Analysis
-
max time kernel
110s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2023, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
FireflyAI.exe
Resource
win10v2004-20231023-en
General
-
Target
FireflyAI.exe
-
Size
45.7MB
-
MD5
5d058ac0a96ea904495b4ad08e725fe9
-
SHA1
c70ecff66304842c3a0cb07181343f261a23feb0
-
SHA256
e3e1359104bbda6f7095b6dc5d35134d52a9a1a0101c88530bcb7cbebbe51a9c
-
SHA512
537df99ecdc6470ce000646797e2b9f357e755cd89e3d6204150c8b6544fe36fbd9f460acd0ac1af719da22af109bca2b04ce9c0f62b715604040aad64f50704
-
SSDEEP
786432:E5CUXgrAXasuqWaL2vPdgnIFUR9A5UqrkBGnk9kEgsYNzhMjxnfQysN:bsVXz+1qIFUCyBGkeEgdzw/4
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2276 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation FireflyAI.exe -
Executes dropped EXE 1 IoCs
pid Process 2956 sqlite3.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Adobe\caps\hdpim.db sqlite3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000_Classes\Local Settings taskmgr.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 488 reg.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: 35 2788 cmd.exe Token: 35 2788 cmd.exe Token: 35 2788 cmd.exe Token: 35 2788 cmd.exe Token: 35 2788 cmd.exe Token: 35 2788 cmd.exe Token: SeDebugPrivilege 3636 taskmgr.exe Token: SeSystemProfilePrivilege 3636 taskmgr.exe Token: SeCreateGlobalPrivilege 3636 taskmgr.exe Token: 33 3636 taskmgr.exe Token: SeIncBasePriorityPrivilege 3636 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe 3636 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 4804 1992 FireflyAI.exe 90 PID 1992 wrote to memory of 4804 1992 FireflyAI.exe 90 PID 4804 wrote to memory of 2788 4804 FireflyAI.exe 91 PID 4804 wrote to memory of 2788 4804 FireflyAI.exe 91 PID 2788 wrote to memory of 1176 2788 cmd.exe 94 PID 2788 wrote to memory of 1176 2788 cmd.exe 94 PID 1176 wrote to memory of 488 1176 cmd.exe 95 PID 1176 wrote to memory of 488 1176 cmd.exe 95 PID 1176 wrote to memory of 384 1176 cmd.exe 96 PID 1176 wrote to memory of 384 1176 cmd.exe 96 PID 2788 wrote to memory of 2432 2788 cmd.exe 97 PID 2788 wrote to memory of 2432 2788 cmd.exe 97 PID 2788 wrote to memory of 1180 2788 cmd.exe 98 PID 2788 wrote to memory of 1180 2788 cmd.exe 98 PID 2788 wrote to memory of 5104 2788 cmd.exe 99 PID 2788 wrote to memory of 5104 2788 cmd.exe 99 PID 2788 wrote to memory of 4360 2788 cmd.exe 100 PID 2788 wrote to memory of 4360 2788 cmd.exe 100 PID 2788 wrote to memory of 4904 2788 cmd.exe 101 PID 2788 wrote to memory of 4904 2788 cmd.exe 101 PID 2788 wrote to memory of 4248 2788 cmd.exe 102 PID 2788 wrote to memory of 4248 2788 cmd.exe 102 PID 2788 wrote to memory of 3108 2788 cmd.exe 103 PID 2788 wrote to memory of 3108 2788 cmd.exe 103 PID 2788 wrote to memory of 4868 2788 cmd.exe 104 PID 2788 wrote to memory of 4868 2788 cmd.exe 104 PID 2788 wrote to memory of 3548 2788 cmd.exe 105 PID 2788 wrote to memory of 3548 2788 cmd.exe 105 PID 2788 wrote to memory of 4940 2788 cmd.exe 106 PID 2788 wrote to memory of 4940 2788 cmd.exe 106 PID 2788 wrote to memory of 4392 2788 cmd.exe 107 PID 2788 wrote to memory of 4392 2788 cmd.exe 107 PID 2788 wrote to memory of 4560 2788 cmd.exe 108 PID 2788 wrote to memory of 4560 2788 cmd.exe 108 PID 2788 wrote to memory of 2076 2788 cmd.exe 109 PID 2788 wrote to memory of 2076 2788 cmd.exe 109 PID 2788 wrote to memory of 1032 2788 cmd.exe 110 PID 2788 wrote to memory of 1032 2788 cmd.exe 110 PID 2788 wrote to memory of 3156 2788 cmd.exe 111 PID 2788 wrote to memory of 3156 2788 cmd.exe 111 PID 2788 wrote to memory of 2204 2788 cmd.exe 112 PID 2788 wrote to memory of 2204 2788 cmd.exe 112 PID 2788 wrote to memory of 2792 2788 cmd.exe 113 PID 2788 wrote to memory of 2792 2788 cmd.exe 113 PID 2788 wrote to memory of 2380 2788 cmd.exe 114 PID 2788 wrote to memory of 2380 2788 cmd.exe 114 PID 2788 wrote to memory of 1472 2788 cmd.exe 115 PID 2788 wrote to memory of 1472 2788 cmd.exe 115 PID 2788 wrote to memory of 1396 2788 cmd.exe 116 PID 2788 wrote to memory of 1396 2788 cmd.exe 116 PID 2788 wrote to memory of 916 2788 cmd.exe 117 PID 2788 wrote to memory of 916 2788 cmd.exe 117 PID 2788 wrote to memory of 1972 2788 cmd.exe 118 PID 2788 wrote to memory of 1972 2788 cmd.exe 118 PID 2788 wrote to memory of 4944 2788 cmd.exe 120 PID 2788 wrote to memory of 4944 2788 cmd.exe 120 PID 2788 wrote to memory of 3632 2788 cmd.exe 121 PID 2788 wrote to memory of 3632 2788 cmd.exe 121 PID 2788 wrote to memory of 5112 2788 cmd.exe 122 PID 2788 wrote to memory of 5112 2788 cmd.exe 122 PID 2788 wrote to memory of 2652 2788 cmd.exe 123 PID 2788 wrote to memory of 2652 2788 cmd.exe 123 PID 2788 wrote to memory of 3064 2788 cmd.exe 125 PID 2788 wrote to memory of 3064 2788 cmd.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\FireflyAI.exe"C:\Users\Admin\AppData\Local\Temp\FireflyAI.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\FireflyAI.exe"C:\Users\Admin\AppData\Local\Temp\FireflyAI.exe" -sfxwaitall:1 "replace.cmd"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Adobe Temp\replace.cmd" "3⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY HKLM\SOFTWARE\Adobe\Photoshop\170.0 /s | FINDSTR /irc:ApplicationPath4⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\reg.exeREG QUERY HKLM\SOFTWARE\Adobe\Photoshop\170.0 /s5⤵
- Modifies registry key
PID:488
-
-
C:\Windows\system32\findstr.exeFINDSTR /irc:ApplicationPath5⤵PID:384
-
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Required "Required"4⤵PID:2432
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\cs_CZ "Locales\cs_CZ"4⤵PID:1180
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\da_DK "Locales\da_DK"4⤵PID:5104
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\de_DE "Locales\de_DE"4⤵PID:4360
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\en_AE "Locales\en_AE"4⤵PID:4904
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\en_GB "Locales\en_GB"4⤵PID:4248
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\en_IL "Locales\en_IL"4⤵PID:3108
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\en_US "Locales\en_US"4⤵PID:4868
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\es_ES "Locales\es_ES"4⤵PID:3548
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\es_MX "Locales\es_MX"4⤵PID:4940
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\fi_FI "Locales\fi_FI"4⤵PID:4392
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\fr_CA "Locales\fr_CA"4⤵PID:4560
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\fr_FR "Locales\fr_FR"4⤵PID:2076
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\fr_MA "Locales\fr_MA"4⤵PID:1032
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\hu_HU "Locales\hu_HU"4⤵PID:3156
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\it_IT "Locales\it_IT"4⤵PID:2204
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\ja_JP "Locales\ja_JP"4⤵PID:2792
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\ko_KR "Locales\ko_KR"4⤵PID:2380
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\nb_NO "Locales\nb_NO"4⤵PID:1472
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\nl_NL "Locales\nl_NL"4⤵PID:1396
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\pl_PL "Locales\pl_PL"4⤵PID:916
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\pt_BR "Locales\pt_BR"4⤵PID:1972
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\ru_RU "Locales\ru_RU"4⤵PID:4944
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\sv_SE "Locales\sv_SE"4⤵PID:3632
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\tr_TR "Locales\tr_TR"4⤵PID:5112
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\uk_UA "Locales\uk_UA"4⤵PID:2652
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\zh_CN "Locales\zh_CN"4⤵PID:3064
-
-
C:\Windows\system32\xcopy.exeXCOPY /eihry Locales\zh_TW "Locales\zh_TW"4⤵PID:1364
-
-
C:\Users\Admin\AppData\Local\Temp\Adobe Temp\sqlite3.exesqlite3.exe "C:\Program Files (x86)\Common Files\Adobe\caps\hdpim.db"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2956
-
-
C:\Windows\system32\netsh.exeNETSH advfirewall firewall delete rule name="Adobe Unlicensed Pop-up" dir=out4⤵
- Modifies Windows Firewall
PID:2276
-
-
C:\Windows\system32\find.exeFIND /c /i "ic.adobe.io" C:\Windows\system32\drivers\etc\hosts4⤵PID:1884
-
-
C:\Windows\system32\find.exeFIND /c /i "1hzopx6nz7.adobe.io" C:\Windows\system32\drivers\etc\hosts4⤵PID:4900
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3636
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Adobe Temp\Locales\en_AE\Support Files\Shortcuts\Win\Default Keyboard Shortcuts.kys
Filesize19KB
MD5e1e71e61d5388774c468d5bf0bafb7c1
SHA1126c4794b14d74c4566f4f1d88e019d5a024eec6
SHA25660a04127dd07fd8994c57823e0c34a7e93baab4428fb6fee85b8e6a91773c7b5
SHA51263a1350e7c09683e03c9126b4d35ffb399040d8318d45a273df72e50b474741fdd075f6dd5762834ca79ba51e577107352a6c74c12ef487b008412a121d699ed
-
C:\Users\Admin\AppData\Local\Temp\Adobe Temp\Locales\en_GB\Support Files\Shortcuts\Win\OS Shortcuts.txt
Filesize96B
MD5303d07950ebdb1129ed20b56517eec03
SHA1af8ae6e4068d13bd59aa282cdd7a10b4a1f46b92
SHA256999dd9c1b23bba7418102e894e7773176fb6b95d783ad1530924bf63249284da
SHA5121e695f05a23e3194aa4a57295b6914c46ff785a08e1dc4b1b280470f8d55b4c3446eb75b6850fad9ee52d7e2843e8710e68dcccf10c03a84d2a15727a0be9242
-
C:\Users\Admin\AppData\Local\Temp\Adobe Temp\Locales\en_IL\Support Files\tw10428_Photoshop_en_IL.dat
Filesize4.3MB
MD5844e1f4e0f0c51c0fdb49dec014e5e9d
SHA1f012c0918a5c71f3111d62c927d9bb8b519859cb
SHA2565448f910cebe6c5ff8463ea929035f262332dcccae4277c02346e7f77010ae3f
SHA51234a0160eb1edf29db6ee4ebb4af4f944900c9b4459f68c1ad65102f2e325a4ade622808b06cab3d881c65bc05854e852ee11f8d36f6d1f13d82607c5534fe2d7
-
C:\Users\Admin\AppData\Local\Temp\Adobe Temp\Locales\es_ES\Support Files\Shortcuts\Win\OS Shortcuts.txt
Filesize79B
MD577f7f250b5f11ccbcfe7be885de67e9f
SHA1caa24c5a1acf4dad73415dc5429ac4198e7db63e
SHA25631fd8d2f4c5170bd2d0cbf106d1b3ebd15da6a3c6fe4ae85cf4b6d0de8bd0c30
SHA51200afc6bfdadfd911d0c0fc0082895db615e36ea715a560066b0f41a97a31281cc836658f5c199deff3fde5ec1e2b3c90039b3389b7f40aadd0a0e8bdc7e910fd
-
C:\Users\Admin\AppData\Local\Temp\Adobe Temp\Locales\es_ES\Support Files\tw10428_Photoshop_es_ES.dat
Filesize4.7MB
MD5be9771f695b9d3d914dad522c88b29e6
SHA13190fd5cbb472256978057189381b5a787397711
SHA256d4cd5570b98281b776dd9019fefedfd9fc5348b101103fb432c2d38f09394688
SHA512ddbb3c298424352b07021e4f4301002ea67b6d95827cc2ae040513876da9256b41741e67205d88c9cb291fc1b137dc5954eb4014118dcfef1f7fd278377dbe53
-
C:\Users\Admin\AppData\Local\Temp\Adobe Temp\Locales\fr_MA\Support Files\Shortcuts\Win\OS Shortcuts.txt
Filesize62B
MD58390d32666562a7f99f17b6893e6df80
SHA1a8402c23d66f348314dcbb722a1d8435fcd3e745
SHA2568f43479b5bb5047ba774c7c4f5dcf86967655642bb401ea44d78a75b1935ad0b
SHA512729f6c2f79fea8dcb3d0b0912d39ccdef7d1417b56c2912ed7ff93c3537fcd6bf9451c3c5783c72b1572924fe99a65e230d7d5ca08ad074f542fdfc1179a7f47
-
C:\Users\Admin\AppData\Local\Temp\Adobe Temp\Locales\fr_MA\Support Files\tw10428_Photoshop_fr_MA.dat
Filesize4.8MB
MD532d58ef11ea5ea1d3c412feb53f8f7df
SHA1f919f2e5dee6bc95dac93b401da42f1ce74e3d73
SHA256c61f0b39cc3565fc577e5abedc71461be4d5bb0bb9d471f735854dfd7843c963
SHA512617f91c4401afbe1971e2192fe215aa206002524f24313c16b7562b4d917ae749016148294b4186b6e5d157243d8c0b7a6e050eb60cd8c7328899efd1a785ba0
-
C:\Users\Admin\AppData\Local\Temp\Adobe Temp\Locales\nb_NO\Support Files\Shortcuts\Win\OS Shortcuts.txt
Filesize79B
MD56e77a75580a4451bb6f15b31e555f75c
SHA14822d8c407fcb0ebf3311a79029fa83455e2ee2e
SHA256e9dbca0116cef1d354dab6e54b9b7414d1df6bf6a79bc9329137391a227bd7bf
SHA5122aa08ba3332751cd61b1e0fbb2c6f33b39ef740163457fdf59998a92561d378b3d4ccf11ee7a0b36b660a64e27dfb57f372f898398561acc787830c4fd65d849
-
Filesize
834KB
MD500a191229680f944baba5fe2c5c86b82
SHA19278b6cb1d94fcbb34731769de5389fb7315d8d6
SHA256862deaf1e9e3918eb54602acc0baa5914626960fb3871de3e0db6177d8d2cf65
SHA51240bdf64b8fbabf6ac7c6d090bb95337af3f459933e59700e3a4f2d9f787247267ec4ded38074680b9b9dbe82d6a0d1af116a2f60f97fb31dd09ae92aea75150d
-
Filesize
3.0MB
MD56a4fbd903bad66f65ea3d5bc38377e4c
SHA18e18afe4a0aa5e0e216a893512f0610b3df9542a
SHA2567b3c9d991c24b55820a871103d84044dd5c420e2f68bdd5430c52a80438f0eb5
SHA51263f466f6d92a08c49d1a08ede5f3c02f9b571f54e1c720e0300b03d432ae7da8b869070d3c2e9618ce8e0ee0eb82ee0585b92798570a099abd75404f22512191
-
Filesize
165.5MB
MD5a883d52f064d3305bb802c7cc14e6067
SHA116d392944f784faa796ff2666111f7616b22a769
SHA256f4e734cd3d7cbd4a148448cee22e46584cef80e5d08e5f6ac832e12c326deb34
SHA5125044b4712fafe19a5827ab5306088c0fffb009c111e147ad9b81001bca69bcbca0366c47dfad59988276c70010dba0997b46136f56c40a5d78610c1126ffcd2f
-
Filesize
14KB
MD59542879bc87ce745aced4028f76eea0c
SHA15238cdd7246065356bfdba57c75f43528c52eb90
SHA256195be10d7034196eef1fc861a2de8c76200a1af9928354ab0ddaae7391f1fc53
SHA5120b91336a69dcee713ecc9681a571e3b6dd34ef65488fe523eb08acf450cb47e30b5791b87ecb9358bd8d224208030a94c5c9f2764186df989bf7e36fc115f16a
-
Filesize
4KB
MD50e867a0312dbe36cb952272dd9d88ba1
SHA1c4d68c2e374d34e451f0bf906a2d2bd924a94042
SHA256202f4dc1744aa3548b537630c6c961cf583060be8c0e7351c755afc3842ece02
SHA5121091e33ca4d3c7c2b3546fee3515b57b16a453ec13afbc8a4705c1c53ae0a3beaeb678bb5fb4460b337fb94714389b15bf1d1691a22be46e802a5e6171f1b7fa
-
Filesize
1.1MB
MD5ec8c73f8c88b66cbbbc9128579aa822c
SHA1c0617b992fac1e0153f46e49bd4497f8df98503b
SHA25605b5783917c39417b5db3b3bcdd66b2effdf0bd764350ebaefc032804b825597
SHA5123fdadbc5e9f38172c12cc5469513b55e734fdf12a7a3a2269c9e1796b53c7fe8ba9e153ed5d0b85c3ebff8ce3b923fd8144c777bd864fbd61ff12fce0e5ac788
-
Filesize
1.1MB
MD5ec8c73f8c88b66cbbbc9128579aa822c
SHA1c0617b992fac1e0153f46e49bd4497f8df98503b
SHA25605b5783917c39417b5db3b3bcdd66b2effdf0bd764350ebaefc032804b825597
SHA5123fdadbc5e9f38172c12cc5469513b55e734fdf12a7a3a2269c9e1796b53c7fe8ba9e153ed5d0b85c3ebff8ce3b923fd8144c777bd864fbd61ff12fce0e5ac788
-
Filesize
1KB
MD5624316d404fc53f72807c140d8b20d44
SHA10c9b9133d639cd5c661023ec884a028e596d1ece
SHA2566198fb1d0d1cce79ad3c4d74f252278b5318a0c90a5a4d3f3b79932809d1b783
SHA51259189e0744f2e12489e44db55b061cfe14ac1bd01c05ad6e49fac3c9ee3faa70cf43f89f9c718f0e19ba9d9ff7e97ff224a6d28ac842482871be9863793e7af7