Analysis
-
max time kernel
341s -
max time network
338s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2023, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
LeoneDumper.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
LeoneDumper.exe
Resource
win10v2004-20230621-en
General
-
Target
LeoneDumper.exe
-
Size
238KB
-
MD5
997ff6e544f760c4b16630614f31f950
-
SHA1
436ec493eb37200498099e451325db9b78e15856
-
SHA256
95bbdf4f1ebae515d90139c7690e60e7abd94170207c7342d6e502ebad2f6b53
-
SHA512
b96e91011d90c19196493bd6585b4354e34edfcc37417e419c79cab3ae0ecb757e0ad70b64dc282ff60bebb251144f984e66689ad98b564ddd76ddbfda1bc272
-
SSDEEP
6144:FqnKyjWo7gB8eOCJG3FGJljXdQprzvEXaAMw0YYaZB6gkipk3mmw0OKggF:FqKsWR8FCw3wjXdQpv6aAMpQZtxTSge
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\Control Panel\International\Geo\Nation systeminformer-3.0.6806-setup.exe -
Executes dropped EXE 2 IoCs
pid Process 2316 systeminformer-3.0.6806-setup.exe 996 SystemInformer.exe -
Loads dropped DLL 11 IoCs
pid Process 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 39 IoCs
description ioc Process File created C:\Program Files\SystemInformer\plugins\HardwareDevices.sig systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\NetworkTools.sig systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\Updater.dll systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\x86\plugins\ExtendedTools.dll systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\etwguids.txt systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\DotNetTools.dll systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\ExtendedNotifications.sig systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\COPYRIGHT.txt systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\LICENSE.txt systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\README.txt systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\UserNotes.sig systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\NetworkTools.dll systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\ToolStatus.dll systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\ToolStatus.sig systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\x86\SystemInformer.sig systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\x86\plugins\ExtendedTools.sig systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\SystemInformer.sys systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\DotNetTools.sig systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\ExtendedTools.sig systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\WindowExplorer.dll systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\x86\plugins\DotNetTools.sig systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\ExtendedServices.dll systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\ExtendedServices.sig systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\OnlineChecks.dll systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\ExtendedNotifications.dll systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\WindowExplorer.sig systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\x86\SystemInformer.exe systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\peview.sig systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\SystemInformer.exe systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\SystemInformer.sig systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\HardwareDevices.dll systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\UserNotes.dll systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\x86\plugins\DotNetTools.dll systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\capslist.txt systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\peview.exe systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\ExtendedTools.dll systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\ksi.dll systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\OnlineChecks.sig systeminformer-3.0.6806-setup.exe File created C:\Program Files\SystemInformer\plugins\Updater.sig systeminformer-3.0.6806-setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SystemInformer.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SystemInformer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133326523800518421" chrome.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 SystemInformer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 SystemInformer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 SystemInformer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 SystemInformer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 0f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d432000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 SystemInformer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3536 LeoneDumper.exe 440 chrome.exe 440 chrome.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3536 LeoneDumper.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 3536 LeoneDumper.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe -
Suspicious use of SendNotifyMessage 46 IoCs
pid Process 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe 996 SystemInformer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 440 wrote to memory of 3928 440 chrome.exe 106 PID 440 wrote to memory of 3928 440 chrome.exe 106 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 4780 440 chrome.exe 107 PID 440 wrote to memory of 1652 440 chrome.exe 108 PID 440 wrote to memory of 1652 440 chrome.exe 108 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109 PID 440 wrote to memory of 3888 440 chrome.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\LeoneDumper.exe"C:\Users\Admin\AppData\Local\Temp\LeoneDumper.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3536
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff28789758,0x7fff28789768,0x7fff287897782⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:22⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:82⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:82⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3236 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:12⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3368 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:12⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4592 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:12⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4740 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:82⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4876 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:82⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:82⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5124 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:82⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:82⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4764 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:12⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3736 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:12⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5528 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:12⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3228 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:12⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:82⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5368 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:82⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5332 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:82⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=968 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:82⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2824 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:82⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2832 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:82⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=972 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:82⤵PID:2760
-
-
C:\Users\Admin\Downloads\systeminformer-3.0.6806-setup.exe"C:\Users\Admin\Downloads\systeminformer-3.0.6806-setup.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
PID:2316 -
C:\Program Files\SystemInformer\SystemInformer.exe"C:\Program Files\SystemInformer\SystemInformer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:996
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5016 --field-trial-handle=1840,i,17986920652286599959,5391201233949759888,131072 /prefetch:22⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5bdf590e9b0e3b978f6f7e2ba517d0b36
SHA15dca247bbd3c33e9a53a26f9bc5f97955fe49be1
SHA256e91ad63e73ae4ef419a319918e03d9ed865d5e963a1181cd7cf7b421c62ab91c
SHA512295faa3cdfb2abe985b61250dc54b74b7918b8108184e111cfeb2c8b7488ae7232d9c5f67bc8e1312108b3e6f571f13f0fd9a9a854c601b32ad355643cb63f1c
-
Filesize
2.9MB
MD5bdf590e9b0e3b978f6f7e2ba517d0b36
SHA15dca247bbd3c33e9a53a26f9bc5f97955fe49be1
SHA256e91ad63e73ae4ef419a319918e03d9ed865d5e963a1181cd7cf7b421c62ab91c
SHA512295faa3cdfb2abe985b61250dc54b74b7918b8108184e111cfeb2c8b7488ae7232d9c5f67bc8e1312108b3e6f571f13f0fd9a9a854c601b32ad355643cb63f1c
-
Filesize
2.9MB
MD5bdf590e9b0e3b978f6f7e2ba517d0b36
SHA15dca247bbd3c33e9a53a26f9bc5f97955fe49be1
SHA256e91ad63e73ae4ef419a319918e03d9ed865d5e963a1181cd7cf7b421c62ab91c
SHA512295faa3cdfb2abe985b61250dc54b74b7918b8108184e111cfeb2c8b7488ae7232d9c5f67bc8e1312108b3e6f571f13f0fd9a9a854c601b32ad355643cb63f1c
-
Filesize
188KB
MD5d05abacda3ce129b8a62b5c33afd6848
SHA1ad810371e98f3c91d8f9b1c8c14f8b895d2315fe
SHA2565a508ff25ef0d551e750fac39245aefeab8149b3683f0710e2dc21e32f6a4b1e
SHA5127a6349d570bc8ebd3a70e68aefa80a2806747353054c5e7c253f8ceac0d4263632a86162dc667b3f0ae098d5388a4803629ef497b049c4086011dca08df2a8e0
-
Filesize
188KB
MD5d05abacda3ce129b8a62b5c33afd6848
SHA1ad810371e98f3c91d8f9b1c8c14f8b895d2315fe
SHA2565a508ff25ef0d551e750fac39245aefeab8149b3683f0710e2dc21e32f6a4b1e
SHA5127a6349d570bc8ebd3a70e68aefa80a2806747353054c5e7c253f8ceac0d4263632a86162dc667b3f0ae098d5388a4803629ef497b049c4086011dca08df2a8e0
-
Filesize
136KB
MD53fe8490ae6f10da5b8f202e30e2719e0
SHA1a8df6bcfea526ebb720b48f803534a0ab749a7ae
SHA256b9beca606a63945beeb5bff41177c9a725024be1399512e89a31bca5bf51880d
SHA512677ff31a4bc038faa7cdcdcbdcb4ccfc2e4ead526b9c643c213cc31b82bd0ac0b1c12c97b32c10a390187334e1ca2e9f0071aefa1a30ad3436aee556ab40d296
-
Filesize
136KB
MD53fe8490ae6f10da5b8f202e30e2719e0
SHA1a8df6bcfea526ebb720b48f803534a0ab749a7ae
SHA256b9beca606a63945beeb5bff41177c9a725024be1399512e89a31bca5bf51880d
SHA512677ff31a4bc038faa7cdcdcbdcb4ccfc2e4ead526b9c643c213cc31b82bd0ac0b1c12c97b32c10a390187334e1ca2e9f0071aefa1a30ad3436aee556ab40d296
-
Filesize
184KB
MD516f8fb87f49949449d289dc3370476b9
SHA1d8877fca50facb352f8152f7d20c682d33bca6a3
SHA25653a7d83c2af51600b6d50eece05623e510883e6a80573d82d3d6f4697ff17634
SHA51249ab1a4f91e5f115db11c98ca64e22a972c7c3a47e270d2bc6dd17dd885ca9ba78643ea82793b305082473fb5901e91285ac788ed43e9ece7ce0df8fb11baf73
-
Filesize
184KB
MD516f8fb87f49949449d289dc3370476b9
SHA1d8877fca50facb352f8152f7d20c682d33bca6a3
SHA25653a7d83c2af51600b6d50eece05623e510883e6a80573d82d3d6f4697ff17634
SHA51249ab1a4f91e5f115db11c98ca64e22a972c7c3a47e270d2bc6dd17dd885ca9ba78643ea82793b305082473fb5901e91285ac788ed43e9ece7ce0df8fb11baf73
-
Filesize
1.4MB
MD5b735487cf92fc0c01fc0caedfab76e56
SHA1c51c7660d90071a59702ceb7fbef3b97c8e1ef6c
SHA256c2ef24ac7642a5453a4a80fed63305022e9b8b562e66195d8a6cf0d65ac5f4e9
SHA5123074b2e8b16e0cf00687cd940a0d793ed5f0a1ea2a342c4d885a7594d970549db92afef0b9ca2b9fd859ca55142619405c251c880ec68ccd98368f2e0d1ba10a
-
Filesize
1.4MB
MD5b735487cf92fc0c01fc0caedfab76e56
SHA1c51c7660d90071a59702ceb7fbef3b97c8e1ef6c
SHA256c2ef24ac7642a5453a4a80fed63305022e9b8b562e66195d8a6cf0d65ac5f4e9
SHA5123074b2e8b16e0cf00687cd940a0d793ed5f0a1ea2a342c4d885a7594d970549db92afef0b9ca2b9fd859ca55142619405c251c880ec68ccd98368f2e0d1ba10a
-
Filesize
328KB
MD5601956037015754e0e9634a0e44d159d
SHA1476034657e7ca78c0d75d153ca348d244495f5b3
SHA25631994257218ce44b5103c44217b9591d95d528adec8df27de01a55c88aabce28
SHA512b89fecb88a9a6bcb770698f61b54b815d48671916325017c1169937239c749f5172c8c7b4501472f7650f83ddae2f33c0022b14f966453efe2c08eed0b89b7ce
-
Filesize
328KB
MD5601956037015754e0e9634a0e44d159d
SHA1476034657e7ca78c0d75d153ca348d244495f5b3
SHA25631994257218ce44b5103c44217b9591d95d528adec8df27de01a55c88aabce28
SHA512b89fecb88a9a6bcb770698f61b54b815d48671916325017c1169937239c749f5172c8c7b4501472f7650f83ddae2f33c0022b14f966453efe2c08eed0b89b7ce
-
Filesize
616KB
MD524c40ee9dc08fe0c3cd64cba75f1b4cd
SHA1ace65eee557caae523e8962bf19893845cae1a25
SHA2567feaf7fab9096bd17654fb39bc2251c86b3467ac855f5acf879ada2e87792ffe
SHA512e965b1e35dc163db639bb48326836505d12bd0025a9fe1fc326069e9c1e4ed4a25b28cde5c3bf81c12f605aa7b01411efb7035f3874b76206cf9a6e0de83d69f
-
Filesize
616KB
MD524c40ee9dc08fe0c3cd64cba75f1b4cd
SHA1ace65eee557caae523e8962bf19893845cae1a25
SHA2567feaf7fab9096bd17654fb39bc2251c86b3467ac855f5acf879ada2e87792ffe
SHA512e965b1e35dc163db639bb48326836505d12bd0025a9fe1fc326069e9c1e4ed4a25b28cde5c3bf81c12f605aa7b01411efb7035f3874b76206cf9a6e0de83d69f
-
Filesize
200KB
MD57ce255c53f8d9dcc3aeb0f448ac910d1
SHA127c21113aaa365529e6b72bcca495f726928273a
SHA25654b393e286d0a099849e4eb48dda5ef31677f982021e326a6caa5c522d22fe45
SHA5129ec08b30fba3e215bcf6adda7098587d00ab6ba1bc3094ffe0918e95c7891b66ba1114b6658c552727cb9f31bdffbf27f2e9835bd5a23d1156c309c58057cac3
-
Filesize
200KB
MD57ce255c53f8d9dcc3aeb0f448ac910d1
SHA127c21113aaa365529e6b72bcca495f726928273a
SHA25654b393e286d0a099849e4eb48dda5ef31677f982021e326a6caa5c522d22fe45
SHA5129ec08b30fba3e215bcf6adda7098587d00ab6ba1bc3094ffe0918e95c7891b66ba1114b6658c552727cb9f31bdffbf27f2e9835bd5a23d1156c309c58057cac3
-
Filesize
388KB
MD5480fa3815e4104dc4f512184b4b210ca
SHA1883ce983cd32ea5361fc4423b1fb568e351b2037
SHA256ef6d7d38d8d6b349a9eb2e741330cc0fb22772024bbaffdd42226416e77e34f8
SHA512fe238c99514d355af1dcdd1e83e1511d5c7ee813a471ddb5ac3d311ee2c9cf4ee298fdc44d5c58d9a01b8c3d5dac153d48dad69596c6e289e035b875584d1c46
-
Filesize
388KB
MD5480fa3815e4104dc4f512184b4b210ca
SHA1883ce983cd32ea5361fc4423b1fb568e351b2037
SHA256ef6d7d38d8d6b349a9eb2e741330cc0fb22772024bbaffdd42226416e77e34f8
SHA512fe238c99514d355af1dcdd1e83e1511d5c7ee813a471ddb5ac3d311ee2c9cf4ee298fdc44d5c58d9a01b8c3d5dac153d48dad69596c6e289e035b875584d1c46
-
Filesize
192KB
MD599b72162bd1ac7ada58085ffd99b2749
SHA1ea65b1ed2ebf3862ae0171f2db77f84d2ae29a1d
SHA2560c6a8dac4e9ed015c23c0928bf45794d18d32f4527b76da58feb0811fa12d9dc
SHA51245b1b615bdb445333e1c85724b4d3b49ec73e8a53b66f4ebbff0710f1d3ca5c3776254f5ab85cce660e7f40ee1e1ac968085b9b5a26698bf6a500720081fa9a5
-
Filesize
192KB
MD599b72162bd1ac7ada58085ffd99b2749
SHA1ea65b1ed2ebf3862ae0171f2db77f84d2ae29a1d
SHA2560c6a8dac4e9ed015c23c0928bf45794d18d32f4527b76da58feb0811fa12d9dc
SHA51245b1b615bdb445333e1c85724b4d3b49ec73e8a53b66f4ebbff0710f1d3ca5c3776254f5ab85cce660e7f40ee1e1ac968085b9b5a26698bf6a500720081fa9a5
-
Filesize
172KB
MD528f1a1d4d306f5b0ee68caac66db83f0
SHA12e3df3d97c9e1adccb0148d7b6bc522e8dcd8e77
SHA256808621f594826997b960dd871bb9f5521078c18123976ab6f08d5b540b35c3c5
SHA512f1a71a74e35c124e05fd2015295588d54fd31bbf7601dbc484c3922cd334615668989a7de3aa9a3351a5cbb0c8392bb9513309af53417e5f89d0568a7f9b7332
-
Filesize
172KB
MD528f1a1d4d306f5b0ee68caac66db83f0
SHA12e3df3d97c9e1adccb0148d7b6bc522e8dcd8e77
SHA256808621f594826997b960dd871bb9f5521078c18123976ab6f08d5b540b35c3c5
SHA512f1a71a74e35c124e05fd2015295588d54fd31bbf7601dbc484c3922cd334615668989a7de3aa9a3351a5cbb0c8392bb9513309af53417e5f89d0568a7f9b7332
-
Filesize
200KB
MD5768fee696ba8b363cdc27f2dfeda3dad
SHA1f68bd3d17fcb101097c39b12f63df7b9294f8b22
SHA256a948b5303c8cfbd90ab0041cf9ede019277322a98409c3511e0d59aa3bbe04d2
SHA5123b8186a47e59c646c2314e543cbbcfe298734abf9b2e2623aac78a6b8ea0160167d61979b2852d586c76f723ea4813e744216fddb15490ee3f847b90e4feadca
-
Filesize
200KB
MD5768fee696ba8b363cdc27f2dfeda3dad
SHA1f68bd3d17fcb101097c39b12f63df7b9294f8b22
SHA256a948b5303c8cfbd90ab0041cf9ede019277322a98409c3511e0d59aa3bbe04d2
SHA5123b8186a47e59c646c2314e543cbbcfe298734abf9b2e2623aac78a6b8ea0160167d61979b2852d586c76f723ea4813e744216fddb15490ee3f847b90e4feadca
-
Filesize
552B
MD50efa0bbf43b409be5a1ccbfc0120404a
SHA16ae898022a292eaa0f6ab32a75dd514ef5ec0160
SHA256a598d470242faa0887f55f5bf3d1c8230480be6d9c532ad7cb42912533a75ef1
SHA5128630af8590c932b5cb7859cd054d9b082a735573f215202550b58c2d8115a2bff23ede688dc111620a83645ef9201c1d60ec38c24c9abba457048e1a245a1a69
-
Filesize
4KB
MD59c8bb0710d55545ee7a1e8137ce9dd75
SHA139998c7592d272f1cfa6cd83774b41139c7e0df4
SHA2567d2c034f3a66ea9072867ad25b31f3fb1c113496efe6e34c6e958314d36f621f
SHA5122dfadf25c36b41dd0374cf1527d7e8a53201f0e396f599da0d7f5fbc4fd22bdc3c1b9cd4d6e73f426f6dd841c4a131404e5eae757dafb5d72f407057c9d055f5
-
Filesize
3KB
MD53494eddb217e6bc7ca4fa635f622afc9
SHA162a0b2f43f3b128ade100e1c94d2a7de786d55cb
SHA256423ec9e5f0c0cd3d73af22869d26737cb6ac156d2e8f39da2d3c04853c1f6979
SHA5122d99931e0799df67c39fcb33c77d8d084cdb8ec12b61a5847f24ceb0d8638b2fe113045a2dc9758c9caea3063918a5ad5607902f086a5ec0b0ee689276d2958a
-
Filesize
1KB
MD550c65bec0f55d82bccc1d5c49d49c8c0
SHA1b34a75fba895578befa4b483ac18fe39da5882d0
SHA256d6680071733d5ca269ec1b4251d83b3d847450ec0eb5732f2b5d76301fa9fce8
SHA51216e4393503c6347abe7b3d46b134f3995ccb04758ae79e550da8e731161940734c1bafa2db413737ff227b1ee9a0d51722b19ba1e4bb8f43afa8292ee1d914b8
-
Filesize
1KB
MD5dc19f3cb5347dcdd775bdf4cfdd62f66
SHA134071d1261fa942b206e2f04ff9060b88c72dac4
SHA256669b2492fd4302a3211d47d66d40cce5d51600daacf33ad30ea02e7687547852
SHA512265a883c139795277ea61de300bbe8a3556544f62b487a05f430b81f6b7461c22b2831f1f24628e79b7616cf893f4fd06f0f627145e7e8ad9df8272708b11b9e
-
Filesize
1KB
MD553ad574bed164095de932f354cb771ee
SHA178c7790a797c8a53c774260e5ae7d568517a4ea5
SHA2563dcd5d0ea227d121f611a0e4c21e2266b16b8fea8e7572a4020d137f6b8bd25e
SHA512625b2e03b9091f0bfc5bfca32cca35479a4091a6c4d06ec5d020745e9392e8f2c78a56077b7f73e557dec9fc1855f810070b151a53e279fc993d33e533bd420c
-
Filesize
6KB
MD5f5d8ef6c47ede2e1c809774479f00007
SHA18ec2446a03bd4c12b9a024eee2810b96e263f9aa
SHA2566c3326c7e0d54c1a88532e3765928a68e5b41b2438b6b4956b29c3153085af6f
SHA51214e6144277de3c84ba38b625f31eafb2cec9c40aeefc946cb15b314993ee933c692d5e5bcdcf01157ab54bc2e893102cb9de57de52bf74ecfaf52bc3df9a8eaa
-
Filesize
7KB
MD5bed1a7d6fd8276afd1e994e408e5d03f
SHA1ebc73abb7538f2b6b187e142313908075e96b645
SHA2563cf516b7b6df40a293b6ced19eeae799b2514f66a32555759ea3d3420220daa1
SHA512de8c09cb418ac9fc8d2604cda961ad9f57466bb5495080ce4910e612e9b402fc3a6c922a177e008b4eff50bec2e6a1b46782562b6ff0459f7fdf913a517f08d5
-
Filesize
15KB
MD5be85e9af314c8d3a2e6e501db78fd8f6
SHA1445143d55d91359fcf30a337aa24bcd894a6961d
SHA2562b1bed56cab9df33c474d3935637dfea725b41438be3bc80beaf25394608b785
SHA512559f26ba5ec6d212d1a00258bb12296343e9beb7bc57b6953a9b2c269f01b35f7ae0c0ddfb29beef1f14cdeafdbc1d17d19cb7a4cdfd7be919e3abfc1786c587
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e4735b26-15a7-4d81-9e30-2c1ee988c4a9.tmp
Filesize6KB
MD57711ad543f63474b2703e6a80c631823
SHA1c3daa1a580015b01061bbaea9ab21718db1e19ca
SHA2562c6e0d9fb61d065b9fc1684d6f2ec93f53ac49272cc0367c1b6d8c35ce492e8f
SHA51205b3026d66bafc96a4c0d42353fbe270c5810afffe9c7f931e725708f4062d0d20f811d5db03f23137b48c754f5f718a0d8030d45f40f666279949eacf097301
-
Filesize
172KB
MD5c17f74ab2fe0a014133b12704b377163
SHA121a914ec613a622565a34e53453e42d13c46ebcb
SHA256b043844c127a5b8f4b50f3e809e21e8d87a1ec0364f7c3166b06835cc15097d2
SHA512332360b0b5e892f1d40c0d7998507315295462bd68980771cea9bbf8afb5ac9b6b8d328804bbd618b11962bb7ca6d7a570f797e57852922d9f13c2bcb896952e
-
Filesize
172KB
MD51b111ba4872545cb09adfcbc5f15db2c
SHA10467810558190449d7abd791d829198c607d6412
SHA256026a5e4d3cd1b372fde78bf61c50d225960858010614b95a1e112a836b9466c6
SHA512bf38ef73cef184a0c2571d681a1a1a88637367128d2f8d3529f0c52dd0b641e328c2d0053a5be5371fb2d28810e052c1ebe7350dcc42b1052832af7b197af191
-
Filesize
110KB
MD56b7ab74edd33600b0954c700e0a5e06f
SHA1f6c5d2ba88d89f01286f5329e9d69683bf25f3ab
SHA256b18353f93e1336851b0a2760249b0e2a48848313e716aa36a6b07405f7f89b7f
SHA512970fe525deab9eff6752c139a35337c62e389b4a54ef94bd73211eb80ad52f01470401d2268f2a5d1e9f3d026c646ab9f75de2c420e99e17488adac14e87f34c
-
Filesize
97KB
MD50581da24e6472f273a5fe6b97feb0864
SHA10ce79029eb7298dbf55ec72754b2621487322f14
SHA25657e1600133ae4652df94ad818cdba3d69e0012e0fb0ee29e034146791657df58
SHA512f5429597fefe1a629247ce7be8a76cf7b27906ed59ab8c8a08b21097e1e825f7930d0a4767642e2a1463fb5d836057c342ba153b159ce8d55d458fa19f5a8bc0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
13.3MB
MD51cd392f10deef16a3ac24faad777e3b1
SHA1038b82f53b939976c3d306da6f48ac2f40be72a0
SHA256b8062f47ce12ee1582f55f05071857784be16507fafccfb8c6573ccba83913b0
SHA5127c59b01a6a1d9145bc8ba13867332b47d4d824a66ea6e181c43da973ac6923498dfb0816b2398b1fd6658c8cff81aba87caac5cdca11f8caded1624fb0ebd18a
-
Filesize
13.3MB
MD51cd392f10deef16a3ac24faad777e3b1
SHA1038b82f53b939976c3d306da6f48ac2f40be72a0
SHA256b8062f47ce12ee1582f55f05071857784be16507fafccfb8c6573ccba83913b0
SHA5127c59b01a6a1d9145bc8ba13867332b47d4d824a66ea6e181c43da973ac6923498dfb0816b2398b1fd6658c8cff81aba87caac5cdca11f8caded1624fb0ebd18a
-
Filesize
13.3MB
MD51cd392f10deef16a3ac24faad777e3b1
SHA1038b82f53b939976c3d306da6f48ac2f40be72a0
SHA256b8062f47ce12ee1582f55f05071857784be16507fafccfb8c6573ccba83913b0
SHA5127c59b01a6a1d9145bc8ba13867332b47d4d824a66ea6e181c43da973ac6923498dfb0816b2398b1fd6658c8cff81aba87caac5cdca11f8caded1624fb0ebd18a