Analysis
-
max time kernel
377s -
max time network
373s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 02:52
Behavioral task
behavioral1
Sample
testapp.exe
Resource
win10v2004-20240412-en
General
-
Target
testapp.exe
-
Size
254.2MB
-
MD5
d2ebb76d51392852e33042af46dc771f
-
SHA1
f218900d699f331124b369b631f57b321b634377
-
SHA256
7f4c28321857ca428c04be0aab86acb38c0c47d6f06b3c28eb1748f9eae8dc33
-
SHA512
4b49e9db79598c689c8cc9e59b2e69c8664032800c7cb2f1d03038d75791b7befed7af474caa1136bc3d43706ef8fccdcf06fcc75a45bb2a7028a20cb9b2e25a
-
SSDEEP
6291456:fICM9zrkNS0Q1n7cQxbnfd5mERlu07QCFUWHCii3f2NcPrbrQzwwJ1qn:3MJraQ17/bniEqMQCFg73bPr/PwJ1qn
Malware Config
Signatures
-
Renames multiple (61) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Loads dropped DLL 64 IoCs
Processes:
testapp.exetestapp.exepid process 3436 testapp.exe 3436 testapp.exe 3436 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 64 IoCs
Processes:
testapp.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" testapp.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\2\0\0 = 50003100000000009a5817191000666f6e7473003c0009000400efbe9a5817199a5817192e000000e13f02000000070000000000000000000000000000006454d90066006f006e0074007300000014000000 testapp.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000010000001800000030f125b7ef471a10a5f102608c9eebac0a000000a0000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" testapp.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" testapp.exe Set value (data) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202020202020202020202020202 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" testapp.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\NodeSlot = "2" testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" testapp.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" testapp.exe Set value (data) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 testapp.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU testapp.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" testapp.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} testapp.exe Set value (data) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\2\0 = 5c003100000000009a58191910005f4d454933347e310000440009000400efbe9a5814199a5819192e000000333402000000070000000000000000000000000000008206ea005f004d004500490033003400330036003200000018000000 testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" testapp.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" testapp.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\NodeSlot = "3" testapp.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" testapp.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 testapp.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" explorer.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 testapp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ testapp.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" testapp.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\SniffedFolderType = "Generic" testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" testapp.exe Set value (data) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e003100000000009a581b19100054656d7000003a0009000400efbe8c58dc5b9a581b192e00000098e10100000001000000000000000000000000000000450d0301540065006d007000000014000000 testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" testapp.exe Set value (data) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\1\0 = 50003100000000009a581b19100074656d7030003c0009000400efbe9a581b199a581b192e00000078470200000007000000000000000000000000000000450d0301740065006d0070003000000014000000 testapp.exe Set value (data) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\1\0\MRUListEx = ffffffff testapp.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" testapp.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell testapp.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "18874369" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" testapp.exe Set value (data) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\1 = 5a003100000000009a581b19100047656e65726174650000420009000400efbe9a581b199a5825192e00000077470200000007000000000000000000000000000000450d0301470065006e0065007200610074006500000018000000 testapp.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\1 testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\0\0\NodeSlot = "18" explorer.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" testapp.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\1\0\NodeSlot = "5" testapp.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
explorer.exepid process 5412 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msedge.exepid process 3428 msedge.exe 3428 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
testapp.exepid process 2120 testapp.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
control.exeexplorer.exedescription pid process Token: SeShutdownPrivilege 116 control.exe Token: SeCreatePagefilePrivilege 116 control.exe Token: SeShutdownPrivilege 5412 explorer.exe Token: SeCreatePagefilePrivilege 5412 explorer.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
testapp.exeexplorer.exepid process 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 5412 explorer.exe -
Suspicious use of SetWindowsHookEx 30 IoCs
Processes:
testapp.exepid process 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe 2120 testapp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
testapp.exetestapp.exemsedge.exedescription pid process target process PID 3436 wrote to memory of 2120 3436 testapp.exe testapp.exe PID 3436 wrote to memory of 2120 3436 testapp.exe testapp.exe PID 2120 wrote to memory of 4492 2120 testapp.exe cmd.exe PID 2120 wrote to memory of 4492 2120 testapp.exe cmd.exe PID 2296 wrote to memory of 3576 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3576 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3948 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3428 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3428 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe PID 2296 wrote to memory of 3436 2296 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\testapp.exe"C:\Users\Admin\AppData\Local\Temp\testapp.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\testapp.exe"C:\Users\Admin\AppData\Local\Temp\testapp.exe"2⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:4492
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault2f233790hf9abh4dfch8a73hb22f3f6260b41⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff955de46f8,0x7ff955de4708,0x7ff955de47182⤵PID:3576
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,10839975960053215609,4849512527596355990,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1948 /prefetch:22⤵PID:3948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,10839975960053215609,4849512527596355990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,10839975960053215609,4849512527596355990,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4424
-
C:\Windows\system32\control.exe"C:\Windows\system32\control.exe" SYSTEM1⤵
- Suspicious use of AdjustPrivilegeToken
PID:116
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:2668
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5412
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:4760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc629a750e345390344524fe0ea7dcd7
SHA15f9f00a358caaef0321707c4f6f38d52bd7e0399
SHA25638b634f3fedcf2a9dc3280aa76bd1ea93e192200b8a48904664fac5c9944636a
SHA5122a941fe90b748d0326e011258fa9b494dc2f47ac047767455ed16a41d523f04370f818316503a5bad0ff5c5699e92a0aaf3952748b09287c5328354bfa6cc902
-
Filesize
5KB
MD57670b583037f45098a10f2d387169270
SHA198ac3ce6035cb6acf09d14025a7bc516a2403a01
SHA256754c38d4eec85f828a3ad229607900c595cf68c5656b72bb7fd74884aca86f8b
SHA5127c8e008438e37f2a66b8e1dd11de4d87a895cfdf6c9c43f38b5e832cebb410ccfb2ea1101f5fdb0c298a515f32316f25cfd571a5af69c75f84302e1c13f6aa5f
-
Filesize
8KB
MD5e0e39d6b4aaa7a217acddbfda87e9449
SHA176d98e436345a998b8cf8e00d1367c3435bcc1d9
SHA25649ceb3dad6ad3b18695b07457419b7fe395745d2f9a898323b66a816b25c4994
SHA512e846a085510761b86bfae83587e66833ade87e36434a0a4bc89ee9782e5013cecb24a1467ef585a374f3e78f24d21159590028adb90fb68cd87026889c346df5
-
Filesize
32KB
MD5c93b6d76946587f0a493f0434c52fdd5
SHA141d408f4e45992bbb3f6d81949790e554cd7cc05
SHA25608eaff6200ea34ba6a64a33ee4d65be8e22a084bc38dd8bc7604113204de7688
SHA512bf90266d94f0c3e0b08031d771449e588bba74e014f3bd5ea5ec09a0ba9524a5fe2037fcb2a30a95c99ebcdfa77e4fc747cffa5b9818ee7827eb164108ceb1c0
-
Filesize
34KB
MD5a8c23489338f34d0d5526fbc1c76d201
SHA11186438138751f2ffb8a34d262d7a4564229385a
SHA25644fb82ed409cd67918d87b3e68c0d89775137daa97da80191b9a4c1273bb52b0
SHA512cf221feb94d25518d0109f6018c3046c3a1f472b1681d6dd68700173581611f100649d1b1c090fac6cc300d5efab749275e2afda92cabf9d945136da72458ede
-
Filesize
8KB
MD51f5453cd1d2451d2db3f71724eb3734d
SHA19bd00bfac572bbef3c56eb41c51d34d480541f18
SHA2568caa6330d3d5dab58aaed8b9fc22198104266522096d34a7216062e21c524a0f
SHA512e14e0a705c5af0e0ebd433e7151aa568659e63a42ad9e3ef16cd70e354c38a2a31c18aaa42f2daf5771eb4c515e5dd9f43fcea56344b6a12686d0f91ebc94c9f
-
Filesize
9KB
MD57e2c0917c61ccfd366c4e2fa56921149
SHA14baed6e47d5a26c77c9aed5f5bff26e05dbb3609
SHA2564cd56bc463d5f61cfe1e07a794a50fb7ee1f0dacf9f84eb9035b44ce15ac22d0
SHA512ef2c98cc944056e1efb6564bece396f04154ba48a68ff69dda7261878f5dbca14d101231a46357aa6ca904566b79b1cc16a4bbfba92b45b73f8fe0259aee77cc
-
Filesize
494KB
MD544836eefabdf7214744ffbe3a73bf691
SHA1cb20ddd61f9ece86d7818506deb95dc9741356a9
SHA256602eb3c5ed98fe663ce1abd3301134b3796ba176eb85825681a36552c9ed82f7
SHA512745a1813a007743f537f83116965746799b6189405bb97f99e26d9315b5d95bab166ada1ad355fcf1516793f02422b6644453c064a9a28dc31b5ae61c2105888
-
Filesize
494KB
MD58f5aeedf161790345f0751a0d6efa56d
SHA10ce338463486d1b34d5004651ab667ed269209c2
SHA256023e20fa02fc37e398626df109e46b6156e2e763dea3fcf07006f05511f9a7e8
SHA5125eb8503f928973f2cc9b5f605da47ba50ed32caab5a73830d862016b679226d808eefba9e44a2b4d5851d376be5f0247a05c49020d59951d5f3ff61b54bdd042
-
Filesize
510KB
MD59dda529c3bbd770c56eff0bc9d812d2f
SHA17f05a2ba745b982d8e2b2eed38816472d1105f08
SHA2567c2bf22651a38466a10ec4e0c3a372ff20f7d9d61d6c06f8507b61f02c5d7d56
SHA5121b6b5260556fe852c0e8a09c0bde0f03cc26390eef41966be469a24f027e821e8977c8b1a92f05d41bee41e80b856707e096fa93823698c8ec4ab2bb8d6ff5cf
-
Filesize
510KB
MD5fbc69a135f396ecce5e95236283e77fd
SHA1a8c7828103fa15d612113f130164d0b481ee451b
SHA2566cea5fd6ff80fdd2a8b13787b9090e0f5dae5f9dc25843487cdc5e692326a214
SHA51219cb4b521ce20ce5ea594e5cbe7186f7b7efceb9ea146289c3333f3350a9eff032f8da2f7b76e41c8d2aa0768b229f27306939eaf4081a16ac62fa4defc081a2
-
Filesize
472KB
MD59eea33c4b05405314a5e9736725a2fe1
SHA18cdc3996889e599300251fbdc5d5cb632d3d204a
SHA256b65b8d412baebba9a1d324f54a35ccb21a8fd912a2199d2b887dada2a2f18033
SHA512d63919c25c1d57a7a510ca5537f67d27571b1b4963945a45f56ad4af82c1d4b38d3f8a16577086509f981d878e90a802869318e762436ad4f8dc368ac049e65e
-
Filesize
474KB
MD5c5eca9be3a5be9f3b93d176a9a77c347
SHA14c9406339464adb10a9d3021ea247aeb1f177d2b
SHA2569b01fca47e4ce80288fd0a43875300e26a97be5bdaf8d30ad6555ca55a52197b
SHA5124b9999586e316cde1e53e42771d7893a7e908bdb896e1fe92fa94c22ce26e7bde9e9da3572f7327d8595289063baf5c9964187064548a5c9f598b24d13180245
-
Filesize
66KB
MD5c36420fd4346090e769f085c069056b0
SHA199a7fc4b68dc13fbdccd699870967c52ff98fa40
SHA25609734971d36d4de42ab3801d1692592f9b865dd123accde0cb7e13f77f42b138
SHA512159ad145a55985c67de61dcca179cb511c00ab9991d7fbdb49cf4cabbd1f4d880885b5c345da5d75777c22d49ee6552e02e41b503fec295c11a4ec799e579ca7
-
Filesize
1.4MB
MD5e79bac8ea4d3d27215f7ca29163cfc50
SHA16005aff2236d563c872c89f4553060a5b3de3209
SHA25699e99d5bc83f45b442f1b81c86442abc04c8039ba61b1cab63e7d89f02a6dbb9
SHA51218ca2e73f03ec83ee6ae2fba8edefbcbadb5d3f88019e0e04254f68abc92237deb1bb191e50a7e74d379818502e9007dbacb00465949bd13483d1d538943d334
-
Filesize
2.4MB
MD536124e3323cdd7b873effc7ff485f7e5
SHA1017dbcf7272f4846833c36026dc578a8f1267fec
SHA2566d4c8b8f90b05d12de62277e9ae232932a010cfbcb431753906322cba8b32a32
SHA51223495c5c16dee6276c6c75f62be64884bbb7785bc404fe00e816d2301e5b4d6dc303dc0f34a0628b892e37cc17cd1f19e3b6aa6b9d6c1d85498186efdc27055b
-
Filesize
235KB
MD542bf58cdc4f5fb81dbd477d6eb1f509c
SHA16848142201bf66e1650c3c1d48f7e22f74d5fcac
SHA256fc5c72f47e696fdf529831dd0b2f512fcaf4d59c84c35edcd7f5a4e3debbd7e7
SHA51255771550abb3d7b782b7e2f5829210128cbd0b89a3b2bad676c3dee8b0f005b3636ed4ebe7f2d04bce84fede4cb8eb7e5cb4f7bc442b7fd57905e6a58f4ed372
-
Filesize
331KB
MD5816f76d893368893fd3200889c13cac1
SHA1d0c62d5b16b459e9ecb0de9de58fc301eed09297
SHA256550afa228dd23353a06f95ccfa0b655d3a349a716c9a703b40ee1f4d0d8c5a7c
SHA51213f8b1f6772d188a6c1caca4fee297daf4b5da7cb649ef62607808f3b2c3a1b5ea6384eecfb24beb0c4837906083dbb1c3e786b85e9ac65cce8331f09aaace7f
-
Filesize
315KB
MD57525a763b3b2cd9152674e7f2924ee80
SHA1728186a767a27e0b8f5f2332e5caf5e0503ec575
SHA25667468886fd0e67bd399542ed634f7015bbf89539340498b6c67026722f733458
SHA5121694ff568f2d2ca8ecf6a1962d05721a23c2c2cd56b593d2bdd9791c6208f0a2f9118543dbeb58d0ad85e8ddcedaa7df59088f05a4cc7d2ad6766f6496d9821d
-
Filesize
352KB
MD58608abc047126077d07a423056f44a4b
SHA1da20853100e473a0d4f166a1f7d57d95eeb6d4a3
SHA256725451e2f7cdcffe2bbcecb4c23c0eacb5cea7cbf1ab162a8ca717cdf4285a98
SHA5124fe3866588f9e7ee49006b13d83a4529be7d90b43dcbac9ae70ca7b9b674fe83c429da966b0b99a9513fe7ab1344107b9f0dde0f1bcacd06cf01c0f7d1bc7acc
-
Filesize
59KB
MD57db797a4f89e99febc43a94f98058f5f
SHA1495741e4885f815b7c70661139441517db62f0e1
SHA25652523de55408448239d46ad2f5125d95f1af0dfc7be0e166c0ae8aea3e52d014
SHA512ccbb456a13c4844410c70f6fe4ed145da1f0755431c3f73266f23eb48ef336082bad433da98233f905262db378fcd5b60abf7419560f77f0bdaa70586bfd88e9
-
Filesize
1.7MB
MD58a70a768df042c8c79a0b4ffa65a4020
SHA154065928ab3f0c01093693ed950db051e7f0c2df
SHA256fadb3f74d2281be3b4128f8721d94ea7f83919f236b46621e550b38bd03220bf
SHA512674133a90132e2054104a896fb4d7c1b5d454f27875d4e9cdd3debf35ba6714a8874863dfdf90afadd2ebe9ec994f90b44d9d89d53f68c02a8cbd2b44cc284f1
-
Filesize
346KB
MD5cd2a6c8af6b2e1611e69163abdc0fffb
SHA11b45d59a0459802c4653d69904802f7f30f6b403
SHA256887f80eebf7d8dab857ba7e8e44da696c48e27d5cbead969cb439ee7b161c8c7
SHA512a78e0e3d32e43bda83eee5f978b5d07ed1829d7fe76c185d1fff0202f690e56570c631de486a783b736cfe8e1982ac7eed1f5bd663c40e40abe702068c92d87b
-
Filesize
186KB
MD52ba31d3eab7088da66667848065358f2
SHA178149298f7d427fb978458a3d13bac2cc35e7876
SHA256463bcd3cf2cf54e6fe64df8f065d5a258912e04f5c081c851638a6a3eb1935a6
SHA512f59a5271615a98ceb70c5c6a77631768925e6118ddbf31da0397e6b5bd74a9e662346544508093edc4c6a3b882d4abc9423613afae03bb1063e66773e2051513
-
Filesize
405KB
MD5d8ff930fa7f6be86b8e3088bfa8e94b8
SHA1b6234931d45f3a62ac3f4cb51112002b927446af
SHA2561366991bb5bacefb647f665a1a58f993dfcbb0fe485776c8b640f73c781dbe94
SHA5122ab0d2e2c93979e958521a33e33ea4a512e76c1d9b2b3ceb25f1baa69b77ccfacd8386e6a3fada65617d46ef6c016111a7866f89f163f4de5455ca0fec7b439b
-
Filesize
600KB
MD594349debaed8f90b93f3471c277ac4c5
SHA1afb36fba3dee25493ac3bfc7c8991ad2fb3dff23
SHA256239dabf53cc2550407634d130ce6d36e658be245f8c92f7cb174d4c09238310f
SHA512c7b41fc3136765c8a28ba358cacdfc7a69aea4ce8d34cafcd73b26575bbe27cb0875036e002e0e22cd52019da15cb7000a1e2e48d4c2a1286918cc65b9dd0a56
-
Filesize
777KB
MD5228344675d752b65af2d670c269fe0f6
SHA15ae6ddaf982c6ea9184b109c4655128204eefd29
SHA256a8a38a8bcb59724c325fba9665605266d4b7a00bd262cc815760a8d530f1232e
SHA5120e8d4630dab023a38de54e2c10f8ab3189c8fa4f4ae8e0230e6c8acfd002fb0b5b7d64eeb42f25117843578d6494c115f6ef03154c1ccac4f6384cdb64acb4b7
-
Filesize
78KB
MD53c4b00cd768c49da1a2d37b19c7ab984
SHA1cfd5f7ab61a7bb4964e13a3114df0d9d850d7e55
SHA2564ebce14beb51e0acf94b39f67d9732a2e1cfe3ba2fdaa6234ca78cdac550ff1e
SHA512264074ff5d2426055695818b8de08ecb0ee244970a551a92480df2d7d49bb2535c40554e7599bade0d9c537f56be800e77b87c462db1707975cf7f753ad0c926
-
Filesize
1.1MB
MD5bbd6d5ca2b425c643205f16ae747a5ca
SHA1ed8986a80f7cce35b674fb293e27276edda73b2d
SHA256e940f6d3b39f7faff8465bc4e778f3a88b63541e67a12d2a2794671c32bd5adb
SHA512d4f876bf97c5b2190e72b00e4b3792fd11fd8f7555ce36dfb9cb3693a53fa8b07f709835d65c4c482126d326edd493aa97a9986973664920b00b77b3c9e6ad1c
-
Filesize
43KB
MD5a34140aff18a813aa1b466f3df239052
SHA1a9cd297c61f2c68a858e9c9669bfb46378a45797
SHA256d7fd0095b8e97547ac37d8d0dc931db983dd94694f6c6292d09a1ce68987950a
SHA512d0ea3e84d0f04936f6ca4c5cfeae32735fbb676c1f67c5595417a33bd797f28a695eb8d8d4386e425db164e0d2f9246e3da08f1adb41d96616061e175a3f2787
-
Filesize
273KB
MD5d7bba9d83b0a391cdf0d388761f993ab
SHA1019b6afdf8156ea393978117c1a73b180c111aa2
SHA2566febf0b09f54300116a4a3ebcc9200cf5ef5ba601758b989f4bb55a94d66a205
SHA512249235e4e6737d63c7b07c3ac9834d32c0f8ca2237dddc30ff768d9c1d20ff352d514ff4b14b57627bd7d46c4633233e7a0bec63be18def9335fda55285c483e
-
Filesize
44KB
MD585fb7c547bf93533c9c142df94ae74a4
SHA1bdf44425a26cf578eb67c58ae47e14300b649940
SHA256668648680be744a84b23abe8ee2f993d3f1ed556ef1173d3d372ab91ffef0a9f
SHA512443a064ec83d6cd6d0921afc9924896f89ae94dbf7a21659a3a384db59e11143f78e6ba241d69c626643541e05161bad9268d50e64f468bce52042594cd3fe9b
-
Filesize
327KB
MD52d84780003b2ef96209a39d59ad2c58a
SHA19533c14f9354e70c611497e6e565733f0bb9e49f
SHA2564bdbad9be502cd4d21243461aac6f616c5b28474e4f76111ef9457cfebe07df2
SHA512934efbcc9361648671b55512ac329c50537f655821ef145675f3c96b2d4d527b0c668c51316a1b9844f47a44fc623376231111422591751fea9602ff77825246
-
Filesize
507KB
MD555becf3262cc40c99c134fc69032143f
SHA1b174929717b2b5301b38ea5757b520354e0cab8b
SHA2561e93047da6dce0f44fc813ed208814e998f45f5c86ff8df400062524bdfeb6d8
SHA5128b5d4a812fb801f040fa055d0c1ac3523dc062516d2930f90ee91e585416cbc8ea4cfb278db41894f8432b75176634679515bbf969409d472832d4b45e841704
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
1.8MB
MD5ac6cd2fb2cd91780db186b8d6e447b7c
SHA1b387b9b6ca5f0a2b70028ab2147789c4fe24ef7a
SHA256a91781fe13548b89817462b00058a75fb0b607ec8ce99d265719ced573ade7b6
SHA51245b24ca07a44d8d90e5efeded2697a37f000b39d305fe63a67292fdd237de3f8efd5e85b139b5702faa695f9f27f12f24ac497e005e2f3c24c141d7cd85305b6
-
Filesize
1.5MB
MD5499fa3dea045af56ee5356c0ce7d6ce2
SHA10444b7d4ecd25491245824c17b84916ee5b39f74
SHA25620139f4c327711baf18289584fa0c8112f7bb3ba55475bded21f3d107672ed94
SHA512d776749effa241ba1415b28d2fcff1d64ed903569a8c4e56dfddd672a53b2f44119734b1959b72a9b3f4060bb2c67b7dea959cc2d4a8e9f781f17009c6840fc1
-
Filesize
82KB
MD5afaa11704fda2ed686389080b6ffcb11
SHA19a9c83546c2e3b3ccf823e944d5fd07d22318a1b
SHA256ab34b804da5b8e814b2178754d095a4e8aead77eefd3668da188769392cdb5f4
SHA512de23bb50f1d416cf4716a5d25fe12f4b66e6226bb39e964d0de0fef1724d35b48c681809589c731d3061a97c62b4dc7b9b7dfe2978f196f2d82ccce286be8a2a
-
Filesize
121KB
MD578df76aa0ff8c17edc60376724d206cd
SHA19818bd514d3d0fc1749b2d5ef9e4d72d781b51dd
SHA256b75560db79ba6fb56c393a4886eedd72e60df1e2f7f870fe2e356d08155f367b
SHA5126189c1bd56db5b7a9806960bc27742d97d2794acebc32e0a5f634fe0ff863e1775dcf90224504d5e2920a1192a3c1511fb84d41d7a2b69c67d3bdfbab2f968fa
-
Filesize
155KB
MD52ae2464bfcc442083424bc05ed9be7d2
SHA1f64b100b59713e51d90d2e016b1fe573b6507b5d
SHA25664ba475a28781dca81180a1b8722a81893704f8d8fac0b022c846fdcf95b15b9
SHA5126c3acd3dcae733452ad68477417693af64a7d79558e8ec9f0581289903c2412e2f29195b90e396bfdcd765337a6dea9632e4b8d936ac39b1351cd593cb12ce27
-
Filesize
1.4MB
MD5cd53405010e5590fcce5ab88975be518
SHA13c8959679e1be7f9d019a3a2f792eba44cc7f951
SHA2569f99078e441211fadb57fa602e73f71b6414e684df37e4b83b1dc6d0a1391c05
SHA51246bd80fd5fd8772b0837cc8898f6e706fa27bf4192d12d063035f1295769bb02697ad04f9d99ef3aa8aa502e28495d51e6872be5780a72eefcf8f18eb3b313c2
-
Filesize
13KB
MD544f12365016145dc45da7854fe1d6c8e
SHA171226a31847f8f5906316113ed9917cd61fddb10
SHA2565af94e656b0a51f0694901e8ee715dfb738ab65b88e8e2b9c52fa80340fa1500
SHA5125c619c76dbf2350a84dc5801188816ac5dc94f8c98be58bcf4211d4ee18557e2e67a1c8cdeb98af6f33c5605ecd1db215a1806efe6ac35f1da72b08b9b14c808
-
Filesize
11KB
MD5f3b4078215c0b24f77a9a86921019d8f
SHA16883fd41bd845520c97b8f6146e8e05bd115bfd0
SHA2560076749b626931ea5aaee25ddd5019fbfd96da78243cc0d5bd24fe246500981f
SHA512abc68283f54f5f821393f0dff2e06075ffbbbc52fddd06f317d21ff548b2ac07a08404ad386b9cfe37cac6d476d86b7faef5fff862e0f1abf91632e082f063f2
-
Filesize
167KB
MD57b693573485a5e1bf3b2f354ebf6b77e
SHA195539bc089aa0d59f51d3b94408e334ede1aa59b
SHA256e4bbe79580ea8e037e2000ecf8757620970f40a3106b86c9335019557c6c828a
SHA512ae71a4d8330363cf181bc7029df3b263d3dffb5006c55c2b3a3ad04e9441bd3a371524f2f9a12b7ba879f8282d3581081bcf0559c428d805b43ed0f83e3c147f
-
Filesize
655KB
MD54ef7186b79c6e92c4b573b83b6af63a3
SHA16a959bfa0c979efff3dc281767aaba5f3e613335
SHA2565b857b72783292e020f0ebfc18ab3ccd68466c4dcb132dea05cb7c9a8cb6860c
SHA512a784c07fe4fcabeeb177d77b63f52f0528eeba1b21b1b2a23ee0e3380afd166a382ac9a4baa616bbf01dd9abdd25d561edf56be9f4e2cbd48cd3122f7cbd045a
-
Filesize
441KB
MD5f35036eaa7846c05068755bbf5384f79
SHA194918ba4790a8e3998e0504f057f88e5c0c7e795
SHA25645501540c7c29f847f60a1288dd1c171d4e029329e672f29dcb904c0f5cdd6e7
SHA51298e620db377b19ff676242c7b96534505a0c8c8b108f4a21473e09615302a2bb6337eeec43739449f4876b404c648cf9ae9cdafd83b788de7dc652f51849df8c
-
Filesize
784KB
MD57979fd5441cf7d88e03d5060d61490aa
SHA197d054570689dbf160e6ca7d53f8cc8d8b67ec17
SHA256b98a020fe2161efb9f8cfe991f8f77c5d497b290422328fe351948d2234838e9
SHA5121c65515d7b15ca03a96f71ff378c36e1ef01b5762831ae22ebc38cd23ee3f5a1d5cfcad7949082d858386465d9cfae934453f587d85fa24007af715bf3007840
-
Filesize
547KB
MD50790fa01a2dca876a85f40254cf93400
SHA155767fc37a42f8ac62f2d0512f0be4344dd719cd
SHA2562f864b9f1bf5839fbc963265a0c9c94a4709124439e5ab5bfcae5f522483a1c4
SHA512b7d175dc097c5b8c58d0a7d52224b4eafcded8f5ed6ff190ac4a251c4838b2798ad3e9a3c5b6402985aabc485ffedf863d4c3048647cfd634e237ce45b3f50d9
-
Filesize
1.3MB
MD507961f0e46103b5d5f29d2f4db2b8f97
SHA13314177a98fad45628cdfef8990dec9c9901f1b3
SHA2569aeec3cee5761dc4698ab4d48fae613d1b12520e0f2df79e6c4d0c741de8c787
SHA5129284fd34e900406e4219fe6eaaf897c8a7c463486a15c96473a6eef806deac3fcc90c3ed1ad899e2314dc8f60980c0db2ee0a24e4c8abcb47b228f60c67b708b
-
Filesize
4.9MB
MD551e8a5281c2092e45d8c97fbdbf39560
SHA1c499c810ed83aaadce3b267807e593ec6b121211
SHA2562a234b5aa20c3faecf725bbb54fb33f3d94543f78fa7045408e905593e49960a
SHA51298b91719b0975cb38d3b3c7b6f820d184ef1b64d38ad8515be0b8b07730e2272376b9e51631fe9efd9b8a1709fea214cf3f77b34eeb9fd282eb09e395120e7cb
-
Filesize
56KB
MD5aaf2a0d1cf7beaae82dc1027e7f0b77e
SHA11e83ba9b6b6c1e83cd8e7ac73534986f2a46d328
SHA2564d2b7c4f8dcdefce3d0b652d09bfed1fc73b6e3952301f0af1795d8b02f33e21
SHA5128f22099a4f2be1b255f8a4be5e17d3a19fa71b7efb4fbb2e7dc4111249e9d40b97c2ee6a1c9bf800f974035dd030158ef5a09f3be446169476fd835991a8ad8b
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
369KB
MD5f753dc1874bc32e02ccd2d770929e3fa
SHA1d83c02f00aa9409e680dd27be8f2d60eeffda945
SHA256728a41cd604d1eced04a8b3051b05d597b48414d52276bfd899da7cc916cde58
SHA5120aed7fb8ffc54b03be20f41214dc083215f048013c6c4d2b541ef8f2a898c94fefe005f03ca8f7da31d51dd9ef2c42baad60cc501a904128e0e23627784bcf0b
-
Filesize
715KB
MD5e85535c863b37ef2b3dffe5e5b05f0b6
SHA1a9f7ebd93f2e6a351f6ae0aa04357d97f97e96b0
SHA2563a83a4afdc00e7f9f97802d0e61a6c88c255e4206f794eb46663b4ffdfe1b033
SHA512fb6b85261eb19841c09c961f2857412a17963e0c7ce97bb7e308a617f504cbd23920ccfc66553d7a29614951d76c053fae9a153553a8e091b9bb82e157cf3b8e
-
Filesize
85KB
MD5a5e97de1b95200902a5a3580b5975058
SHA1a026db3eb60e5f0cb6e7a72053c72314954a506a
SHA256e4f4a1db9c78e8d6e940ce4f3846305868c99c63ca2fe786913495287d969e52
SHA512f34a0ce1671219d9176963db88b3b0290082c9adbd87d39acbd8ea010e898501f9e14f9593f4502d47f6036b8b90e7a613705fa01e1a0d29d4021293f9935fe6
-
Filesize
1.5MB
MD546610d7f6f3138ff8213d345584a4a88
SHA1997ee994386c7663f685bae1b4689479a43ac749
SHA25668325d97145004f675c1feef3178ce3b1f020be7036d23353dabae6f634125ec
SHA512ec9e70654b9c7b79ab517bc34d50f4345594f90acc3c72131da755bdda873ffc96b2911269681b57e8452a5f9487912515f2897707e7980e8037543de6ae9f34
-
Filesize
52KB
MD5b637cef0d7f142eb86d50c67c1eee1b7
SHA1df612b51b5d6fd637f4eee4b495541d3c6a96ae1
SHA2563c0a06ed91ce265267d72f2acd6e3ec37a619a0eeabe864e7a0cd3eb0da8f11b
SHA512ed06015786c9de992a4942d59648fefe86ec49dff36dd5daebe3e10ec39e9fe58b37f08ca91069d27d2860492bce0f03be09646f65b3159472b949b36566bea4
-
Filesize
398KB
MD53ea3b264f788e8c55d7ced933cee6992
SHA1d21fb5831161bca70fa4b720bb015c3bc285c871
SHA25661ac3c5303a8b767f0c6bacbabaf9e483f8c29b90c1c701b91015df6815b9ee3
SHA512ab813904f3d53b8ae4775623458eb82d3f520dfd5d5b9e9ff42a8da59b2f3481bed10f079247cf9be4c3a8218e80add874e73cca39df4cbbd811234d26f9d0a4
-
Filesize
436KB
MD5ba3fc28c2d2cfb03b87017875027cc91
SHA163b4cc7e4cf587855618052cbba603a11364ee07
SHA256f06feeb837b218a379eb3be3c4e08dc2b9a91032d4707827d02185c0a8f231ba
SHA512155faad66e7d2ecfabec16e21427b2a638f516b3b82cb6378c76af790d4a5de68bf033f3470ee79f4251ca0c4031b83647f7df169c9373ea28555341b7de00f7
-
Filesize
999KB
MD5c937b610c491329a93af3962730b62b9
SHA1d788be4dbc9b1b3c38de66f261d48a2ed627542a
SHA256b74bbf10e6e74bb993530730cc9ea66a019bc215ab6519c1a58e6cf77d150c94
SHA5129c2b0785f032116c376ad65b7da087bf74e900e112857a457b53978d5b532c1684950307c0d37efc24f6e125d72e76f18df7e23d3ab2f82c2e3386aee53a7f77
-
Filesize
163KB
MD50e8264f69a276e90520a2040983ea960
SHA18f40f5e777078ecf1ef95dd8cc2523787ee5b4e1
SHA2566bd4c030ea9b5e5a75ad8cede2dd2b6c62bbed12af881fd67904cd8deafae10a
SHA5123a9a9ca8c27f11039cbbee5798564500ff052e868534a587d7a4cd6b5fa91eefecc83c56f79258d156b9f18b92f2f7ec61dafb9b4cdc2d6ac8e6ab1a0b60ce95
-
Filesize
212KB
MD55ad76cbb3f92c32d9e34e19a2961cbde
SHA1bcb1a3c0134d70b6300132da6e3164fde53b3e5c
SHA256b1bb7c1a64ed4fc50b87edb46bc85970a4bde442f5abed4e87388f7c1094dfb9
SHA5124a44b7a5118a352bc364e34338a162805ee246d20285db37c17207e22b61973a8b0c5242013027b0d1509d46331dd86edc0267af5674c0b0f2589660452693ea
-
Filesize
151KB
MD5872a076d020a96e242d9c5aa3982ba44
SHA15f6df71994d4984fbe42d79d9d14ce001f2d9972
SHA25607a4148f1972c843ddb31dbf1d058a7f73cb375f74473c9220f1476b8b973518
SHA5122d72e2e83a16f0ac3c7ae29252ab509859594fc6161ec7a0177ecf5a9ae0e6de62a27c7dddbbd04b647cff0474cdaf54f2684a5184dab01bff61eb9f9d121cbb
-
Filesize
415KB
MD5c728e7a66f0a36d3dfe911e1ccd333ad
SHA1067f63ffeb1e6c51a2bc64d33e06730208f77f09
SHA256f8a0470fcae35ccc038e53c066b4bbd3e6a10ae7e5df79013e2af58acc8692a4
SHA51235ff648893a18321b7906f020120fb9783a726425faf7a50d28051a54b6ed5ac496b5e3d42da82defa463ec6fcddcc2de3bbedb304d6381a97e851e2a52dfd40
-
Filesize
171KB
MD5bb97c2fa81e3de078fa49cb3802cfb3b
SHA116161f6361b6003688d0b607553c3a0397e483fe
SHA2560db1adfb7cdb66a862e3fd892782d62b5998a701a3bd6a792a3230241708b3e4
SHA5126672cc3284bdd02c5ce9845ee27bde5144d18efa09d931dcd719154e58c839c3e142dc2023cce149cd5a7387eeb8caf71bdf7db5b4c49114f10cc7eadab64a39
-
Filesize
142KB
MD510f76100815dc7b9bc7445ce5c863a73
SHA1890a732bf600c7f1b92b6ccd02c4a96990af7461
SHA25698eaf5ca9e9309763859eee4be789e4a63e7c60129561c62a98244c6d67fe0c4
SHA512cf93eba005ca974efab8722f5ab522dfca3cbc0a42c70724dc4a8d376f8d66d903d5d35551d9f3f47e80dd5c89fdafe28cde8f2ed266e501142e305bb0fac417
-
Filesize
891KB
MD50d14f717237dd7fd703b52c030e935a9
SHA145a48776e5f5cbeaf33eb684d75674d4e3640a95
SHA2563c05b2a7d35e62ae0bce4f476a15a7582b4d41caf3d944d62ca204efbd86ad23
SHA512867f72030379591a60370d3dd2273bd860080fb0cf711378c068c9dd05369f6fb7a95ae2fcc4c9cf255c588933e1d2cfe0048e6a9f21e5b8cc54bfeb26868390
-
Filesize
319KB
MD57813006c0a8af5dbf28b0c1cb905358e
SHA13301b121c8d9983744d25a48d2eab10e460154cc
SHA256b45d8fa9d0ec0e2df3e2bd800bb9fbc6a5a656dea45c2308387cc6a9b0978ce3
SHA512c5c6894e59b8b653752245622091892fa3acce10eb22824ce4934adf49b62f23ea933e1be0c9c497bf4365e69917f0b80e50b7cce4cb27cc38399982f586be7e
-
Filesize
65KB
MD5ff319d24153238249adea18d8a3e54a7
SHA10474faa64826a48821b7a82ad256525aa9c5315e
SHA256a462a21b5f0c05f0f7ec030c4fde032a13b34a8576d661a8e66f9ad23767e991
SHA5120e63fe4d5568cd2c54304183a29c7469f769816f517cd2d5b197049aa966c310cc13a7790560ef2edc36b9b6d99ff586698886f906e19645faeb89b0e65adfdd
-
Filesize
5.5MB
MD586e0ad6ba8a9052d1729db2c015daf1c
SHA148112072903fff2ec5726cca19cc09e42d6384c7
SHA2565ecda62f6fd2822355c560412f6d90be46a7f763f0ffeec9854177904632ac2d
SHA5125d6e32f9ff90a9a584183dad1583aea2327b4aea32184b0ebbec3df41b0b833e6bb3cd40822dd64d1033125f52255812b17e4fa0add38fcda6bab1724dfaa2eb
-
Filesize
34KB
MD57c2ac370de0b941ae13572152419c642
SHA17598cc20952fa590e32da063bf5c0f46b0e89b15
SHA2564a42ad370e0cd93d4133b49788c0b0e1c7cd78383e88bacb51cb751e8bfda15e
SHA5128325a33bfd99f0fce4f14ed5dc6e03302f6ffabce9d1abfefc24d16a09ab3439a4b753cbf06b28d8c95e4ddabfb9082c9b030619e8955a7e656bd6c61b9256c3
-
Filesize
4KB
MD518ec3e60b8dd199697a41887be6ce8c2
SHA113ff8ce95289b802a5247b1fd9dea90d2875cb5d
SHA2567a2ed9d78fabcafff16694f2f4a2e36ff5aa313f912d6e93484f3bcd0466ad91
SHA5124848044442efe75bcf1f89d8450c8ecbd441f38a83949a3cd2a56d9000cacaa2ea440ca1b32c856ab79358ace9c7e3f70ddf0ec54aa93866223d8fef76930b19
-
Filesize
5KB
MD580331fcbe4c049ff1a0d0b879cb208de
SHA14eb3efdfe3731bd1ae9fd52ce32b1359241f13cf
SHA256b94c319e5a557a5665b1676d602b6495c0887c5bacf7fa5b776200112978bb7b
SHA512a4bd2d91801c121a880225f1f3d0c4e30bf127190cf375f6f7a49eb4239a35c49c44f453d6d3610df0d6a7b3cb15f4e79bd9c129025cc496ceb856fcc4b6de87
-
Filesize
4KB
MD5af45b2c8b43596d1bdeca5233126bd14
SHA1a99e75d299c4579e10fcdd59389b98c662281a26
SHA2562c48343b1a47f472d1a6b9ee8d670ce7fb428db0db7244dc323ff4c7a8b4f64b
SHA512c8a8d01c61774321778ab149f6ca8dda68db69133cb5ba7c91938e4fd564160ecdcec473222affb241304a9acc73a36b134b3a602fd3587c711f2adbb64afa80
-
Filesize
8KB
MD5d98edc491da631510f124cd3934f535f
SHA133037a966067c9f5c9074ae5532ff3b51b4082d4
SHA256d58610a34301bb6e61a60bec69a7cecf4c45c6a034a9fc123977174b586278be
SHA51223faed8298e561f490997fe44ab61cd8ccb9f1f63d48bb4cf51fc9e591e463ff9297973622180d6a599cabb541c82b8fe33bf38a82c5d5905bbfa52ca0341399