Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
27/04/2024, 01:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://launcher.erafn.org/Era%20Setup%201.0.71.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://launcher.erafn.org/Era%20Setup%201.0.71.exe
Resource
win11-20240419-en
General
-
Target
https://launcher.erafn.org/Era%20Setup%201.0.71.exe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Control Panel\International\Geo\Nation Era.exe Key value queried \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Control Panel\International\Geo\Nation Era.exe -
Executes dropped EXE 6 IoCs
pid Process 1748 Era Setup 1.0.71.exe 3364 Era.exe 920 FortniteLauncher.exe 916 Era.exe 2684 Era.exe 4956 Era.exe -
Loads dropped DLL 19 IoCs
pid Process 1748 Era Setup 1.0.71.exe 1748 Era Setup 1.0.71.exe 1748 Era Setup 1.0.71.exe 1748 Era Setup 1.0.71.exe 1748 Era Setup 1.0.71.exe 1748 Era Setup 1.0.71.exe 1748 Era Setup 1.0.71.exe 1748 Era Setup 1.0.71.exe 1748 Era Setup 1.0.71.exe 3364 Era.exe 3364 Era.exe 3364 Era.exe 916 Era.exe 916 Era.exe 916 Era.exe 916 Era.exe 916 Era.exe 2684 Era.exe 4956 Era.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 39 discord.com 40 discord.com 41 discord.com 54 discord.com 55 discord.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Era\resources\app.asar.unpacked\node_modules\@sentry\cli Era Setup 1.0.71.exe File created C:\Program Files\Era\resources\app.asar.unpacked\node_modules\@sentry\cli\sentry-cli.exe Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\ar.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\ml.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\binaries\FortniteLauncher.exe Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\ca.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\cs.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\fr.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\lt.pak Era Setup 1.0.71.exe File opened for modification C:\Program Files\Era\resources\app.asar.unpacked\node_modules\@sentry\cli\scripts Era Setup 1.0.71.exe File created C:\Program Files\Era\libEGL.dll Era Setup 1.0.71.exe File created C:\Program Files\Era\vk_swiftshader.dll Era Setup 1.0.71.exe File created C:\Program Files\Era\resources\app.asar.unpacked\node_modules\@sentry\cli\scripts\bump-version.sh Era Setup 1.0.71.exe File created C:\Program Files\Era\resources\app-update.yml Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\hu.pak Era Setup 1.0.71.exe File opened for modification C:\Program Files\Era\resources\app.asar.unpacked Era Setup 1.0.71.exe File created C:\Program Files\Era\resources\app.asar.unpacked\node_modules\@sentry\cli\bin\sentry-cli Era Setup 1.0.71.exe File created C:\Program Files\Era\Uninstall Era.exe Era Setup 1.0.71.exe File opened for modification C:\Program Files\Era\locales Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\af.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\mr.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\fil.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\ko.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\libGLESv2.dll Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\te.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\vk_swiftshader_icd.json Era Setup 1.0.71.exe File created C:\Program Files\Era\vulkan-1.dll Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\pl.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\ru.pak Era Setup 1.0.71.exe File opened for modification C:\Program Files\Era\binaries Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\nl.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\en-US.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\resources\app.asar Era Setup 1.0.71.exe File opened for modification C:\Program Files\Era\resources\app.asar.unpacked\node_modules\@sentry\cli\bin Era Setup 1.0.71.exe File created C:\Program Files\Era\chrome_200_percent.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\el.pak Era Setup 1.0.71.exe File opened for modification C:\Program Files\Era\resources\app.asar.unpacked\node_modules Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\et.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\icudtl.dat Era Setup 1.0.71.exe File created C:\Program Files\Era\LICENSE.electron.txt Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\sl.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\binaries\go_build_gemd_src.exe Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\de.pak Era Setup 1.0.71.exe File opened for modification C:\Program Files\Era\chrome_100_percent.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\id.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\th.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\resources\app.asar.unpacked\node_modules\@sentry\cli\scripts\wheels Era Setup 1.0.71.exe File created C:\Program Files\Era\chrome_100_percent.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\hi.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\v8_context_snapshot.bin Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\uk.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\zh-TW.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\resources\app.asar.unpacked\node_modules\@sentry\cli\js\releases\options\deploys.js Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\bg.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\ro.pak Era Setup 1.0.71.exe File opened for modification C:\Program Files\Era\resources\app.asar.unpacked\node_modules\@sentry\cli\js Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\da.pak Era Setup 1.0.71.exe File opened for modification C:\Program Files\Era\resources Era Setup 1.0.71.exe File created C:\Program Files\Era\d3dcompiler_47.dll Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\fa.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\resources\app.asar.unpacked\node_modules\@sentry\cli\js\releases\options\uploadSourcemaps.js Era Setup 1.0.71.exe File created C:\Program Files\Era\LICENSES.chromium.html Era Setup 1.0.71.exe File created C:\Program Files\Era\locales\kn.pak Era Setup 1.0.71.exe File created C:\Program Files\Era\resources\elevate.exe Era Setup 1.0.71.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString Era.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 Era.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Era.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Era.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Era.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Era.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz Era.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133586563881197310" chrome.exe -
Modifies registry class 62 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\era\ = "URL:era" Era.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\era Era.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\era\shell\open\command\ = "\"C:\\Program Files\\Era\\Era.exe\" \"%1\"" Era.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 090210c64598da01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\era\shell\open\command Era.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\era\URL Protocol Era.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{83AACCC5-B64B-44B7-B16D-0F738DFCFACD} = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\era\shell Era.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\era\shell\open Era.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Era.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Era.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Era.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Era.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 Era.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 Era.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Era.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Era.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4664 chrome.exe 4664 chrome.exe 1748 Era Setup 1.0.71.exe 1748 Era Setup 1.0.71.exe 1748 Era Setup 1.0.71.exe 1748 Era Setup 1.0.71.exe 1748 Era Setup 1.0.71.exe 1748 Era Setup 1.0.71.exe 3364 Era.exe 3364 Era.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4664 chrome.exe 4664 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeSecurityPrivilege 1748 Era Setup 1.0.71.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 3364 Era.exe Token: SeCreatePagefilePrivilege 3364 Era.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 3364 Era.exe Token: SeCreatePagefilePrivilege 3364 Era.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 3364 Era.exe Token: SeCreatePagefilePrivilege 3364 Era.exe Token: SeShutdownPrivilege 4664 chrome.exe -
Suspicious use of FindShellTrayWindow 46 IoCs
pid Process 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1748 Era Setup 1.0.71.exe 2680 MicrosoftEdge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4664 wrote to memory of 4584 4664 chrome.exe 73 PID 4664 wrote to memory of 4584 4664 chrome.exe 73 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2172 4664 chrome.exe 75 PID 4664 wrote to memory of 2060 4664 chrome.exe 76 PID 4664 wrote to memory of 2060 4664 chrome.exe 76 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77 PID 4664 wrote to memory of 4672 4664 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://launcher.erafn.org/Era%20Setup%201.0.71.exe1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa25fb9758,0x7ffa25fb9768,0x7ffa25fb97782⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1840,i,13621096987419056144,13981142234888826561,131072 /prefetch:22⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1796 --field-trial-handle=1840,i,13621096987419056144,13981142234888826561,131072 /prefetch:82⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1840,i,13621096987419056144,13981142234888826561,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2860 --field-trial-handle=1840,i,13621096987419056144,13981142234888826561,131072 /prefetch:12⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1840,i,13621096987419056144,13981142234888826561,131072 /prefetch:12⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1840,i,13621096987419056144,13981142234888826561,131072 /prefetch:82⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5300 --field-trial-handle=1840,i,13621096987419056144,13981142234888826561,131072 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5324 --field-trial-handle=1840,i,13621096987419056144,13981142234888826561,131072 /prefetch:82⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 --field-trial-handle=1840,i,13621096987419056144,13981142234888826561,131072 /prefetch:82⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 --field-trial-handle=1840,i,13621096987419056144,13981142234888826561,131072 /prefetch:82⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5464 --field-trial-handle=1840,i,13621096987419056144,13981142234888826561,131072 /prefetch:82⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5492 --field-trial-handle=1840,i,13621096987419056144,13981142234888826561,131072 /prefetch:82⤵PID:1312
-
-
C:\Users\Admin\Downloads\Era Setup 1.0.71.exe"C:\Users\Admin\Downloads\Era Setup 1.0.71.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1840,i,13621096987419056144,13981142234888826561,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4812
-
C:\Program Files\Era\Era.exe"C:\Program Files\Era\Era.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3364 -
C:\Program Files\Era\binaries\FortniteLauncher.exe"C:\Program Files\Era\binaries\FortniteLauncher.exe"2⤵
- Executes dropped EXE
PID:920
-
-
C:\Program Files\Era\Era.exe"C:\Program Files\Era\Era.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Era" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1548 --field-trial-handle=1704,i,1902324453330153655,6587860296251847019,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:916
-
-
C:\Program Files\Era\Era.exe"C:\Program Files\Era\Era.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Era" --mojo-platform-channel-handle=1728 --field-trial-handle=1704,i,1902324453330153655,6587860296251847019,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2684
-
-
C:\Program Files\Era\Era.exe"C:\Program Files\Era\Era.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Era" --app-user-model-id="Project Era" --app-path="C:\Program Files\Era\resources\app.asar" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2184 --field-trial-handle=1704,i,1902324453330153655,6587860296251847019,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "reg query "HKLM\SOFTWARE\Microsoft\VisualStudio\14.0\VC\Runtimes\x64" /v "Installed""2⤵PID:6032
-
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\VisualStudio\14.0\VC\Runtimes\x64" /v "Installed"3⤵PID:6072
-
-
-
C:\Program Files\Era\Era.exe"C:\Program Files\Era\Era.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --user-data-dir="C:\Users\Admin\AppData\Roaming\Era" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 --field-trial-handle=1704,i,1902324453330153655,6587860296251847019,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:3396
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2680
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:5244
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5532
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5624
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5752
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.2MB
MD579eb63401ed9b880649174d9bb2e87bc
SHA1cf5e5d46725068bfc83a10afaeac86f0b130adf2
SHA2563731ca4edb6b8fe78bc3a9f7fd6b2a2154d159717f0d7b498168cabe88bf8820
SHA51216e0769cec6eb4176ab3bc84f41d5086edceb8ece7e46e1295904468bf159437754cef146a453050665ca3a2accafaa98cbc4e94b4fac5ad1e59b25e8ff4e7df
-
Filesize
126KB
MD5d31f3439e2a3f7bee4ddd26f46a2b83f
SHA1c5a26f86eb119ae364c5bf707bebed7e871fc214
SHA2569f79f46ca911543ead096a5ee28a34bf1fbe56ec9ba956032a6a2892b254857e
SHA512aa27c97bf5581eb3f5e88f112df8bfb6a5283ce44eb13fbc41855008f84fb5b111dfe0616c310c3642b7f8ac99623d7c217aecc353f54f4d8f7042840099abc5
-
Filesize
731KB
MD5a970b7e9d3aec2cd1b8ab798b3179f07
SHA1bf17a7e80e01ac1704a1efdf27baf271b4c21e36
SHA256cd80bf232f2f128a3d411f52c8039987559dbc1055f746eed6e0e8478b116dc1
SHA512880555a2ac2f278aecb8794d8cc51f0833052e9f4ca187ed91fa35bb475e68ae3255cfe1dc074eac960c73c203e62c6b38077b266f5fab66ccc3ca73e94d4d60
-
Filesize
264KB
MD512005a163700fd158a7feb7433793c77
SHA16e1281f651a432f087c2663c07b31f72175b9536
SHA2564e86e16bf3121dce026a87e22fbca5723f41dd6c1ad33acb49081fb617be4a3e
SHA51200a8c64dcfdffb83b8b2a9759c85022c688b3846a8bb2d0c56fbd703f377a8258c811f9586e21df4ab911c5f3a7875853b9c07385b13252f4a75988b856ef083
-
Filesize
1KB
MD562ed071bbc6495499b8c57f49f604c98
SHA10acf3c3c58ab6d434eebaca53684a6ba512f00d8
SHA256cfd6cbb05c9dece2dfd0321d7a7d3b9fe229a57e0e7fd23c19ec9e30d5328d3f
SHA512d718e5c77a9936f41eadc81c8fb475df084e410aa48ffb4c82f5cb3abaa1ed8e645ab1e5363cca60bd2813f972a9c85400d435e190eaf722fdbb9840aec6f7e5
-
Filesize
5KB
MD5fb7e15b8a07c753b76e2980278656cf5
SHA1c20085c052df42b7f92d5631f791ccbec9b2d8e5
SHA25667ee3fac74aa1b789a0f1500bd63d741beffa9a745ce42097fa3657a18f855a4
SHA5128be202347e9abbc9e759b5a5b362a6489609a5eddd61d32b7dee52f7f8ea4eae1a875edd6c0e688d5b12b19e79cbd4e75c36df651a52d40e42fefa5aa73e82d6
-
Filesize
5KB
MD5afd11f498eadc9371d3907d2fb4dad3e
SHA1fee6cdd0b596284fc39551ee076f83266038950d
SHA256d6f03fc4382fd78396aa593e843a77faa487b9bc16857541e2303fe72949be25
SHA512ad7945e3d9dbfd26b32acdc860f73fe388e4f994f24370a5ed45a548df77e5d3184cd162c7613a82722c576d6c6a07c073429db565d8980fa79cea83fdbfa1d9
-
Filesize
5KB
MD551e757d16776bbdfba59212d73990e2f
SHA1a6630ecf585300ca71abb0a99087844cd1c573e6
SHA25693b0ff2d0644e63868c75f6f32928ab4cc553453918a9af3fcfc8334f1bf451b
SHA5123bd399729d3a630487777d540e2b7620dc5dc437ad7077e9f70e71762cec17af45d22ef79ee7312a0e01985a41232152890e1504493acdec79568dbee6dfb6cd
-
Filesize
5KB
MD5dfceb0e518d6fd3e09da932f4c78c14d
SHA17524847007daf7090543ac565bf65443e2f80ddb
SHA25684cefd171595a504edfefb9168afa9a4e9ad764cecd12429af457669d6389824
SHA5126b663e6d1faf8836e170f7dbd543aa6a273ac0a9d0ce2f78d64785a4545298d9bc7724898d71f64bba0e5168ff11272d3e02ae22d80313167478552e51fc0fe6
-
Filesize
5KB
MD5cef57debe6a11659f029133eff7fd59f
SHA12f076ace52dbbb5d9fce13a09966eb2406064111
SHA256f4389681466a74ec0c4e395748edfb5e5062d793e601b0592491042d32a306eb
SHA512790ebcfb5ca45afc8e699f7ddf718470faed505702b48a99a553f91485800b6375eea1f82ad078c0d60c364933076d0af3832331e30ce0c0c17b8510871aa6ab
-
Filesize
136KB
MD5ff66736c3bac8028ed1122164ba61fae
SHA10a71bfdd8b581f59914f623cfacd610eefcdc346
SHA2563b7f86f911b4ddc05b3031c5efcf98874d7466582b62473eefefd31b806f282b
SHA5121a3a7731e76b11b2edf4aed949081c9626f3746f8661951013bd03529ae45fd9754c6df0f1a0771ba45025cf8b54adc494911ebefc4f98cfcc7aab91d44f8923
-
Filesize
136KB
MD5086135ca653cdabbd0801591cdf29cb9
SHA139d50a095901e2c98b96a7a6461854244e958363
SHA256dd786764cd408f6bd6f742d50e02ff7e24d1a86352c4c76954bebeab6315653f
SHA5122f31c5769d18af41cc9993c18c3a2b1e3b236d45389890ee5e091bdef9124e18c35846103372f007403036fb7005309eedd48b752cb32f8e39955d3320207715
-
Filesize
111KB
MD5ae0dd44e360eecd52e84368497151481
SHA155fd32298fe1143a66c7d8362bbff1b5dd3bdfeb
SHA2560e3ec2fa9fd63ec7f7da9c1bea626c0e877d310cfa5d421d234a4899cffe963d
SHA51247358b5789be53a6a00b0940638748e91683e92235911325fa4f94d230d46c241326a8b6de4949a9629933cd01bcf64472145a5c5c06a31b21d213bdd34961ee
-
Filesize
105KB
MD594a4eab435ae10f573563833cc3c09ff
SHA11d6f64e2257889ce1540bfdd025f49caf3437af8
SHA2567e7d76f96f5fe2b5d50d78d4cd058339bd75853b29a211a2e707cbc8fbe5d1a8
SHA5128a2a3b7e03b7de286ce2c8c1f4b6b787565d341683f61b35f433f49e6592c0964fa7ee8bb4f8b68da5e8dcbeb511735bf30f707dccdbbed3768461e78aea513f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\G6UD9H1J\favicon[1].ico
Filesize23KB
MD5ec2c34cadd4b5f4594415127380a85e6
SHA1e7e129270da0153510ef04a148d08702b980b679
SHA256128e20b3b15c65dd470cb9d0dc8fe10e2ff9f72fac99ee621b01a391ef6b81c7
SHA512c1997779ff5d0f74a7fbb359606dab83439c143fbdb52025495bdc3a7cb87188085eaf12cc434cbf63b3f8da5417c8a03f2e64f751c0a63508e4412ea4e7425c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\YNTCDZ05\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DFA663A7AB1F68A80A.TMP
Filesize16KB
MD52630ed0b1fd6723eeca627417a7e485e
SHA1a03c1c1c3476b02c1304cd455980553c1adc2c9b
SHA25606b58d3fde06cb4dcb9f6e767debaa82516efb22b9255cdf4d1b186cec185778
SHA512406a7221433387ac022a49825e9508fab56e483ce41ef8b12997112f865b9b72086418630954eae7c782f455b71b10b8b2e4eecb51ebe46c991fbedc7e68312d
-
Filesize
150.3MB
MD52f88617165e05e48e90f6969e5884227
SHA1d796c61b1870a69cbcbdcf1687d23949a3c88b6c
SHA256a06cba453802d87bec65b60b02a5f30c359e6d3d9cb0565243b4bcb8e51dd38a
SHA512d4bee2d2ee7aa8b429f6f8b30a6d9104a49fadf73b649d28d04f2fe723abd4b79a373f8d1c4da884bbbd23bdcd77b168e768f13ab45d76258644d9e3d0d57965
-
Filesize
1KB
MD54d42118d35941e0f664dddbd83f633c5
SHA12b21ec5f20fe961d15f2b58efb1368e66d202e5c
SHA2565154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d
SHA5123ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63
-
Filesize
6.5MB
MD5d18c09a075cb6531d7ffd7c3da77bd4e
SHA1571f29b6004007111782bf5727c4bc9510cca286
SHA25686f5222580a4ab03dad8ea62e6cea22b23454dccf1c77e74ae0e0410a13b16fc
SHA512091cd68e12633919fc6100b606f3002b16f4b9c7c6d7c820ff20e31a3b9ea690c8a1fc90529ff3e5c21e8d778e254743a8708049830c3bb046eda8f2653000b7
-
Filesize
52KB
MD5aeaa6f47b71614437c0d47828da005ca
SHA1f9d016d3817ebbc28556967b8b8c05d120acbc58
SHA25631eb3c804c7a248fe505d948ad9b3891b6b6f9210bd84aaf0eb716478c490b66
SHA5126785eb5ae5d6d78a9c2f004ba5c91dd6603fd8efb39cb50f4bc3ac16d7377fb1317ba12658b63d575c17de04696b88c09c8a812340c4c40394196dab99d41a60
-
Filesize
7.0MB
MD5b01e5bcca27ef38e986716ac5b336aac
SHA1a6829cebfe26f0ef33463c8a8db2637070eed3c9
SHA256160846ffbc47168d5e16bb3dc2ce8fae83e7705718099ba4662c5cebc89b3f05
SHA512aa3a856e295f19c87d930053ebae89972778f928b30eb1036287900f735194396e2b18fa72e489f21cc5d0877b0be3f6d7e99a5c87fa7cb17dc7770b0ae95cc0
-
Filesize
175KB
MD55604b67e3f03ab2741f910a250c91137
SHA1a4bb15ac7914c22575f1051a29c448f215fe027f
SHA2561408387e87cb5308530def6ce57bdc4e0abbbaa9e70f687fd6c3a02a56a0536c
SHA5125e6f875068792e862b1fc8bb7b340ac0f1f4c51e53e50be81a5af8575ca3591f4e7eb9239890178b17c5a8ff4ebb23719190d7db0bd8a9aa6dcb4308ffa9a34d
-
Filesize
4.7MB
MD5cb9807f6cf55ad799e920b7e0f97df99
SHA1bb76012ded5acd103adad49436612d073d159b29
SHA2565653bc7b0e2701561464ef36602ff6171c96bffe96e4c3597359cd7addcba88a
SHA512f7c65bae4ede13616330ae46a197ebad106920dce6a31fd5a658da29ed1473234ca9e2b39cc9833ff903fb6b52ff19e39e6397fac02f005823ed366ca7a34f62
-
Filesize
2.6MB
MD5c184ad77ac8ce299475c0c85621aa782
SHA1308c55c03dbb1888fc0d214f5f5315707ec5af49
SHA256ec8652d431dd41424cbad04957841538fce811898edd158488672df1da2450b9
SHA51290ab519179e82b158f6a6b44247421e00db4477b4a3ed1135b6bc3af8e16d939aa6286b2781dc02424903f817d5a61b30251b26c9f2335e1ca570d4252c915eb
-
Filesize
10.0MB
MD576bef9b8bb32e1e54fe1054c97b84a10
SHA105dfea2a3afeda799ab01bb7fbce628cacd596f4
SHA25697b978a19edd4746e9a44d9a44bb4bc519e127a203c247837ec0922f573449e3
SHA5127330df8129e7a0b7b3655498b2593321595ec29445ea193c8f473c593590f5701eb7125ff6e5cde970c54765f9565fa51c2c54af6e2127f582ab45efa7a3a0f6
-
Filesize
473KB
MD5773bbe681c1fab3d4d9ac505678f49e2
SHA16eb8dd50d3674d60ce805f59ed98a5bde42cafd5
SHA25698a07bfe813d4e0917c82437b9489ab72694a76f71766c9b0cb61daab81ebf74
SHA5122034ec31a8b71865ba7edf3bbcf5425756c46ffa896909e2c4b423171b205194ddec2933043ee906d8bd01bbfc3a34c2f09ed847aad3c8d5be09a886f19835f2
-
Filesize
7.2MB
MD5977a79d2155e9dac5eb1a6741abfdb11
SHA18706344e4544a3381cbfa2ef83a223bc942464be
SHA256364dbfa38fe501f73b3935f84398e9cb261a1b63f4e55934cb323255cfa0dd8a
SHA5129c2b072592f313d7083bd762cd100e05ae2c50596aaddc083bb7f9b75d20077bd6c2328049de9c854b2653ee4b4834eb6728aa09edd146f18cb25d6655e8e558
-
Filesize
340KB
MD5198092a7a82efced4d59715bd3e41703
SHA1ac3cdfba133330fce825816b2f9579ac240dc176
SHA256d63222c4a20fa9741f5262634cf9751f22fbb4fcd9d3138d7c8d49e0efb57fba
SHA512590dcc02bc3411fa585321a09f2033ca1839dd67b083622be412d60683c2c086aac81a27bc56029101f6158515cc6ae4def39d3f246b7499b30d02690904af0d
-
Filesize
551KB
MD5952933d2d388683c91ee7eaa7539e625
SHA17a0f5a10d7d61c32577c0d027db8c66c27e56c7d
SHA25655357baf28716a73f79ac9a6af1ae63972eb79f93c415715518027fc5c528504
SHA5125aa5ef0ed1da98b36840389e694dc5dcef496524314b61603d0c5ee03a663bb4c753623fb400792754b51331df20ac6d9cf97c183922f19fc0072822688f988d
-
Filesize
602KB
MD598f8a48892b41e64bef135b86f3d4a6c
SHA132f8d57ec505332f711b9203aed969704bd97bc9
SHA256e34d5cabaed4634c672591074057c12947bc9e728004228a9e75f87829f4a48a
SHA5126ed3fe415b2f6de24136917da870b47c653d15c7a561baae55a285946a6f75e5141aba3bc064982f99baef0a893266693864c2d603c5c22c2b95627b2035f7a4
-
Filesize
631KB
MD59dc95c3b9b47cc9fe5a34b2aab2d4d01
SHA1bc19494d160e4af6abd0a10c5adbc8114d50a714
SHA256fc4a59ea60d04b224765be4916090e97ed8ddda6b136a92a3827ed0fcc64bb0e
SHA512a05a506a13ac4566ecbfe7961ace091295967ea4e72a2865e647b5fa9adac9f7cf5e80b53fae0e3917dfb0b9a3f469189cd595cc4ae9239d3a849f5cedd60e46
-
Filesize
812KB
MD5d6ccc9689654b84bc095cec4f1952cca
SHA1286130971826b0af1b6d29c5283dfa71af7cd7b0
SHA256e325d936cd97c3f9ddfca2d87caefb8b6e7465ffa31d0386ae2456b18f7a92da
SHA512db0400820c5cd1100337c955084eac3036b55bbf66b403337bec2079bc47696e2e48a771214662b286f4f45f763d2ad423aeccbd0f06cf0bc11038662558f4a5
-
Filesize
384KB
MD52f8d050c228583559cda181291b76e5a
SHA1b047f1cfb30b1162b1dd79f7e424a83fd807eec7
SHA256e1d6b5fd0bc411f2895eaaa1409916f5ffe39a5c6bd1bafe8af7ce33da5be17d
SHA512e4f150cd9942ef5105e72376835da6edc31ef91783e41cd2fc04600c04f342bbc96e08e23c8af1c0c1e563bb8a7d3840a2289767525c30d08c2f23d0e837801f
-
Filesize
393KB
MD526765c7be201444f0238962bb16a506b
SHA1f9d4a33795e45127c14bcf35cc770845627e15e8
SHA256936466784a55b965d23b016bc49377655bc5d281d012c8369c0809c961e05c74
SHA512577d52d2d5048cd952aff1e76121a495328c1978cdea2eaa4f85812cc513917f69510e135e96f7967f4ed43cf88e180cb1d9059e17c855c8d4f94ca036730214
-
Filesize
356KB
MD5fecabf71853bab84eacdd95699c49f69
SHA18519afc13e100a550ca3d756518a0bc33674e0d3
SHA2561b0793b1cbeb6a56ff1e64523c37ba753457320aa29f9718022caa07b4981d8f
SHA512e932d382d41a79ece172349e916221a67d97f5fd4b2dc1325d6bd2f7c6757cbc01d6fbc8d9846f6ec462eb637210f7c650f6944418edbd3f8614ef99030d9392
-
Filesize
381KB
MD5ec069f60c9825080b9d18ff6492e816d
SHA134ce5101c9646f9c2deb9820a3b26eb91c525ebc
SHA256e0f632ce324951002c80e019dd0169be9f6b0640533fa434cd6ca80f28a1d3f7
SHA51295a88ac98f0957e5f200af76c1a743b976228f7da1bb6c6b3b88a54adcff05e1172d7cf2e6f0a82cbc8ad0aa79974a1bc046516250a3a5889fd7b2e4d7c0b804
-
Filesize
691KB
MD5306a80dadadb1f9182810733269537fd
SHA1bc01a65a9d024ec72e613aedc60f4838be798040
SHA25692403b6160e38746597d4dd7f64d64cf19e30b5e7862901263c39679187b2c91
SHA512491016b8fcca59a7dc9523358c4a7b56c55360f424e8fe9330d6f01480835805e961f1e48f8777660510d9af9a66961c639df162190dec595a867d54150eecfc
-
Filesize
310KB
MD5502260e74b65b96cd93f5e7bf0391157
SHA1b66d72b02ff46b89ee8245c4dd9c5b319fc2abf7
SHA256463af7da8418d7fb374ebf690e2aa79ee7cb2acc11c28a67f3ba837cf7a0937b
SHA5120f0f9aac8e6b28c1e116377ab8ee0ffadbf0802a4026e57aedb42d21c38fbf70159be9e0314799c1de1f7638fbbd25d289dff7cd2c9eb7c82e1b62b6c4e87690
-
Filesize
313KB
MD53f6f4b2c2f24e3893882cdaa1ccfe1a3
SHA1b021cca30e774e0b91ee21b5beb030fea646098f
SHA256bb165eaa51456b52fcbdf7639ee727280e335a1f6b4cfb91afc45222895b564f
SHA512bd80ddaa87f41cde20527ff34817d98605f11b30a291e129478712ebebe47956dbd49a317d3eeb223adf736c34750b59b68ad9d646c661474ad69866d5a53c5c
-
Filesize
380KB
MD5774ced79da2fd32bd1ba52a0f16e0a19
SHA1ff36dcf8b62046871f441f301dd7af51cb9ce7ee
SHA2565aff3762747a6e8c6df9f2a3b470bf231b44163006b17ce87e2a03694be27b81
SHA5127763c15fa97efa9a5af73dcdedd4fe260139bd8ff782ca3aa0937d9355b2d14c3e482e570844ac33d22d7b016c7b9097d727c1dd585f421dccd59ca7bbc24269
-
Filesize
380KB
MD5ba80f46ef6e141cef4085273a966fd91
SHA1878f35e15b02558f75f68ec42a5cc839368c6d61
SHA256267e7b6376e7e5ab806b16fde93bbbcd961bf0c3a7b3a2cabccab37faa9a1d16
SHA5128a8b4f7db23d4c93756b6dc4219f00c77358a8fe992da1f51431597b82c3aa87abf3a98d79e13e7b4a14a1a9e94d388760fb6abf3a744406dee951c8e78cf361
-
Filesize
342KB
MD5e97fe1e6d06a2275a20d158dc4e3b892
SHA11575b9b1fc331a70bbe4ca7d1095d4ed6777ecc1
SHA256d984aee4d18ca24a88846b1b6e0294d373733430f30bb4f1b97bc7d50d512c2e
SHA51277879a4d1062671b616ba9b2ce0b6f69a5dbed6bd56b73ded902d1f9f44ecd96a2212690b3568c0ba273c73d91589ff2bf18c7ef9b66e0630fbaafde2a61b1b1
-
Filesize
557KB
MD5d55f65c6fda6ed6f549d2c9f0a4ce874
SHA1952792f2da5ed9cb1cfed14e5afb8abf5cf29cb3
SHA256221bbbde078d135f6daca4978a31cc6a82f8f46536467ebc9a0cd322c58a7785
SHA512d0bb83467182d8b3a8f8371d749e682cf05f89daefe28764f2c263e7cfbfc3f86cb388061b48dadda26c3dd246dd6f7a57af58ca9344c2f6b90de87af1e91c69
-
Filesize
351KB
MD5fa7dbd2ee35587ff31fde3c7107e4603
SHA1baaa093dcb7eccf77ce599c8ff09df203e434b60
SHA2565339b8ca52500bd0082e0ba5a5f440c5f04733803da47963280479760c7fff2c
SHA512587f6d0e216d1688227345a8a75b94848ee710ec633fe6805db66bb0e8cad1b8d24a1e6a7e234061516770d881571166c78d8fa1c40e6335f3dcb1339fbffc14
-
Filesize
394KB
MD53126f74d021e9423d71913bb45a62935
SHA1c9a80c8585aabbfec34ae891416794b1b3e29a11
SHA2564cd3fa70487e894400ad29e3bfbfba3e1c5edd799aab12c62c3aff3c2580ce5e
SHA512fb360723ee53b3f7038eebd1b919a36784a0e3dc878e810bc905c4297379dade6006c8872ed68412b06161cacb0d6e32a7157ecf97d9e103a4ca3b2b71db8765
-
Filesize
410KB
MD551ee1ed54fec49effd103c29677885b5
SHA1ced6fd3354007d1ef3ea7b6689aae5213c20cc69
SHA2561f6bc09499ee37456968a28b67b81bbf5b9df4f0c6035a388242d2037a3b65a1
SHA512dfd50ad99b89345940afead11c3a6940d4408a0e6265cddda1d71ad92527ea00d8057ac77ceb2ffe137a3f0d2f321c210bc7cf97ed821f01e538dc08d07149a4
-
Filesize
787KB
MD5b7f4c73d56be31042d8edd7e8ea080f3
SHA1c0c3595701c0a75c14931ed65958d36df0d925c5
SHA256c36a20730d5f2b91cb61b5b2a5912db2ea5a328a9b8abe0fca0af300446d3c20
SHA512ea0d766a754604cad4d5f3180c30f7dfdc3e1cfe79d67365b72adc0d7574851f21bdd5b748b16e8b4a95ade40c8ed0442bcefd511a2934cc9c701e379c955d60
-
Filesize
488KB
MD56376d0a5f4273b76b1f4aabade194e0c
SHA1337ba39f09454c0779ab64872b9fa11f866d6adc
SHA256875712bb852c698f677c0c74e088f62d31adb2bce65648fc390607aad8705c45
SHA51200347f16b5abbaf47fb08663d5efde26ab7de0c7a2fa42e6b5f03c41a83cecbd8e78cc3aef41d5f08658cf346e0ade732774485e8a10008a43fa41ffaf73b2be
-
Filesize
821KB
MD5ede7fa471c5eebc1fa55b9b3b6f92d00
SHA11d1f529c615799bb3a3319ddd1357cb5dc71464e
SHA2561e9623c7407ae8b8a88df3f69a47ae8117f74c4dcb56897bb794a9c38ee5805b
SHA5120f51ea54e828700080effa6c728230c523ff8e26fb350e6f337028d18614d5dfc4a2792cb92b5e606bd0702067f55fea546029cddd1ebf7fa74ef5521ff08338
-
Filesize
381KB
MD57095ef4caf6bd39174487002a4e09300
SHA11efe686bd0b7f035aee7ab4c52be6133121cd0f3
SHA2563d7685163c5eb6a11e745ff934312b8681c5f85dfa8d9ea701e9dcaee1e7a285
SHA51245488d46dfe7a31a007932917f7baf4c195da899de5dc56d98e555336668af3edb77996487649b86f56beac688374ce77f8feadc01e3f84d30d83bd67631f9c1
-
Filesize
411KB
MD5d6904e7d1b6750d43a6478877c42618d
SHA1919f090a6a3aa1112916f5bb0d5b73a62be43c1e
SHA2563ec43893c6de5ec0f9433841afd5fa9feaaf59ddcef05f7e1cab14dba799887f
SHA512d600fedb5ef1b2eb49a0122536c642b350ce67bb7a9da205890d9d13a195ac17c14607b4489715fd34506ec0ea4c80f245e09cf048aef52dcc8094f3138b2fad
-
Filesize
336KB
MD5881ff04e220aa8c6ed9d0d76bfa07cb8
SHA1cacf3620d1bf85648329902216e6cdc6f588a5ba
SHA2569210c4c4c33e7ceb5f70005a92a4fd36ca4facdd41701fdc1d2ce638db8adf22
SHA5129134102928aa80c49bbf2b862e8079b2ee23636ce63412a4c3813f234d623ff563f5ca1ac407ddb77cecf1224896ed59ae979dcf63435d35a4f13de9c22755d5
-
Filesize
373KB
MD591391f388b4b6c12a72710c35f4c355d
SHA1f89e6ea977a10a9f050395489285ce8c041c2c05
SHA256c0dc0a4a87f7bb054a30eb1174c3228ea2014bd94668a7d22995b99c4937d817
SHA5128796d69d1a8bdbc7690ded45404174b7fa0b5bec8453d79a3c85bf4707c3f32caf634c792c72ce7bda3522eceb5fc6761b696471586397064d9f1f1988ceee88
-
Filesize
456KB
MD58209dd8cf4e416416e015ff239b7c483
SHA17affd1707b9eec52c26a4c17708c8471c369e2f6
SHA2563accfd9a1833ddeedb2082fb94101beb59b555c60f42e3070e9e04a372eba84a
SHA5126a58a1ea8a46c325cac0629f2e3b571532a9a2a342ed61ca47bd1dcee20ce0b0350e4f6d3e8e4c6903c7ba4a4592a6382bf0fcb5437febd1673b3c2ce8cd7499
-
Filesize
910KB
MD5d3d6bc60bead608e68e776e07d21ad30
SHA1e40e38ca99026056c127e9e1a1ff821a50310887
SHA25690b2df3338468e84e2cf2f2f67597cba5c3ceb5dba9c59ebd072ec15a70ce741
SHA51205421db2f1202573a34de1e722c6bdb55a35821c4aebd54c80e6594fc92075cd9b97e5bfdfe93b4228c3a2646b92a27da4722ef3826e2807238dcc56ba273706
-
Filesize
383KB
MD5b31780fff9541290c1d9f5b76141430d
SHA18b0fbdccd0a7f8141846763a0d27e4e0da0552dc
SHA256b04c1b91cab31054be70cb851dc6716065545445801045daceb96eeee4d2334a
SHA512a573dd09520059832e7f53386a64dcdde47452b02ce1e5d7e11385abbc8b734dcee0065b4ca351591bf9cc2f66fae204b9300702246d20265e8ddff4f7c1e6d8
-
Filesize
412KB
MD57b6bf901352885c0699db71239b7cf24
SHA19e3ec5f327c0d0e54a449332061e60a8c79243cf
SHA2569200a9509bd77834d9912f4ba8f4219d2b9bd2cdad49a11873db30e99b9d1350
SHA51279ebef723fb4c17581eb869b4b4e1a364a3d28df0e168e7e1a3583e0c1ec5b9716dd270925c0545b8247421a64b03705f10910fe3416900de9258840c470d580
-
Filesize
410KB
MD5e664eb35f1284e9fc615e1bb4fab892b
SHA1e777653abec377a394170b04f79e78acbe4b6a3b
SHA256b5a31cbfcb40ad8d911de1618c4eb7e8cc67b97eb8878220f15d40eb014d8ac8
SHA512c3232997e8d306e91ded72e9d81ffae2018af3e6c32fe620532e03bccd2883fce59b2a2290a1580d7080c468c02bcd24c1bc90051f06bfa9a4e17857d4aa583f
-
Filesize
948KB
MD500292b0801e0dd0a74091bf53f1574c9
SHA163a002e7a8796bc4b4459a19c95ce426fbd1ec7f
SHA25661a372f170de0a22712be980c3c78b22035ebf40ce79332fab75cdcc4208c9e6
SHA512e2e15f66851aa435e3bf4de6672f4aa8b01204d8efe11ec6ee9a51d9877ec4f2e71d7e9547d6eab9bfa04af1bea71fa72aa4963fa08b48717bf1c3fd21c00cd5
-
Filesize
772KB
MD5b9a2aa88c69c42ebcc41fef00c980a38
SHA19e373dfa11f95c31ffdca70bd83d2f66e1ddcef8
SHA256481faf7dd66cf10a476d8b156fb4ea452f920322d8007f7e25d41b2837bdbc09
SHA5125f4582723429a44dd517322babae4466efb4e8723c0247754e2a9a2929133d6fee5c3533c4cf567954e2a5aab47940a136a178405de36e38b50e8d4a6d5c504f
-
Filesize
351KB
MD5d5da199f347452c5904bff9332a08f84
SHA1b5fb8c22708a7e3130684f1a9923b6dab10c3ae5
SHA256fe58cc4f62fc31e32c1fb9a0893a5483391ab6a91b1c92ed4a5e3103a962da7a
SHA5129fddeb376bececc51dec997b3ed1e22821340fa172636f641af774dae8bc9b5c0780757380bf3fa8df0f9682a555ede81c449ae9468f63215c17123d13ee9f35
-
Filesize
344KB
MD5bbae0915edec081b04bb903b689bc40b
SHA16a0fc635ce1c431e512b8b3b8448176aa4025556
SHA256d565c6c95dad89d3f2b7210de4ec3fc437633de4dcfc994fde0704b92bb53ff8
SHA512573a9fe43213829a6a4b39e67be25bc330b417750ea6d66e26163de7a80c29f6f5deeb841d9ff8303595943a81fc01ab668aab02a5cac4eda078ed06120138b4
-
Filesize
356KB
MD59f547a24e2840d77339ca20625125b4c
SHA123366411b334f990a0328a032b80b2667fda2fcd
SHA25655413d5eddb3300e0ae0fa5d79d26fdf1e5a12922d7018c8054b1faa9d660301
SHA51234da7a0b58ee3904d00cf02d16d5a3ef508fb708d7c0a887286fc32cd6145b2bd857d317c784d1d1b17662041eadcf7e225908980eb93f2b81161d845c0bb67f
-
Filesize
396KB
MD50dc77139d3530695cb4e85b708bc0bf6
SHA16915655afd1e37361c011f5c2113d72c7a0e85bc
SHA25653b59486361b11512fb90f15065104b15ee2322bb7804f859cde2f2ecf9581fb
SHA512ee1ca1d99ac279df4cc0e532aef2fc531061736b636a84310bdbd627e0f2435eac1a386ebb19aa901b6eae3929bda1c5da4f41b73a25a1b20137522e34547600
-
Filesize
374KB
MD5a064cb9d7cf18936600e9ccc03297006
SHA1eb436a0c584ba91acb05dfccde139afbe26fe9f4
SHA256c9ec3822044365457b8736348cf95a8e39bdfe3ed36267449bf3ed739accef2e
SHA51295af684abf9d24cfc4d0668a02da1e2e69f5e671d671d8cdfadc22ec991908c6aa5663fe1fa88ca8e85c0508f409fa6c2bbc174c53674270f2b188018d358415
-
Filesize
376KB
MD53f367760b57a5e4360dabcd4a650bc5f
SHA18d7cd6b0eb42361ee862455ecfa475d28f5aa934
SHA256c89170385b3afb2ec89fbd61b8470ac718713c7296441c8430f173dac218e74b
SHA5123dc30780d57dee91215a716dc6b4cb432838aa0161af4371f49f70db2076bd155b170fd2c1617f59e1b572144a2e150a34143eda82d9f2227d24d2281d5aba60
-
Filesize
387KB
MD5745a9b8c6422682f2cfa5561cc1f4022
SHA131e3616ef09f9b1fd1c41cf8f43e504a6f90276f
SHA2567247470057a936d03bfa2a8776508ab66aa1040c41a4eb8f79c1e93551c74bb8
SHA5128e0b7f98cb842a862ceca65e0166462275feed26c32c9c299aba9986d36b716a90d4a8db5ccef355ac266b7e969071014cc7ab6439778e77c52754bc23b4c575
-
Filesize
634KB
MD55cc0f54e022a9996773dbd64906d5580
SHA187c103bd69724579b478f904235e03caf61d5d79
SHA256b4223b56ec88235819a427d60bb937eb3984076523f02a018f57819e0429bea9
SHA512b3365fedcba50643cecf1a70297e1e67990d63ae05caa87de01a70ef6f28e0f73a9a0edb0ff80b4138c624e51aa2dac065a2d40877fc92137714ae07734c2f4a
-
Filesize
399KB
MD572946b939f7bcaa98ab314cfba634e0b
SHA171c79a61712c8c5d3dac07a65d4c727e3b80ab17
SHA25675f179897cad221ca6e36b47f53cead7f3fb4159ee196f1d10a5181b84e1b5b7
SHA5122a8fa7108c58f4cb263900a555714d5638d961d14d9f4ddf8a9ab5b880afdbc5d2325fed1e158dbaf42a9cd20e8e372e6a8f52fce842a6940ea52e43e4a1f1e5
-
Filesize
385KB
MD54ad22c6c64dbe0fc432afaa28090c4d9
SHA119eb65ae52a585dbd9c25c32f22b099020c43091
SHA2566002c129a56558832e9bd260c427c0bd2e1566e0aea3ad999f89c8e479534f9b
SHA51294f9d34e76560059ef80fc04be4d54e52a7d934dd28747db7f0f6684243b841087245699a471a55d667623d2ce5e597a3d2c6bc37cfd7ebd2f5b8fb40e6207e7
-
Filesize
595KB
MD5fca817ed4b839b976ebcbf59cac66d68
SHA1413efa65470319999032b6a25b3b2ee33b8cd047
SHA256524acc64e70918a77cda43fd9b27a727645b28ad2d4cce16b327105101c8bbeb
SHA512cb246d5c5cea30d6e7514841ab93803984cda37461a09b6c340ca64f7cbce4e1212951a4de421d928d433a619dac18454fb403b42581757b76c7eb124ce70cf2
-
Filesize
347KB
MD55130a033016b45ae2c3363edb3df7324
SHA19f696d78b1b9efec180dc89ee0defc3ba23e6677
SHA2563420a1fbcca5bf8c2d65d6dcb0db78b03f95f7f2fc56479a0de6e3312333ce6f
SHA512401b71360dcacf3b1fdc411c92195051370db110863cbed37143263e7804cb24b75ff1908ee39ee848c28776df00d6edd8cc748acf3725668af7815929e8066b
-
Filesize
365KB
MD59632dd7d883fa4deb3963ea663e0ffd4
SHA10db135be4b3a7c54c39e9df5034d5576b68ea92e
SHA256690027c4a31c4aea00b7d1b32ec6cd3fa50b1eac412ae273ab15e72eb485dd6e
SHA5123aac1857784dfecd2ae5f7c4056f58e27a966a6cb949e02eaba56fc1fc283243ed6213f17628d62d435e33fa4771eb43623f25da6510aa4ce6f2149f72ab0d37
-
Filesize
936KB
MD5f100566697a96ce1f0a0c7e0bbfbe36d
SHA14c80a4930ba7d174c4203c199492463242bddf62
SHA2567e818deedd50a533851bbf08e056bf2ad8d45f442a1a61d9b48e66804ea848db
SHA512dfa6132a5b7e819e8d326bf5ee539d9ecb2dcd7fea429c75afec2291df9eeead6fa347b01f9feaf2235bce627fd39116176195f7a3d7d74de28951f939db1645
-
Filesize
869KB
MD5b1b6a9e3a04be79080ebbfacc1a0eb2d
SHA1a5c8eb6a930062f6021d073d5f74ae146dc7fbc8
SHA256d839531c4ff4a2885c993e0d358f78667215b0950c77a06ef01a6acff9221c5b
SHA512bf0b163c8fc3988bfeb3cbb4b981596ce5afdf7e40149622fc3b60994e7d8efa5bb24c830036d168a6638feca48b8755aefa8640faae37055cae8fffb6a85568
-
Filesize
371KB
MD546f9b2a35efdf1120a8a946e4f1d0115
SHA1af7bec1fba32d912b50288a7d988440627e4ee85
SHA256b22fc7b75c52cc142f201d5cf107d17c1b173a494a6add022127f559fb46bcb0
SHA512cd67f9c328408a8295f224aec190c7c411a868755fc5c9e90b4985b3c41a05d6d34dd30d4a3866f6c24e1d640f4c324bfba8c7ab806a6b216151cf0a504a03d7
-
Filesize
634KB
MD53b2a976a25dca963e91df3695c502d8c
SHA1ce7ae51211f512c3723bb43ea0de9e6debb70597
SHA25628ea88f19b2c34699d535ca0c691449b7e4001c12e8aed8d04b2078916e88a37
SHA512ba41ee074239afdf8f194b4ccb33060fa9655e3ccdac6a16090959d3214f8db15396b3e038d7de26c478fdd003472f680d2b6ac9a92acaf6ebf8aa258747ecc6
-
Filesize
552KB
MD5ba86f1f13fdc37a2c48c1da34c84f4c4
SHA12f1578d0eee76e60effb63967712b15c0d56829e
SHA2564c7affdcc324cd791d10e235da809ce7501e8005be64340b6e8bf5595647a707
SHA512fb2fe1548574da860bf27408a4f29d781fcefc300f744f4214843f343e343ad8bae29cb7047f87f5c3277641f561c6a30e5bc9d6490afbefc7af36974305a688
-
Filesize
439KB
MD5065179c466c5b7457e249f11d152b99f
SHA1cfc05e9dfb91b2af2944aed4718fa05b43844914
SHA256b75694e390bd2e20780b3bc72f6e1473ba45d7537c27642a7d888dfd3bb6c3bb
SHA512fb598391a028b7d3c7e25cae21ccfde655e6f871e498767a54f7cf0d5d4e48207213cd2598ca88e4f46c303cd2d8175238a5a5b720ab37beec1873d681165a8d
-
Filesize
319KB
MD52febe4ef32e1a3884089908f402ad62f
SHA1e65c54adc127b78494dd6189cca71f1c7bd2a5b0
SHA256a7ac9fda6f4cd189b75fdadc4b70cd0d369a09b66eaeb5d032678cb97ffc98f6
SHA5128e8b030af4c952c32ec277850d5573414630ff5196eaed52820f44e9c5bd03ab6f71a8add19215b0456eed859be0d5a6f28d48e12f1677d39842f35feffd5e57
-
Filesize
316KB
MD502e9e0bc5c30ca60a869ea761fb662eb
SHA1c5200f692544b681af8757627da430aeea4283ee
SHA256c5061ec00bd969f76f3c0c6ff15ddacafed7491260bd8ced78118691ba57bdff
SHA51207b5f401f89dfc36499a3e74318b471d9b2e795dc363dfd5a9394089d4783a4b51fd78e2092701b6974f1c51020f3b5f81171ce21690f8547ff3c8f3d54ce781
-
Filesize
5.1MB
MD5fb620332959ee6e46ac1c2a2f0e1b2d1
SHA1eb18c735d187647c3c529932b8b80d9c9af09286
SHA25666153f7b388503a9bab9df1fa157d3af88548bee264525694bca9a61ce3495e7
SHA5121e5bfcac24a76ca8fae7b7fa5407f4eafeecfcda54726d66586f1171a7ba30cf76544d75aa44f1eb64b202e686ccd2c00c8cc0b24b249fc5c6c28c156cd03775
-
Filesize
172B
MD5d729a1d49bd7106abafb63e5c670c9aa
SHA11c92cffc2f1fb30f2c8281a135a6ad2b68f09b81
SHA256ca4f2f0ef3f3a4d3ffdd5389d16f8562bcc1290d69a6e2245d0de621854b8244
SHA5125ec24113065db1b14341b53079fff79f149bceeb9d850b42b8a2c28c54529430249e406da77650e83bbf20f9289dd4c7541aa434a538d5cb12d0821df77e8794
-
Filesize
60.0MB
MD5774ff4d0ac7a0ded5523f80e718164ec
SHA15e9cf197b03584a2f1e22dcf97b5c4a33571b60e
SHA2564135eb4ca7ebea03688ee0946b3e4958a1cec234a9bc296e561fd1701e7a6830
SHA5124cda95b52402660d21c028a91aaa3b708d8648222710187f690d5a601f20b5ef6491be4da455110fdc2531451f4e4a12b07f8cbd386cdf291db7dfe6ec38b8e7
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\LICENSE
Filesize1KB
MD5c2710cd00242ca7d7bef0fc98dbbc7f8
SHA1ba49c34590b171487fd5e383ca28632f551865e5
SHA2569503def7b54ceb6e3cd182fd59bc05d3a30d7eae481e65aaba4b495133c83c14
SHA5121b8fed37b379cfaac4e67e4ae0d0ae1c7e8fdd5178f1e9a289b646c5adb016c68cdcd743266fca87bd37bffc0951e0b9ecba8a57f0600a7dcd5cb52cd783637f
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\bin\sentry-cli
Filesize487B
MD5b7c89ec5dfb8b15555f32a3bef6c3103
SHA1a92048052f5fc0af532cd97ebf82c1a9fbf12342
SHA2567c5c97aaee075241bdc4fbc610b356445747e962ac3d986c5016acefd66a6ea0
SHA512c47baa0e0896684403760a13cfa6dd5826152ec7ae83f783040d186eaca8af70bc97530bbb22b720d7482a4ad18c3959ab1af8ccfe3689b19a51955e777884e8
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\checksums.txt
Filesize814B
MD51dcfcfdd8cce3e3b0fa697af106e4075
SHA1f9261519f777790f7cd50c91e389d0e6589bd92a
SHA2561357dc0a2f6ae355ab59b409c94cf635b7ed849a3bcb60e95b7132cbfd297324
SHA512751ac3545299650e783daf0a45823660ce0b3f6dd7d722d303b9a801b02db61f7bb3a5129f4481294f2201fb5ad4e7bb1b2ab9a2d993ebde8a0d985f08ce34a2
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\js\helper.js
Filesize6KB
MD5c29ad60a23d5406728a51afa4352b4c7
SHA12be817215890f5868717765570ce9f7422735c4e
SHA256faa867204c92db252271c9d850962ae1ff5c9448444ca907af483a6c874a6eb0
SHA512e1784b8bf7119bf3380b192f1597cb3179425ff7ab347b144011fd17b62794760e6e092a0a1dae99302eb6c333f1638440df4e4e0eaf64f26d4f3cc46a74d04a
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\js\index.js
Filesize1KB
MD550c3a734036b84685a15d56217207d67
SHA11893de2684072a3a2961337fa9a9b45a52c52c0a
SHA256171990f108cd5582f83432c1569f2c3e1aebfbfb159599f4ff2ab693c20a8f78
SHA5123aa037d12cee7cbf51826fb3e2aa87b4543dd62f5ff5f2f8915128061c07472304601766bddf949647c5ca92e8ee768a77139bbe91bdfaaae99dea4405168ea9
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\js\logger.js
Filesize253B
MD51d26f69361e75ca5cd2eac5f99249c72
SHA1787d51c708ce15b2c533a180a2bf639648bc40eb
SHA256d7d63601d3347efc93425f4f93049cfb9ed2b9ead1dce662c9c1bed3cba302e0
SHA5127350774074462d33ac9f2e130829306af08a6693fd597f40c39bfb194684f66d965cd23c10de5fc4389e4a2ffe84db727aad23dd683a805ae4825f10026cb040
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\js\releases\index.js
Filesize10KB
MD5e8282413c1895eaff49de6dd9b71ab13
SHA14e058f522a46e20bbd26f15a6922390ec2c1da36
SHA256d6a28994173c1c36476121f8b0e3633e01ecd0589289901fba34fe218293443d
SHA512301d2a6ae958e1ba936cae6f555a587ad87567055f4709d4676a3ef5b1a3112cb338b8a9e744c24cbfa784f00f13a1118ad48fd4f6bb060c5608e4ddc8779389
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\js\releases\options\deploys.js
Filesize368B
MD5f42c24cde0162b93624df51f4e2abfab
SHA1f819638944878ac4cb49438d8599d3fbd9081949
SHA2563f2316e7fb20e82df9a8b08d6169a622a89808742806adee2e4d89885962357d
SHA51267258cbaf9f46f1609cec9b87b7a577f855cde9c8efafa3d835a0d18fb3903fcc4733489bf81447cdf2c0a55701d569a75f11a81865dab8f624b722e76b7c674
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\js\releases\options\uploadSourcemaps.js
Filesize1KB
MD5d060ac623857ad5ca08e3a944768925a
SHA126fe78c92f55f9529ffa2b71da403873da29313f
SHA2568d4bd4c779e177724aa7bf98e768e50ce8b2950ef5bf39fa08033057b400888b
SHA512ae1b42d7e5c5d60f935bcd08417d4d9055d71bfb80653281e990a687353592731a7c4423655fbb988728152846aa56a5f180335d254885338bf6c96ef2a8357a
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\package.json
Filesize1KB
MD549f7deab5d526f6f79d8fd80be29c97e
SHA1e6ef40032a68a979454d30e9a483a1043367a90e
SHA2563fe1b2bd4e7ed12e73c5717dc162f9086a4b349528042c4313610573530c6992
SHA512053d4996c3376aa0fbee16be84d0a7f86b043ee1928dfe81e5b8db1686ac5e42db26b13ecd168a86f7315e8c208549b68f1ee3b64df3c12426eeda73c4efcdbe
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\scripts\build-in-docker.sh
Filesize931B
MD594b0fc212af523b8bfcd6c2aa5a5ab2a
SHA1cc0cb35f7ce729f7affe6b2c463e57966515e476
SHA256abaa92d196f6752f184b83b19aedd9b1e28d328e6817de213f61fbd108351e16
SHA512af0a2174e0304fdaa56ddae249049c142450ad4a0a9c8975548f61aa2bc356837b1d7ed441108156af32c979da5647bd0233a49db700ff0bbf528f9fa2c862e6
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\scripts\bump-version.sh
Filesize567B
MD52ff8e17ece2c70eff9efdb2b1a524555
SHA1d61c93df38f70f2244817c688a140224c9a99af9
SHA256f07b481f34e732e74abe6402023f8b84f61281626ad6e25062a20fa8fd80ece4
SHA5120f847fd2b05bd4627a56b452f065e878005b6307bc101663297afb5f45c24d965ddc48ea4818c34ab35bde06f5a7711cf29fb9182c8ed9cf34e17d6434c487ee
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\scripts\install.js
Filesize9KB
MD51ffedd383c8097dd628411836505787e
SHA1969306e8127b354f35f4c870f2da7b4034d4197b
SHA256df3b6ca3fff442454ffee98e8e4db5e3fe0d82ff19a49216cd238fa9282cb30a
SHA5121392958e5a9c2e0c6df617c48547f5fdae32960bfb55953528ee345e06e1ae191ca4001a618233adeab27e16de5ecd203c405e8b4fa7f3a739cd3d2c4a1e9ed2
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\scripts\test-vercel-nft.js
Filesize586B
MD5c63a1659a645a5095524923081813d51
SHA11d97d7ccb0804b7a15f0593c87990ab0da4b6887
SHA256644476fd66a507adc49582e7371c87e4cacc3c7840c23fe920da2a09f05db08a
SHA512ae452613a1dc728428ed2e596d7fbb041e00a8aa300aaada289fd454f71267569fa548fa7c7217134572decab12e56f4aadd4853c96ef705ccba2dcb377018cb
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\scripts\wheels
Filesize5KB
MD56fec563925ecab8b6a98c3f38655236d
SHA19ad08eb80167574de6373d871cfff5511d2554cf
SHA2566fa0613c1edb0c6b26baac0b759bf756f389a11e0ec0e64904cffb26ef8dc016
SHA512850a5285519965fe26ab0da2ae62d380648acb723d879e2ab770124e4146ce0a6d03f089e28af20604dd3e00913169f82ac568a1741014e0bc5ee7b2c583888d
-
C:\Users\Admin\AppData\Local\Temp\nsm98E5.tmp\7z-out\resources\app.asar.unpacked\node_modules\@sentry\cli\sentry-cli.exe
Filesize10.4MB
MD54c1bbccaec3f88e00c176e49b3ea9742
SHA1eea00e776e5979ae8e650ee9ddf3d4d4e93ff2ef
SHA256299e9f3632bd8278384e60f7384279ccb394ca532515448f44e089a3fb119f1c
SHA5123c82f9f06be9bdbdb6fc94709d6c582641b2bd1ba1987c0b42a8d5c653fc32c006873c8f236b45c62970b3abe6a8b5f9faa1a57c0c85d52fdc94ecf1bd21abd6
-
Filesize
105KB
MD5792b92c8ad13c46f27c7ced0810694df
SHA1d8d449b92de20a57df722df46435ba4553ecc802
SHA2569b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37
SHA5126c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40
-
Filesize
168KB
MD5b82ff216a0babf602940759b9a3af870
SHA107e8a22dcf8d7be04a6ddbcab3098e040494bb0e
SHA256943b27009d41801c5a649caf680e32d4dd25de002787a4ccd86b0925b3aac3a5
SHA512da157570afbab7be135f7749df7f4518df1452ea24f98d8f5189430e732ad06ed438afc701cb70451bbc7137b5f35a0c5957df92ecb40d47d54c1071ea79fba1
-
Filesize
471KB
MD5031ea03da08fe1247280cfe781658791
SHA1e91db50ad16b5a5fbbaf4118672d60b347ea6161
SHA256c16dcec41919a6d2850214f2275824be8a97d8c5e694e2ec8dd7d16ab2d5015c
SHA512b3d6f282761f8ab8760728ecb108f64741f6f3cd2a143813042ff63a3b6604fcfe7c1feabafb65f9f67906217edb5851f44605a34f7a50ed2058c25ce5efb30a
-
Filesize
4.9MB
MD5804f1e0bacb8621541c8b18d098e4a51
SHA119432252cd892be774f6a0d5bba90ab2e18b51b6
SHA256b8ac7a8b0d32ca5ad133dcc25a4128f8f379403e4700d2a2e988441bd50a2949
SHA51251375fe442120fe6747a395c5bf26ff6ab82628823fff5f80a5e4cac0cc44676427722736ad82d2b13be57f47dcf9af3684dcbbf4be0bd2428691c3ac3ab6700
-
Filesize
106B
MD58642dd3a87e2de6e991fae08458e302b
SHA19c06735c31cec00600fd763a92f8112d085bd12a
SHA25632d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9
SHA512f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f
-
Filesize
894KB
MD5f8e139bd2e17aa89ba7974490d9eff16
SHA1c47ed79376fef9205f9678cb314158cd85874104
SHA256757393d275a3ba855e44973b6e31730492ce72598f3e1a5c15c577334cc5d8b1
SHA51236610001fd4fcd6d3be7712ee6229e8fc85dc7ae155ebab005318db8f3ec7b1a1952c0c0f353e2b55c993f86ce03a5ffd93b5d3c76a3ea6f2970cba58e6b22ab
-
Filesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
844B
MD565f0792960d51209210a3c2fb2584885
SHA1ac3d87363151bb21caaff6f93114b68ef23f4078
SHA25661d3dfce05c4930aa0b7f887fea33f5c8745d0223760816280204e0aba11774b
SHA5126452edc67cf0365880c4aac6397cd68a187f1f4e13bf138b98e2a79fcb3112f95b5af224ecfa0e4dcfbf931bf42cb27fc0ba595c75f0cfe499820d0ab29f8c0a
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
371B
MD5af8bef00109193883d8de70dadf99faa
SHA194ffde96d7a521163efc9f9ff1d279f569586c64
SHA25607f4129644881dd616ad33dabae18fbb4aa1ab8b1ac7d3863ef5cb17e4cf04c8
SHA512107eebeb3f6b37551b54d03ca4ae91a9a651f1bbe294c759fd3f4f2cbe39bc73f6876971bfbaa7ae88235b0d6d75be5e662ce9b3f7fd230c745e2c321594bd84
-
Filesize
371B
MD5912b14abb1c08439acf2d62796e599ac
SHA169d83233b0b52d830c4b8ee1a1f33e8308546d51
SHA256718af0610808267ccbff475cd3fd95ed62258c0deb8659aa413dd3b520421f34
SHA512478ef1398e8d284269f460cc194b75d54b288f6b4289228cee64b65a301ac4efe332311d2e0788ba00a1f97a567dd380128a7468eeeea42302ddd9d2c506b02a
-
Filesize
81.3MB
MD509205ac0c47b54d124acb7c53cf9fcd5
SHA1f737e8d243ff3691f807a7ff51080a76a39aac8d
SHA256f3be685607271c36836e02aa2596cd98bbc611c62298f7d1721bfd119404d453
SHA51237c572928511033b848fae09eb434fd6310e50ba3c5e406161dd8c5432cf2228f6942f46c7db166d35a03436be554feec261cd6108dc35286bf1bd8ef41cbd04
-
Filesize
4.6MB
MD58b711f2896e3b299a098571d94084119
SHA19cae797a9735100dd7b00bef26a6c48c6fe7dbb9
SHA25650782c8a8ffa9ee7af10f432e01a03afe9dec4b7f6c8bc8af3cb29504b30fca2
SHA51298455ae830e592aab8d038cbcc0ae21492f3c0f359305d3ddd4d9cdc2baf371bc72388a5019bc762b4d409f33f74838189a8f1b136498fcde60184feae49ab14
-
Filesize
252KB
MD59b652f6adccdd5bd8d3f7dde93e3b585
SHA197c5dd28348ca3105690088cfe44bc47e44bd1d3
SHA256d0e957a8d2e2bfee49ef455215886403534137cfa1633658357a6455949e81f5
SHA5121ad95b5f1b5190969c8d72deac8852e1e809b84a70b203b467b03a5f63238c2207c864b6cb4a56c002fd7003317e6e8d5e4bb664632d608cdc60c9fe8da49c17
-
Filesize
9KB
MD517309e33b596ba3a5693b4d3e85cf8d7
SHA17d361836cf53df42021c7f2b148aec9458818c01
SHA256996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93
SHA5121abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298
-
Filesize
100KB
MD5c6a6e03f77c313b267498515488c5740
SHA13d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA5129870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
424KB
MD580e44ce4895304c6a3a831310fbf8cd0
SHA136bd49ae21c460be5753a904b4501f1abca53508
SHA256b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df