76ee1a7bef32656f7d09
-
Filesize
179KB
MD51a5caea6734fdd07caa514c3f3fb75da
SHA1f070ac0d91bd337d7952abd1ddf19a737b94510c
SHA256cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca
SHA512a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1
-
Filesize
179KB
MD51a5caea6734fdd07caa514c3f3fb75da
SHA1f070ac0d91bd337d7952abd1ddf19a737b94510c
SHA256cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca
SHA512a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1
-
Filesize
3.3MB
MD5f265139bc1dd647e2b8f02153ac37ae3
SHA1a99ae372addb61aac02c0e21d702a6fbd1eca52f
SHA2566ff91c3fa310a8cd27555c203254b293da3112b52895ecbb93d8d713475c79a5
SHA51296d42aed76d7843bb37d51a108becc43fae42dd987b640676c2a64fa848a983c322021e4811e3afa61850f357079e07999895c6f68aa749c40a5ce4acdadad7d
-
Filesize
3.3MB
MD5f265139bc1dd647e2b8f02153ac37ae3
SHA1a99ae372addb61aac02c0e21d702a6fbd1eca52f
SHA2566ff91c3fa310a8cd27555c203254b293da3112b52895ecbb93d8d713475c79a5
SHA51296d42aed76d7843bb37d51a108becc43fae42dd987b640676c2a64fa848a983c322021e4811e3afa61850f357079e07999895c6f68aa749c40a5ce4acdadad7d
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
3.7MB
MD52277b03d795c56173f6b44112740d5d8
SHA162bbee4c5c0f8d953d9d278bf242b44fe89165cd
SHA256727fb4452808e6d896a48422a95e45a4c3b6d9ebdd42c1e12f370bee520f4715
SHA5121da33757d85146b3ad547845ced66336c23b37ffd2f12caa3393b58f465d323adfb783a32f67e9ffe5b3c0b98fc0f92deb799dc293de76ee1a7bef32656f7d09
-
Filesize
3.7MB
MD52277b03d795c56173f6b44112740d5d8
SHA162bbee4c5c0f8d953d9d278bf242b44fe89165cd
SHA256727fb4452808e6d896a48422a95e45a4c3b6d9ebdd42c1e12f370bee520f4715
SHA5121da33757d85146b3ad547845ced66336c23b37ffd2f12caa3393b58f465d323adfb783a32f67e9ffe5b3c0b98fc0f92deb799dc293de76ee1a7bef32656f7d09
-
Filesize
3.7MB
MD52277b03d795c56173f6b44112740d5d8
SHA162bbee4c5c0f8d953d9d278bf242b44fe89165cd
SHA256727fb4452808e6d896a48422a95e45a4c3b6d9ebdd42c1e12f370bee520f4715
SHA5121da33757d85146b3ad547845ced66336c23b37ffd2f12caa3393b58f465d323adfb783a32f67e9ffe5b3c0b98fc0f92deb799dc293de76ee1a7bef32656f7d09
-
Filesize
1KB
MD54933c1e1be5973187e991ea2ed9e6451
SHA1b16b52ba34a835b5bb8665f502e7e37985b6776e
SHA256dc44fb3a0ce9cb88926b2d91ec3cc5a5c5d694b02415c4b2459090f08f08ed58
SHA512766ed216354a9d0f681607577e586e89dc82729ced58c328676771178ba547cd87878a1f5955cd46b197672753bc693d08246a7a11ceb8a7f255e1321403e805
-
Filesize
179KB
MD51a5caea6734fdd07caa514c3f3fb75da
SHA1f070ac0d91bd337d7952abd1ddf19a737b94510c
SHA256cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca
SHA512a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1
-
Filesize
179KB
MD51a5caea6734fdd07caa514c3f3fb75da
SHA1f070ac0d91bd337d7952abd1ddf19a737b94510c
SHA256cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca
SHA512a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1
-
Filesize
179KB
MD51a5caea6734fdd07caa514c3f3fb75da
SHA1f070ac0d91bd337d7952abd1ddf19a737b94510c
SHA256cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca
SHA512a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1
-
Filesize
3.3MB
MD5f265139bc1dd647e2b8f02153ac37ae3
SHA1a99ae372addb61aac02c0e21d702a6fbd1eca52f
SHA2566ff91c3fa310a8cd27555c203254b293da3112b52895ecbb93d8d713475c79a5
SHA51296d42aed76d7843bb37d51a108becc43fae42dd987b640676c2a64fa848a983c322021e4811e3afa61850f357079e07999895c6f68aa749c40a5ce4acdadad7d
-
Filesize
3.3MB
MD5f265139bc1dd647e2b8f02153ac37ae3
SHA1a99ae372addb61aac02c0e21d702a6fbd1eca52f
SHA2566ff91c3fa310a8cd27555c203254b293da3112b52895ecbb93d8d713475c79a5
SHA51296d42aed76d7843bb37d51a108becc43fae42dd987b640676c2a64fa848a983c322021e4811e3afa61850f357079e07999895c6f68aa749c40a5ce4acdadad7d
-
Filesize
3.3MB
MD5f265139bc1dd647e2b8f02153ac37ae3
SHA1a99ae372addb61aac02c0e21d702a6fbd1eca52f
SHA2566ff91c3fa310a8cd27555c203254b293da3112b52895ecbb93d8d713475c79a5
SHA51296d42aed76d7843bb37d51a108becc43fae42dd987b640676c2a64fa848a983c322021e4811e3afa61850f357079e07999895c6f68aa749c40a5ce4acdadad7d
-
Filesize
3.7MB
MD52277b03d795c56173f6b44112740d5d8
SHA162bbee4c5c0f8d953d9d278bf242b44fe89165cd
SHA256727fb4452808e6d896a48422a95e45a4c3b6d9ebdd42c1e12f370bee520f4715
SHA5121da33757d85146b3ad547845ced66336c23b37ffd2f12caa3393b58f465d323adfb783a32f67e9ffe5b3c0b98fc0f92deb799dc293de76ee1a7bef32656f7d09
-
Filesize
3.7MB
MD52277b03d795c56173f6b44112740d5d8
SHA162bbee4c5c0f8d953d9d278bf242b44fe89165cd
SHA256727fb4452808e6d896a48422a95e45a4c3b6d9ebdd42c1e12f370bee520f4715
SHA5121da33757d85146b3ad547845ced66336c23b37ffd2f12caa3393b58f465d323adfb783a32f67e9ffe5b3c0b98fc0f92deb799dc293de76ee1a7bef32656f7d09
-
Filesize
3.7MB
MD52277b03d795c56173f6b44112740d5d8
SHA162bbee4c5c0f8d953d9d278bf242b44fe89165cd
SHA256727fb4452808e6d896a48422a95e45a4c3b6d9ebdd42c1e12f370bee520f4715
SHA5121da33757d85146b3ad547845ced66336c23b37ffd2f12caa3393b58f465d323adfb783a32f67e9ffe5b3c0b98fc0f92deb799dc293de76ee1a7bef32656f7d09
-
Filesize
3.7MB
MD52277b03d795c56173f6b44112740d5d8
SHA162bbee4c5c0f8d953d9d278bf242b44fe89165cd
SHA256727fb4452808e6d896a48422a95e45a4c3b6d9ebdd42c1e12f370bee520f4715
SHA5121da33757d85146b3ad547845ced66336c23b37ffd2f12caa3393b58f465d323adfb783a32f67e9ffe5b3c0b98fc0f92deb799dc293de76ee1a7bef32656f7d09
-
Filesize
179KB
MD51a5caea6734fdd07caa514c3f3fb75da
SHA1f070ac0d91bd337d7952abd1ddf19a737b94510c
SHA256cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca
SHA512a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1
-
Filesize
179KB
MD51a5caea6734fdd07caa514c3f3fb75da
SHA1f070ac0d91bd337d7952abd1ddf19a737b94510c
SHA256cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca
SHA512a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1
-
Filesize
306KB
MD5109abaff33c7db6cf915af19209b93f5
SHA1a4933c76bb7c104a5eb4655fa064dc05a9ba1f58
SHA2564eea10ad66952250192a6d7e4d7a58862c16fe0ff1118b3ba410923b4ddb6449
SHA512f805e91605ca95d3f8e651e1a50917dc110632970b1aa2fb82b026cef2a5584cdf46922ebda4ed703cd11e36c8b73e4e7a9bb0273afcd6efb5b6de214adad370
-
Filesize
306KB
MD5109abaff33c7db6cf915af19209b93f5
SHA1a4933c76bb7c104a5eb4655fa064dc05a9ba1f58
SHA2564eea10ad66952250192a6d7e4d7a58862c16fe0ff1118b3ba410923b4ddb6449
SHA512f805e91605ca95d3f8e651e1a50917dc110632970b1aa2fb82b026cef2a5584cdf46922ebda4ed703cd11e36c8b73e4e7a9bb0273afcd6efb5b6de214adad370
-
Filesize
306KB
MD5109abaff33c7db6cf915af19209b93f5
SHA1a4933c76bb7c104a5eb4655fa064dc05a9ba1f58
SHA2564eea10ad66952250192a6d7e4d7a58862c16fe0ff1118b3ba410923b4ddb6449
SHA512f805e91605ca95d3f8e651e1a50917dc110632970b1aa2fb82b026cef2a5584cdf46922ebda4ed703cd11e36c8b73e4e7a9bb0273afcd6efb5b6de214adad370
-
Filesize
3.3MB
MD5f265139bc1dd647e2b8f02153ac37ae3
SHA1a99ae372addb61aac02c0e21d702a6fbd1eca52f
SHA2566ff91c3fa310a8cd27555c203254b293da3112b52895ecbb93d8d713475c79a5
SHA51296d42aed76d7843bb37d51a108becc43fae42dd987b640676c2a64fa848a983c322021e4811e3afa61850f357079e07999895c6f68aa749c40a5ce4acdadad7d
-
Filesize
3.3MB
MD5f265139bc1dd647e2b8f02153ac37ae3
SHA1a99ae372addb61aac02c0e21d702a6fbd1eca52f
SHA2566ff91c3fa310a8cd27555c203254b293da3112b52895ecbb93d8d713475c79a5
SHA51296d42aed76d7843bb37d51a108becc43fae42dd987b640676c2a64fa848a983c322021e4811e3afa61850f357079e07999895c6f68aa749c40a5ce4acdadad7d
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
3.7MB
MD52277b03d795c56173f6b44112740d5d8
SHA162bbee4c5c0f8d953d9d278bf242b44fe89165cd
SHA256727fb4452808e6d896a48422a95e45a4c3b6d9ebdd42c1e12f370bee520f4715
SHA5121da33757d85146b3ad547845ced66336c23b37ffd2f12caa3393b58f465d323adfb783a32f67e9ffe5b3c0b98fc0f92deb799dc293de76ee1a7bef32656f7d09
-
Filesize
3.7MB
MD52277b03d795c56173f6b44112740d5d8
SHA162bbee4c5c0f8d953d9d278bf242b44fe89165cd
SHA256727fb4452808e6d896a48422a95e45a4c3b6d9ebdd42c1e12f370bee520f4715
SHA5121da33757d85146b3ad547845ced66336c23b37ffd2f12caa3393b58f465d323adfb783a32f67e9ffe5b3c0b98fc0f92deb799dc293de76ee1a7bef32656f7d09
-
Filesize
3.7MB
MD52277b03d795c56173f6b44112740d5d8
SHA162bbee4c5c0f8d953d9d278bf242b44fe89165cd
SHA256727fb4452808e6d896a48422a95e45a4c3b6d9ebdd42c1e12f370bee520f4715
SHA5121da33757d85146b3ad547845ced66336c23b37ffd2f12caa3393b58f465d323adfb783a32f67e9ffe5b3c0b98fc0f92deb799dc293de76ee1a7bef32656f7d09
-
Filesize
179KB
MD51a5caea6734fdd07caa514c3f3fb75da
SHA1f070ac0d91bd337d7952abd1ddf19a737b94510c
SHA256cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca
SHA512a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1
-
Filesize
179KB
MD51a5caea6734fdd07caa514c3f3fb75da
SHA1f070ac0d91bd337d7952abd1ddf19a737b94510c
SHA256cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca
SHA512a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1
-
Filesize
9KB
MD581dd3ff196089fec966f89420e43aaa4
SHA18ec1b99fee1ef5813b4f00661ac1cf230e101aca
SHA256fd0b739451a5dfd0a210fb29325d1c46a77267824f5e45ef2a48f9cd8ccd7bc8
SHA51250c4704d2b49dfd8b588f5c3efd8d1e8997cb7049b885f5f4cd28f67e1e00836d60ce72f8fd5203878714368ce0ebfe2306583a1a6cdb4937dfbc304519e2ce9
-
Filesize
3.3MB
MD5f265139bc1dd647e2b8f02153ac37ae3
SHA1a99ae372addb61aac02c0e21d702a6fbd1eca52f
SHA2566ff91c3fa310a8cd27555c203254b293da3112b52895ecbb93d8d713475c79a5
SHA51296d42aed76d7843bb37d51a108becc43fae42dd987b640676c2a64fa848a983c322021e4811e3afa61850f357079e07999895c6f68aa749c40a5ce4acdadad7d
-
Filesize
3.3MB
MD5f265139bc1dd647e2b8f02153ac37ae3
SHA1a99ae372addb61aac02c0e21d702a6fbd1eca52f
SHA2566ff91c3fa310a8cd27555c203254b293da3112b52895ecbb93d8d713475c79a5
SHA51296d42aed76d7843bb37d51a108becc43fae42dd987b640676c2a64fa848a983c322021e4811e3afa61850f357079e07999895c6f68aa749c40a5ce4acdadad7d
-
Filesize
50.3MB
MD5f8b6a891645634bdb275874256319c59
SHA11856e7091996da99aa03c8c21731f7253eb8a93c
SHA256b07f45df6eb455162c10d2795cede8261442aaba46da92a7760fa2729768f1d4
SHA5124f2b85f34791f232079616711f77420ce44e053d99805bd1ca7f8c3f92202374a89c291ec6d975c8188bdac52f1a6ea10c8cd53659b2ce65344a501b0ff14a2d
-
Filesize
8KB
MD567ba0ceff5e4c480f5182f1db4a891f2
SHA1c24ebdd14cc43f27670785c3ae1d6998808b2137
SHA256448f431946527d298298ce274a41d1da756a004add3273fae7a9121273fb573f
SHA512d6fd7bd4be16af77cfcb8e92068abe23f2b3778366d8556670d9a4be7d5d4cba71225f23259ce4fb52bb7443d1e55dfbc0f37d8c910eb0219b8597f3c4302bba
-
Filesize
7KB
MD5495b4d1430ff5d0b37bb752cae482b1c
SHA1fa663ad53a29818eaedb36449a24a6deb2505653
SHA25618542f1f6ee0f363f680adc9caaa147b94ca06bc5110965b41c356b554751025
SHA512cfabe9516c83046bf6458b19009860d7058dfe26cb09295672c598c2d1a5333dcd9b531cfca26a3d5acb9d1e18aca5b193fcbc4b90af68f88a797a43a9511403
-
Filesize
37KB
MD55b4a09ab34d0205c616c4d247ad29f57
SHA183fa0cae1f8dd757e39dc9d1463dae7b1d50e389
SHA256b1dbdd5e2149114e1dcc56dab00876aae1fbfc5d4063d3f5a59d8c66918ef693
SHA51219b1543964d718949241923e8dc83a78362526c02b31d1858d41449ac08803e1f60fb7449cfee05a44085b6cee2774a9784f945ef89a9f6c5e6a22dbcaaa83f5
-
Filesize
1KB
MD5197b26288a1b6984882efdc254550370
SHA144c415cad85a6f56a6e3e6a9cc94bee0d6ac4a38
SHA2566547c0c6fc9ab537f768ff41a18d481b959098556a57a7b28e13a267fd6c5a42
SHA51228c97e0b14b486c8a2a3ecfe18284fa1151177d8ebbb5256aebc7e675dacdbd543b92df05722ca16b379737422ade27d8707b78ffc914e2287a69112f304b943
-
Filesize
2KB
MD560c1ba9e218744e20a972188f5e82aa2
SHA1ef19741d4b5d0eab022fd842e9f1583017f461ff
SHA25634dfa81ff1e3eeecb63a9b351f4a8452ffede8599ac569b172535e85ee955935
SHA51266bc3dbd4ac0d0c125d7b0ab3980205b35702937b7ae136bccff6172a5ec48889e29a4d0fbe952f27ab6180e0e2e829d827d9ac2c2b8c970c9fe3fafd329c255
-
Filesize
2KB
MD59222a4ef25d19556082d9122c278710d
SHA16647c7a25fec3b2bd92e618551892e9f2de892d4
SHA256098a530a235117884932b2c8dc6f71caab5b2a99078f14bf923fa5f02bfaa947
SHA512caa30aad9c33cc637413f0a9b10b1dac56b3494e56f278aef535b56508ddf6e68209b42769866f4870fa01d58fe22e88b302207ed34cec4faf20222b40176ef5
-
Filesize
2KB
MD55552e44a6094800722ac81fa961064f3
SHA1a9fa16e24e795b3d22dfac0a9281a49228a91ebd
SHA256c3a5394e64ea24e6125ab0e01a2579f4c0207fc140df30ee0c0eb6796fb8e77c
SHA51276c943d995e072f826cc6188f3b7443596803a3539217c00548e4a4ad5dcf66d63b59decde7929e09208cb70422ce2cf3f2dd03eb58989dff3bcf426d2a9bd7e
-
Filesize
87KB
MD5b0d10a2a622a322788780e7a3cbb85f3
SHA104d90b16fa7b47a545c1133d5c0ca9e490f54633
SHA256f2c2b3ce2df70a3206f3111391ffc7b791b32505fa97aef22c0c2dbf6f3b0426
SHA51262b0aa09234067e67969c5f785736d92cd7907f1f680a07f6b44a1caf43bfeb2df96f29034016f3345c4580c6c9bc1b04bea932d06e53621da4fcf7b8c0a489f
-
Filesize
87KB
MD5b0d10a2a622a322788780e7a3cbb85f3
SHA104d90b16fa7b47a545c1133d5c0ca9e490f54633
SHA256f2c2b3ce2df70a3206f3111391ffc7b791b32505fa97aef22c0c2dbf6f3b0426
SHA51262b0aa09234067e67969c5f785736d92cd7907f1f680a07f6b44a1caf43bfeb2df96f29034016f3345c4580c6c9bc1b04bea932d06e53621da4fcf7b8c0a489f
-
Filesize
237KB
MD5783b8cf45e1d5fc113448eead9bf72a7
SHA100c34d748ea77411a2eae71b455acf5504e45309
SHA256d7367f379e450af3483ee19431e25131da59a81bdeb5197330da01bd7873d944
SHA512eaf000e28dec64f5197680dac217f2e2df6929da1b2f9731611e25a1ee15b0f0ab5578ab941a223531fe926f7349ec31a00bf24e6a41e27cd7e6205710196108
-
Filesize
237KB
MD5783b8cf45e1d5fc113448eead9bf72a7
SHA100c34d748ea77411a2eae71b455acf5504e45309
SHA256d7367f379e450af3483ee19431e25131da59a81bdeb5197330da01bd7873d944
SHA512eaf000e28dec64f5197680dac217f2e2df6929da1b2f9731611e25a1ee15b0f0ab5578ab941a223531fe926f7349ec31a00bf24e6a41e27cd7e6205710196108
-
Filesize
119KB
MD5c59832217903ce88793a6c40888e3cae
SHA16d9facabf41dcf53281897764d467696780623b8
SHA2569dfa1bc5d2ab4c652304976978749141b8c312784b05cb577f338a0aa91330db
SHA5121b1f4cb2e3fa57cb481e28a967b19a6fefa74f3c77a3f3214a6b09e11ceb20ae428d036929f000710b4eb24a2c57d5d7dfe39661d5a1f48ee69a02d83381d1a9
-
Filesize
924KB
MD5181a5d6e63d4f383706174f779fb23c2
SHA169c660a711549b41322b352f8ec282a0ec6367c6
SHA256796e172b7d3cded3a03fc76a39dc4ac2aa36c8bbd259ddd6bac4ecf64888edb4
SHA5120f100a7799be9a122036564462e30d29eae1f3df5915269adde9334ac943456d77ff1622e469696b27414013bbf6fe2e04af0cfefdc4b02f99adddf25519c6e4
-
Filesize
924KB
MD5181a5d6e63d4f383706174f779fb23c2
SHA169c660a711549b41322b352f8ec282a0ec6367c6
SHA256796e172b7d3cded3a03fc76a39dc4ac2aa36c8bbd259ddd6bac4ecf64888edb4
SHA5120f100a7799be9a122036564462e30d29eae1f3df5915269adde9334ac943456d77ff1622e469696b27414013bbf6fe2e04af0cfefdc4b02f99adddf25519c6e4
-
Filesize
924KB
MD5181a5d6e63d4f383706174f779fb23c2
SHA169c660a711549b41322b352f8ec282a0ec6367c6
SHA256796e172b7d3cded3a03fc76a39dc4ac2aa36c8bbd259ddd6bac4ecf64888edb4
SHA5120f100a7799be9a122036564462e30d29eae1f3df5915269adde9334ac943456d77ff1622e469696b27414013bbf6fe2e04af0cfefdc4b02f99adddf25519c6e4
-
Filesize
50.3MB
MD5f8b6a891645634bdb275874256319c59
SHA11856e7091996da99aa03c8c21731f7253eb8a93c
SHA256b07f45df6eb455162c10d2795cede8261442aaba46da92a7760fa2729768f1d4
SHA5124f2b85f34791f232079616711f77420ce44e053d99805bd1ca7f8c3f92202374a89c291ec6d975c8188bdac52f1a6ea10c8cd53659b2ce65344a501b0ff14a2d
-
Filesize
13.8MB
MD5a3cb49daa1347ffe34b517f1a12f40ab
SHA172211bd2e7dfc91ea7c8fac549c49c0543ba791b
SHA25612a69af8623d70026690ba14139bf3793cc76c865759cad301b207c1793063ed
SHA512e3d96cc4c822793893fc3831cbe40d7a53ee8eca3a73021aea2193bbf5c5a05ef5fa4a9fc314c29ad5392f980997a25507caa9cf3a1e3362674ac913fbaebb17
-
Filesize
924KB
MD5181a5d6e63d4f383706174f779fb23c2
SHA169c660a711549b41322b352f8ec282a0ec6367c6
SHA256796e172b7d3cded3a03fc76a39dc4ac2aa36c8bbd259ddd6bac4ecf64888edb4
SHA5120f100a7799be9a122036564462e30d29eae1f3df5915269adde9334ac943456d77ff1622e469696b27414013bbf6fe2e04af0cfefdc4b02f99adddf25519c6e4
-
Filesize
924KB
MD5181a5d6e63d4f383706174f779fb23c2
SHA169c660a711549b41322b352f8ec282a0ec6367c6
SHA256796e172b7d3cded3a03fc76a39dc4ac2aa36c8bbd259ddd6bac4ecf64888edb4
SHA5120f100a7799be9a122036564462e30d29eae1f3df5915269adde9334ac943456d77ff1622e469696b27414013bbf6fe2e04af0cfefdc4b02f99adddf25519c6e4