Analysis
-
max time kernel
663s -
max time network
680s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2023 16:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/ytisf/theZoo/blob/master/malware/Binaries/
Resource
win10v2004-20230915-en
General
-
Target
https://github.com/ytisf/theZoo/blob/master/malware/Binaries/
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Drops file in Drivers directory 1 IoCs
Processes:
procexp64.exedescription ioc process File created C:\Windows\system32\Drivers\PROCEXP152.SYS procexp64.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
procexp64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PROCEXP152\ImagePath = "\\??\\C:\\Windows\\system32\\Drivers\\PROCEXP152.SYS" procexp64.exe -
Executes dropped EXE 6 IoCs
Processes:
procexp64.exe{34184A33-0407-212E-3320-09040709E2C2}.exe{34184A33-0407-212E-3320-09040709E2C2}.exe{34184A33-0407-212E-3320-09040709E2C2}.exe{34184A33-0407-212E-3320-09040709E2C2}.exe{34184A33-0407-212E-3320-09040709E2C2}.exepid process 1260 procexp64.exe 4944 {34184A33-0407-212E-3320-09040709E2C2}.exe 3900 {34184A33-0407-212E-3320-09040709E2C2}.exe 2360 {34184A33-0407-212E-3320-09040709E2C2}.exe 1276 {34184A33-0407-212E-3320-09040709E2C2}.exe 4188 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
{34184A33-0407-212E-3320-09040709E2C2}.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
procexp64.exedescription ioc process File opened (read-only) \??\O: procexp64.exe File opened (read-only) \??\Y: procexp64.exe File opened (read-only) \??\G: procexp64.exe File opened (read-only) \??\H: procexp64.exe File opened (read-only) \??\J: procexp64.exe File opened (read-only) \??\X: procexp64.exe File opened (read-only) \??\Z: procexp64.exe File opened (read-only) \??\P: procexp64.exe File opened (read-only) \??\V: procexp64.exe File opened (read-only) \??\W: procexp64.exe File opened (read-only) \??\L: procexp64.exe File opened (read-only) \??\M: procexp64.exe File opened (read-only) \??\N: procexp64.exe File opened (read-only) \??\T: procexp64.exe File opened (read-only) \??\A: procexp64.exe File opened (read-only) \??\B: procexp64.exe File opened (read-only) \??\E: procexp64.exe File opened (read-only) \??\R: procexp64.exe File opened (read-only) \??\S: procexp64.exe File opened (read-only) \??\U: procexp64.exe File opened (read-only) \??\I: procexp64.exe File opened (read-only) \??\K: procexp64.exe File opened (read-only) \??\Q: procexp64.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 11 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exeprocexp64.exeWINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz procexp64.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 procexp64.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
chrome.exeWINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4022029615" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31061327" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4022029615" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409abbf34ff5d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08fa4f34ff5d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{1AAB800E-6143-11EE-9359-66F797301216} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31061327" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000023945248a016ff4caf831eebccac29d8000000000200000000001066000000010000200000005406d3219bc1c3a83b01eedb00c3f7cf1b71afbd3ed7548f04458be416811460000000000e8000000002000020000000f94c33ca9e14ea9457ab54b9e31c7d315fe6e2363acb45340af81af047554a50200000008c5050ae4f4b3c329ef17f24e3a8d9163d0a52340449924264fb28d5476bc62b40000000a19792ec16fccbc740693816a58b75de534f0f77fe8c7bf046676e9325d0b11b6235b6b59ee200666b8069b3909f0b72b6bf2bc4dedb82ed05d0c0a5e628162e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000023945248a016ff4caf831eebccac29d800000000020000000000106600000001000020000000b9988c65b1d590424e6864b81c9e6f3ba6150e0aed80b7e20cf74120e53c8a5e000000000e80000000020000200000007598a5d567509e4a2ffe300f2a8e72e7d0124c07374f90ea6c6df04d5abe3ee620000000a88fec30eb564a51407635d46cefcdc4274f7a36223a3fe248a154d33880b38440000000345d70f75faffc04b33575547e4c8c0ce2d735e2d91729a3a963e67b030cfde4638bb4a7933fed2c757e81cbc7dc4e399e2ccc21576da9d5ee110aa0b96f7e53 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133407381961335052" chrome.exe -
Modifies registry class 3 IoCs
Processes:
mspaint.exechrome.exemspaint.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000_Classes\Local Settings mspaint.exe -
Processes:
procexp64.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 procexp64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868 procexp64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 procexp64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 procexp64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 procexp64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 procexp64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 procexp64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 procexp64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000007431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a procexp64.exe -
Runs regedit.exe 1 IoCs
Processes:
regedit.exepid process 1868 regedit.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4148 WINWORD.EXE 4148 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exeprocexp64.exepid process 1280 chrome.exe 1280 chrome.exe 4768 chrome.exe 4768 chrome.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
regedit.exeOpenWith.exepid process 1868 regedit.exe 1732 OpenWith.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
procexp64.exepid process 1260 procexp64.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
chrome.exepid process 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe Token: SeShutdownPrivilege 1280 chrome.exe Token: SeCreatePagefilePrivilege 1280 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exeprocexp64.exepid process 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exeprocexp64.exepid process 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1280 chrome.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
Processes:
procexp64.exemspaint.exeOpenWith.exemspaint.exeOpenWith.exeWINWORD.EXEiexplore.exeIEXPLORE.EXEfirefox.exemspaint.exepid process 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 1260 procexp64.exe 416 mspaint.exe 4760 OpenWith.exe 1836 mspaint.exe 1732 OpenWith.exe 4148 WINWORD.EXE 4148 WINWORD.EXE 4148 WINWORD.EXE 4148 WINWORD.EXE 4148 WINWORD.EXE 4148 WINWORD.EXE 4148 WINWORD.EXE 1260 procexp64.exe 2576 iexplore.exe 2576 iexplore.exe 3744 IEXPLORE.EXE 3744 IEXPLORE.EXE 3744 IEXPLORE.EXE 4940 firefox.exe 2052 mspaint.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1280 wrote to memory of 2156 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 2156 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3264 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 4500 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 4500 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe PID 1280 wrote to memory of 3552 1280 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/ytisf/theZoo/blob/master/malware/Binaries/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc7ff9758,0x7ffdc7ff9768,0x7ffdc7ff97782⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=388 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:22⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1904 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:12⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4516 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3412 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:12⤵PID:584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1580 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5460 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:12⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5472 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5812 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3424 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5284 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6272 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5636 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:12⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=2976 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:12⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=5444 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:12⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6532 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=744 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=5516 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:12⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1668 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=5380 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:12⤵PID:884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5800 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6496 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5476 --field-trial-handle=1964,i,15614726641191412608,11597158393865881017,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3840
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1388
-
C:\Users\Admin\Downloads\ProcessExplorer\procexp.exe"C:\Users\Admin\Downloads\ProcessExplorer\procexp.exe"1⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\procexp64.exe"C:\Users\Admin\Downloads\ProcessExplorer\procexp.exe"2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Enumerates connected drives
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1260 -
C:\Windows\regedit.exeC:\Windows\regedit.exe3⤵
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
PID:1868
-
-
-
C:\Users\Admin\Desktop\{71257279-042b-371d-a1d3-fbf8d2fadffa}.exe"C:\Users\Admin\Desktop\{71257279-042b-371d-a1d3-fbf8d2fadffa}.exe"1⤵PID:4448
-
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Desktop\{71257279-042b-371d-a1d3-fbf8d2fadffa}.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4944 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w0000021C3⤵
- Executes dropped EXE
PID:3900
-
-
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w0000021C3⤵
- Executes dropped EXE
PID:2360
-
-
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w0000021C3⤵
- Executes dropped EXE
PID:1276 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w0000021C4⤵
- Executes dropped EXE
PID:4188
-
-
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\PcaSvc.dll,PcaPatchSdbTask1⤵PID:2492
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\SetUnlock.jpeg" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:416
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:2364
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4760
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\JoinRepair.jpg" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1836
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1732
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\GrantSwitch.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4148
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:2284
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdc7ff9758,0x7ffdc7ff9768,0x7ffdc7ff97782⤵PID:4404
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -nohome1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:4768
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:4940 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4940.0.599905894\1866213379" -parentBuildID 20221007134813 -prefsHandle 1860 -prefMapHandle 1856 -prefsLen 20938 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a87ed4f-a308-4a53-91a1-f5c5cdcaf37c} 4940 "\\.\pipe\gecko-crash-server-pipe.4940" 1964 2df6a8d8758 gpu3⤵PID:5096
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4940.1.1754992687\389624670" -parentBuildID 20221007134813 -prefsHandle 2344 -prefMapHandle 2340 -prefsLen 20974 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {47f31b9d-fa0d-4a00-bd14-828a4dc6791b} 4940 "\\.\pipe\gecko-crash-server-pipe.4940" 2364 2df6a039b58 socket3⤵PID:4868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4940.2.630901598\255516949" -childID 1 -isForBrowser -prefsHandle 3364 -prefMapHandle 3360 -prefsLen 21012 -prefMapSize 232675 -jsInitHandle 1444 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e4b75f0-6ee6-40a6-beb7-11b622a8d6e7} 4940 "\\.\pipe\gecko-crash-server-pipe.4940" 3376 2df6e6bd258 tab3⤵PID:880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4940.3.1728905636\609896643" -childID 2 -isForBrowser -prefsHandle 2788 -prefMapHandle 3324 -prefsLen 26437 -prefMapSize 232675 -jsInitHandle 1444 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ac98e30-023b-4dcb-901a-cd3fa23b267e} 4940 "\\.\pipe\gecko-crash-server-pipe.4940" 2512 2df6ca22e58 tab3⤵PID:4168
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4940.4.1484380791\200509057" -childID 3 -isForBrowser -prefsHandle 3944 -prefMapHandle 3932 -prefsLen 26437 -prefMapSize 232675 -jsInitHandle 1444 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {19a7a11d-9246-4055-bd84-16b78727883f} 4940 "\\.\pipe\gecko-crash-server-pipe.4940" 3956 2df6ed9a858 tab3⤵PID:1384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4940.6.2089233942\254158833" -childID 5 -isForBrowser -prefsHandle 5064 -prefMapHandle 5060 -prefsLen 26577 -prefMapSize 232675 -jsInitHandle 1444 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1977de0b-3ba2-42e1-8058-a972b8438a80} 4940 "\\.\pipe\gecko-crash-server-pipe.4940" 5020 2df6e66e858 tab3⤵PID:2864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4940.7.986548127\86046957" -childID 6 -isForBrowser -prefsHandle 5272 -prefMapHandle 5276 -prefsLen 26577 -prefMapSize 232675 -jsInitHandle 1444 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c2847fb1-6699-46f9-a32e-29ce4244ad1d} 4940 "\\.\pipe\gecko-crash-server-pipe.4940" 5160 2df702bac58 tab3⤵PID:2004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4940.5.1358222078\321220165" -childID 4 -isForBrowser -prefsHandle 5052 -prefMapHandle 5048 -prefsLen 26577 -prefMapSize 232675 -jsInitHandle 1444 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {163d5509-210a-4bb9-a404-7f5415b28691} 4940 "\\.\pipe\gecko-crash-server-pipe.4940" 5040 2df6e66d658 tab3⤵PID:1948
-
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\My Wallpaper.jpg" /ForceBootstrapPaint3D1⤵
- Suspicious use of SetWindowsHookEx
PID:2052
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:5500
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5c7a33b9876cab748a5a981036219c054
SHA160bfb76b9f629ede1406ca333b4c237343f2084e
SHA256960b99a74c8f349d0e8ed4ada168926e6074511aa39cdd408bedc3b645d0d184
SHA512cc74e439d25dc8ab0468b616829c2bb8f12d4363ea872501f6ac87382e99119ee6e7ec93aed5cc3095760239524a62e97e0128799df019550870dde2371f1b5c
-
Filesize
40B
MD5c7a33b9876cab748a5a981036219c054
SHA160bfb76b9f629ede1406ca333b4c237343f2084e
SHA256960b99a74c8f349d0e8ed4ada168926e6074511aa39cdd408bedc3b645d0d184
SHA512cc74e439d25dc8ab0468b616829c2bb8f12d4363ea872501f6ac87382e99119ee6e7ec93aed5cc3095760239524a62e97e0128799df019550870dde2371f1b5c
-
Filesize
40B
MD5c7a33b9876cab748a5a981036219c054
SHA160bfb76b9f629ede1406ca333b4c237343f2084e
SHA256960b99a74c8f349d0e8ed4ada168926e6074511aa39cdd408bedc3b645d0d184
SHA512cc74e439d25dc8ab0468b616829c2bb8f12d4363ea872501f6ac87382e99119ee6e7ec93aed5cc3095760239524a62e97e0128799df019550870dde2371f1b5c
-
Filesize
2KB
MD5403f2bbe8f4746065fad64d35a3d4b0d
SHA1de747649ec58a5d908e6904d7ca3c9ee68d66154
SHA2560469907dd30f5298f430d7f93200743c77c0485a3c0408de5939b1dd4f11c906
SHA512af9666353c1ce8bbcc3a6d771588948ae17775340dda5093d2b01658ec440eefeb33c97d309a6c119aff64948f15a0ddc7bf7051bb84e21e67943a2d35c2ae2b
-
Filesize
1KB
MD55ea2b02e796ce1d15ace4399bfd00ae8
SHA19f9e06c3e70a85336e57bf39f489028a599f775d
SHA256b03a72752299fd3751e28ac0c244253b46130996605ba9fe487df3676d7bb58f
SHA512a391c922f61c1426032d8598832b6cc51cabdf1d6bc4a4ad73768f6bc41a08c842b656d607bfd3d97177fd699c00d46f599051859ec0a29d86e7d08fcc635e11
-
Filesize
2KB
MD5457f167384c4c3c27c357871888e4466
SHA1d2e9729d620b511e20ae94256cecc64efeb6c3ea
SHA25681e15ebdae5cb68ef100412908d5620785be4ea2af5ea6deac39e818f25e26ec
SHA5121dbef81147bdfa3f9a4f2148083dc255d66e58f14ab21e0f4f23b8e8976abffd00c9d9ae733ee76d3babdcfc872dd4f4370e37d4ccdc62e71db148962b121775
-
Filesize
2KB
MD58aeec801e358d479a28d00bed47e9b4c
SHA1f930a7c7aa094ec57023edc775df507e6e5a835a
SHA256804811d4ffb6c85ece5f84920455451b5379085647dc323bde772a73111e4768
SHA512344e9d9084bacce5fbc0c529879e53c3c4350e29f0c584e16d31dc6bafa6616bf5cc5398b7499e27d1990f67632a00672402bf64421be7baffb646470e553e80
-
Filesize
1KB
MD5c6e6fc317dd8addc8371519c95f815af
SHA19b7072e1bdf93d40b10ffe9748b336bd20f054d9
SHA2561a0fc7d20c446c98a91ad309e547d66eaf4c344061f5ad7a6e6e8453b095453f
SHA512989667d79faf15fc630c12665d5229fdb2cb0b46bc4f5d3a6aa3b085bb11802cc82668de8e723d1fd991fd6737fa711a9218d7100dee43d9fa61da92eb1c2c26
-
Filesize
3KB
MD58ef930c7e7826927e7015f040809dda1
SHA12c4439dec95bbbef380b3adb303d2eefb4b7c607
SHA2564b803d308b2fb7fa9953e596bcf19ef232374c7e345d0d1793d8f48cbefa11ef
SHA512e20023f02ede8bc08c857006aea86f73a2ee8e984292aa85bd39340cd75a7aca06792e88e00a8d7c1a335ba0add26834f99d16df17b7d032daef48f1a4005e89
-
Filesize
1KB
MD53710de998421cd7d272a07af6e2ad6ba
SHA15c4fa07e1ffb3057146b2d67d646554a96ae46b0
SHA256b044158aa8b73affd42d175ad701aee65de53ab5ff78130ff24dbe29f3290967
SHA51246828e07fd1cb67c153b9c9390f5383afbe3473dc4cf87e90d243f223a1c9c35176e7c5ebe352d9f9f753494350607930ecb670f5219213c93848cc28351f224
-
Filesize
874B
MD56c6aff7f65410f274ca56af377b1ee25
SHA12459a1cd9f1ef31bd64ef6aed534fb3536199719
SHA2566742375dddad7f239347e063c4585e339bdca368d3ceaab756d631ee9cbae5b2
SHA51289e7efa07132e008467683792866058fe0de925b425848b87b43c88ddda4b8fc6be32701277d8b14447f0d3d8f6162bdb10a3af3df40b598eab46be01595e5cf
-
Filesize
1KB
MD5e55c7c2162714a5b0eb72be0010a1c5c
SHA121d49f15a151cc0e730388e317db00167359a249
SHA2564aad3972d16819fa1a71efeea15965f541da09cace722fc1f86725de4c3cd822
SHA512613e1ec3bcac5811b8a60b9534cbe739468102c776673aade601822a4d224ed6852520dbb87036211eb29b9d26f00876897e3dd6d99e6abc7719746d58160b21
-
Filesize
1KB
MD5c136c443e9ff3d043d7bfce2e11402c2
SHA1b90cf53015abd5bbfbee56e4c1a35e06b95732c7
SHA256ba12c3fd5c5ae9e80905dc615b21b02afff11c2f8731d116cbf3ec56a2894940
SHA5125cf6a6274df080249649b21ed76fd1849aa113aab0bd886cbcb9c13fe78b380268ec34782bd819a4afad1826bb2297a71c2fc05643e26927f08fcd59cde98f5d
-
Filesize
1KB
MD53e7fec139a0f8e70d0f2b27f2c65ac22
SHA15ac6fcf2d812735d5076d4d2cac6b6b31c4dba2d
SHA256e340d3bdd536aaaedd1d68ecd9c30b1444d095dd0d64d4bf2ffc4bd0b962fae5
SHA512613ed2d9fe6e019c6158f54ad977d5daae8871b4990648b05f23a369a61c9a422a6dc0ad0d6879a646d857500c6a742269228a39f1d47fa35a8e52ad6f944edd
-
Filesize
1KB
MD5e4a958e7629ec672eb24ce8c8cdbe5ac
SHA1d971644267ac83b033ff1c9a3c4cb48ed1f8923a
SHA2566b15a57cb09c664ba340e6ed38a43e76b0926b599aa8e6f7d0bd1a62dd709db9
SHA512539bd2e2b985107def43c3ee49437860b92cf7dfabde37f77dc9b3b6b6454759e11952a2264fa6e1b098ac7467519abff180c1ad3f6ce9a1b66140272dcba221
-
Filesize
1KB
MD56ac38b02008e2449bd599c9fcc689c7b
SHA13aabc311c3e29bdf6c351fcf5975103a18bf9e3b
SHA256a58a7537aae448fc3fb9f14e1c2ac446e935a5d4ce4f6d4eced89bc88ae093f4
SHA5129793ddd65eb204b1fd51439d462c280b97d3f491141098ab7d58bcb112747f7a675400ba9acd7cedc0ab76f4cc9f574750e7d542eb9ac9d9a0246504534cf691
-
Filesize
6KB
MD56e291758b482737c84bf49261c7ea6c1
SHA1fa06d1d831f41f0bdbd4e6875ca139839a360ad1
SHA25644fb8ca342798a1fc06fa7c659e1d7455c0b98d4686cf62d10e58b575f81b469
SHA512c5421db85516b70fee91c0c77b8b9bb32f9ac855bf937dafe5bf1e665228440b6d8dc01b0fc3e00cde628228b57a93ee1caffd25355e55c763f3fda363c90107
-
Filesize
6KB
MD5eda3d17b07df6795030100cd3e1eaa90
SHA13d2968c2b9db10abab5f1ca9e5bd69a90c7d198f
SHA256a5e589e72f257464171380a283e00bb5c0065b5df78dffa4575778580d84a427
SHA512acb733b54eda19fd82e1584b4cbd8368e5b1c4b1f170f5c513c9d4a5eadad6bc027301d39d5a5a3932c817b32bb662256d3809f20d142b1eb3d588307c64dc7d
-
Filesize
6KB
MD5990844d4d7af502fc8f64529bb689619
SHA11265b4d847c76bd5dadf380ad8aef3bb691660d8
SHA2561f8aa2b8cc304cb4f6724a4e1feee24a6ceef54a1ae684ea748c3342fb802c7e
SHA512d9e1d44da3084a8d41d6405f360a85d8868d30523a14f9cc30f81f15217c865f46c65a2c854eded10d38ce90b607154ded582d81b5e64ca83a2c4884cf2c67a9
-
Filesize
6KB
MD5abeba028670d2085917fb8a03fcb259d
SHA126323ab9a49f3fd111fbbd8a81de82ada0945d61
SHA256ec9e913cba974da516c09c3562d44c82bf66a752c99d2c609375533f1c1b07cb
SHA51225c5dea454be19125b6928fffcf4e23b879605809bc85a9450d92bbcb4b6c0bb323e988c4fb081cc369e7aaa53669d077d54743d358b209518d60c69155ddea7
-
Filesize
6KB
MD5683ed4b0513b3998ae185b3ec9c43f59
SHA1b4bf91458403fd9726b07462b135a470bc1afd63
SHA25673f698d72282003240511a87ddeb83a3631330471aecfde8e30366f4cf2122a7
SHA5125b4d0347a183ee895610257eeb703024541ba041f5c06b3e7a44273cb878f71fba78680e008096968e0c3cab9a0636e83a19ebf40e6df5d6dc13661941b9cd16
-
Filesize
5KB
MD53a588684a4f2089962cd26e053af9801
SHA122cd10d789f9e654441195179a432cb43c19d779
SHA256b1865c1458f168fa7556cb4d5e871ae9e4c720cc67b0884897efb4018dcd4528
SHA51255a325748ba270ff0fc310adeba9eb0e397bceb795428e0c09c34c43363f500f1ad5cd5ea3ffb86647fa4ddaf9531069cffa54bb2683e80f2d7bc6f92b80c134
-
Filesize
5KB
MD55955e5f5ad90492cc7298c9132979ab3
SHA11bfe781cb2113ef1ae7faa611453ef700e905b7d
SHA2566cc5a88901862d4eff15c5198932bf2a04f039736913dbf75b9be6cda4a4ffa8
SHA512e3c9ba6a8d4c224c1e365a2d70f6da5a18316a9a608a4ee7cf82e089b7fa9088ad8d27506b61886b2c9b789048d7aa2491ee5b0f2ac67fa576f4d8536a4c54e4
-
Filesize
6KB
MD5265aed2137b12fd99a72d9b101381879
SHA150bd01c05884c03035db89c2df434fa260390375
SHA2560497e2f41a079bf4cdb315dfcecbc1a65be212494be7ea7e3afa9124c147ad69
SHA512c8e76ac6fafd2a33af5a1399bd2d86040f97e23597126b512946add4c18c836d660e27fed714d5d54283835e98dfa34c118aa3176b8c25456beedf6b64776e40
-
Filesize
6KB
MD5c63b1524c9346e68c9556d533426b186
SHA1bf19b873574c1132eaa18a760f2c3addfe33e9b8
SHA25614bcb731d6f5b6abecf65adb934b5b1005a38b73b148292fb3fdb74a3302842c
SHA5128f0b86191f38f6c8d89123d6673571ea1d0d137718cf2cc1c66c9eba66756f188ce7132ac2fb3b94f0586e6d34ab9cd51730271b18c5a3e44fd41f90555d85c2
-
Filesize
6KB
MD580b115d5bbb353856b2a01ac20a8081d
SHA1071e5c058526defefe5af2163eeb62ea7c26146b
SHA256ac9b6788dae7de438408433803930eb7a83a7bedbbbba742dc965fe17486bb56
SHA512fd1fc8f9200336b0ef6ff38bc395d8944c0262bba58dec6ed39bb83d99b83544a210a0f8cc10a823662cdd6fa51a3925550a97116822da14d38e5e9fc318a80e
-
Filesize
5KB
MD5149d5fdcd1fb67f71bad8442e70a6cc1
SHA16976d9389e98b357ba6d59eb23964f70529e5dc1
SHA256c9fdaf81557823d5c1df0d6b7e3ad20fc10ea1567ac1daa74fb5829f5ea0ff96
SHA512d1143e232c5ec4d868cb922a9fb2d967e67fc2d8e2289d6ebdc05bd4a599b20771cd308c9a9eda2fef186e4e6941470a20271df1f1f4a6b61cd8f258bc41a260
-
Filesize
6KB
MD55b73d4a1e0325e9219fefe324391f6e3
SHA12551bb5a19513b5f4eeb1368bf20b4cb288f1366
SHA256a9b86e47b82a042a9e397e3145e63709daadbefd0eb421eecd58848362430bb1
SHA5122bc08c7333b452e8f85532430622c2ed7b8b543d83fe06de10d0ba81bacfa8bfa8d559f32e801f06785db66da754788faca6d5abe74bc8e6c14ee9bfab14d728
-
Filesize
101KB
MD547e597f0cebb53ba64e515aec669a730
SHA15d7e2dda374767a10e0f3420065c9d495ba72baf
SHA256a1b3cb8fe5ec66718c3362a09bed5b0a26ebd891f0dc2a3408502a6281d4d548
SHA512a69943ed6a976b9f2992d6650e132fa66a1aabe2a4d59756a23b86220ee605cdcee7cbab62f515bbd145a225a9f751f88623c97d064596e7c7da5e0e6d736340
-
Filesize
101KB
MD549be225044ff3185e4f82177aa856359
SHA17b1d36b06d0fe31e680b476dab3195aae00dcffc
SHA256a2fda338eab47ca067716c61a3d2f475c104d0a6471340515f473eeed2fc2bb8
SHA512450dc584be0db3c97d1f1ce60cfa3b14f9242b2475cd763a2138b83c032e0ac9c2bd60241e1143a9bb2cc2a48b3b20d63c01665c9024974e57895712c9447744
-
Filesize
101KB
MD5593b6fe147726e6fbcd53143810e109f
SHA1d409eee07fbdca4bfa769f9c62f9cd626d07531b
SHA25609c31635fb08be253fabad92ade2ca408e4ff12c3ec30af0b4a9fcef47db43c2
SHA5122a3f0186809095dca8e28076bcf394539fa6edd31df3cee28f3a7df88d0a2a9c1ebc4f42df1219c8eb22a97f5bb31ab12f84c239c100c243ea1c63ff6a58e6a8
-
Filesize
106KB
MD5d2691b2e6268ec9f1cac0804c6e7129f
SHA14af72ddbc2271c762e9c28497bbec7a82b19acc0
SHA25681e915d283452b4f9f4b73d68188e8a0305d60609f40924d8e0b90ea0abb0530
SHA51246b03cf44e5e1071058d79ad41b01e8d773c92004dec13377014e38edeb4707d90b4a2a5032ac7c33b7d4049e1d1c9cf5e880ffeb4401a00c4726256f02142a6
-
Filesize
97KB
MD545ee7cd6e9887dc373a80e4aad69d6bf
SHA1bff84049da651b0438775c4b116e0ff7c69c78b7
SHA2563956681363375d2801bc5abd216f83e83c1890dd3b35a79f394c810e40cc49b5
SHA51236be8ead0c784c721aca8fb3e33000d1875ca927afdc398a0418fb1213b983f542da95d1bd4025942079f36eea124c06a5bd78cb4367891339258ef477e9366d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\t9nv4f6k.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD582d65e80c767486806d27ddd10f3be80
SHA135fef22842c9e3d0a3e766acc3049e577e879ae5
SHA256edfa72de1857157110268780b95a0f96a65d945a2fb61dee305021d4c8f7de12
SHA51283d20d5f2a1a136a5758f76697e27c85820b9356a9ecc24a50b0dbe9068c1b4c246f873ca55524f48203d59be503eb4f04aaa007d472bbe9f63ff1fe8c9dbe3a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\t9nv4f6k.default-release\cache2\entries\58A756A796A86993036E1F0F79183245EE2ABF58
Filesize13KB
MD5be7b31ffc1559d6b3c80d44131189318
SHA1c1e4c41d270eacb02e43e9e8945612c2e78902be
SHA256eceeeed03cc34b96d7f54ce53ed869445dcd67f73c9d9b8629fff73fdf41793c
SHA512930535486db4b1ed0f21f0f9f4b954a017a3ba702074591494cfb4a38822a7f798ccb832afa1bee88e36344096e6b4ee27f31240bb2fe4d27aac0ff8f7bdbbc2
-
Filesize
2.3MB
MD5a0773a1a0102cfe56855b95b654ff400
SHA1809fc843f89a49f3a56c8d8552e3fd6d1fa1bebe
SHA25635bd4e71b67655192a2b5159e7a7303d8332cd81df2842bf2679d92adbf57e25
SHA5129ff45c55338300f0f47219732a0252a856f305000f22955f1e6207ec131d8896f7564c621864ecec4228a488e786cad5e1a127230e60f031a83072c988c73d47
-
Filesize
2.3MB
MD5a0773a1a0102cfe56855b95b654ff400
SHA1809fc843f89a49f3a56c8d8552e3fd6d1fa1bebe
SHA25635bd4e71b67655192a2b5159e7a7303d8332cd81df2842bf2679d92adbf57e25
SHA5129ff45c55338300f0f47219732a0252a856f305000f22955f1e6207ec131d8896f7564c621864ecec4228a488e786cad5e1a127230e60f031a83072c988c73d47
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t9nv4f6k.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t9nv4f6k.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t9nv4f6k.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t9nv4f6k.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t9nv4f6k.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t9nv4f6k.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t9nv4f6k.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD583ac98e31836ec81ad58837f39bb4534
SHA1587f24546b0cfc9fa033b48ebca8937155d2d141
SHA256fb9dcb6d780c32da08770e80fb6b58fcb8bc67c0a0712fb85e6fd288704f045a
SHA5122aeea903cd18f40171faa2f5559046db3a67b28d4f027f3c0b34d57cbcd21c9cfbcefd3e72e84cd13b30b33b7647e06d97ebcba9b3aeda5947b00f24455de9d5
-
Filesize
6KB
MD58175ac8236157027e907467c42069444
SHA173cbccda08bf331f8713c6dd6908d3c196dad50a
SHA25685f103cfc05ed4f12f2447d94fbaf2aa8da6506d12c83a4d88e057f42674a3a4
SHA5127912562ea6e9bb0773b5374464bdcb6a8666d4f055f351a05170b2fc62e1f62d41884feb56cd973858d64b866eb9739d4ff429e1703d192b11f443df9fc67214
-
Filesize
6KB
MD5637e839b57526a322da8886ebef239f2
SHA114b8e90dedd19cc7880eff86587ebb6340d27465
SHA256d2e968fd3ffb093700c3d2ac4c37b47fe9372b3a347f68de43d58d2579fd4405
SHA5129960fabbb533b753f72a88d2f7d4fa94ca24262b59b826972ad49395e56ef1d12d32532b6cfea9f6ed904ec14a41f3c9a0557755b43f1b16e88c3c93b74283bd
-
Filesize
6KB
MD5b7c80af345977fc62bbe4c4aab4cce79
SHA13aba6cedba58abb3c9f7ad0d065cb9c9b3c3a42c
SHA2568f70f3c1d3407d2700dd4fcae4d01e51e671410d4b22f2f4f393a62e4514889f
SHA5123ec4f837356c8fbaa2a2d9f8498bbb7d13566fa676a06ec9e1b2d6b12cb389d44eca1a53d2a588df0a5c11a4dce41a2d149d7efb390af7a7a92d8e71d38cf3e4
-
Filesize
7KB
MD5578cde2be32906772fbac2e8db2e23f7
SHA1552f491b045188239c24f7257d91c0cadf69abac
SHA2567f1166adb2ad4fcd0a497ae627f04f7967e2f1a391cfde590b08327bd01583bc
SHA5120952c2b30597f61079b00439e49db189764f76781086da06d0fb5c03d1a8641136a332f3379a8f11b525a5fe78edb05ae006b7aea8ac768a2c302bed423b9e9e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t9nv4f6k.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5c96cf332a5817bbd34249ddd07310c7f
SHA12280851dc9e5711a97c410060204e38f069f454d
SHA256abe9186786660917e32e8c26df1fe8a1ff8c26dcc95e8d182de7411eb6b9b487
SHA512cb6a12ac7127a09ae3e407694eea1f508886951987192c93e7d7c08956b46cd0f8bfa466c92d3210238e694eb303886d90e53d8f38681f481c947c21153d9f70
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444
-
Filesize
282KB
MD522078ff56e3fcd674ec4b9322a7dee5b
SHA13a5d07577b40e85047dcfb0bd03a6fc23e7cc671
SHA256ddb9b850fa0eee2f62463728b07bffc11eaa9b241d215029eaddf1de4ec54936
SHA5126e1f260057ba8f8eb4568fac513f0b49094ae387d9a555c2600a75df00d1c091506e77dab58f36908b1c0cbfebb1d82984f915741c1a8b790f5f6c82f64add5e
-
Filesize
3.4MB
MD50102edc43a54dd4185e86c0a22e7b3d8
SHA13570e09220b011435518e37b73407a905517f2e8
SHA256c50bddaaacb26c5654f845962f9ee34db6ce26b62f94a03bb59f3b5a6eea1922
SHA512d0121f68dd4e311e0220c9fa92430dba0a202f5a8b9f7839681f4b4418015a01bd8f5d71b5c229b6768b05bcf5eb0f33f3e51f70c0a8d7be688a744df60bdcbf
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e