Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
01/05/2024, 10:14
240501-l945gsef62 1001/05/2024, 10:10
240501-l7lv5acd8z 1001/05/2024, 10:06
240501-l5drqscd4z 10Analysis
-
max time kernel
281s -
max time network
283s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe
-
Size
4.2MB
-
MD5
0b84369c3ae7ea35924c82465ae768c8
-
SHA1
9a263fe01ce2d94a7054905323f596ef8cd6047b
-
SHA256
06d60d2e4f630514526ac63ab10360a1405899f4dac32888d231f5fcf9abb2d1
-
SHA512
fbc19f8fbddffd0806e41d0b33b93cfaded708687d9d514543ce8302eb351222df4c6ff90df9a52e4371aa4ba3fb272672c850b92ecb0179f5618d7e01f5c6bc
-
SSDEEP
6144:UfqGzAH5bdSZRg4WR223vZezQDP9RB49qRqe90hfduo+Ppt:U9kHXsRO2auufi6qNi
Malware Config
Extracted
qakbot
325.14
tr01
1596554163
94.59.241.189:2222
86.98.66.175:2222
94.96.84.73:993
71.83.16.211:443
24.110.96.149:443
78.96.199.79:443
216.201.162.158:443
68.60.221.169:465
95.76.109.181:443
189.231.175.46:443
70.164.37.205:995
108.27.217.44:443
71.220.191.200:443
92.59.35.196:2222
71.192.44.92:443
108.30.125.94:443
93.151.180.170:61202
189.130.26.216:443
47.146.32.175:443
24.71.28.247:443
12.5.37.3:995
79.113.219.10:443
70.126.76.75:443
78.100.192.173:443
199.247.22.145:443
5.193.178.241:2078
144.202.48.107:443
90.175.88.99:2222
81.133.234.36:2222
151.73.120.201:443
166.62.180.194:2078
201.216.216.245:443
103.238.231.40:443
187.205.235.21:443
189.210.114.157:443
68.116.193.239:443
84.117.176.32:443
151.52.157.19:443
188.26.243.186:443
108.45.89.47:443
179.14.167.91:443
189.223.67.126:443
94.96.84.73:21
75.170.94.218:443
174.80.7.235:443
68.134.181.98:443
86.120.237.47:2222
51.9.198.243:2222
94.96.84.73:20
172.87.134.226:443
189.150.106.26:995
188.15.173.34:995
24.204.155.208:443
63.155.9.141:995
96.20.108.17:2222
187.192.233.135:995
115.21.224.117:443
98.4.227.199:443
5.15.54.233:443
217.165.112.13:995
207.255.161.8:993
86.126.206.141:443
188.25.192.41:443
78.97.207.104:443
189.140.64.53:443
209.182.122.217:443
173.173.72.199:443
35.134.202.234:443
134.0.196.46:995
75.136.40.155:443
70.95.118.217:443
67.6.62.74:443
186.28.178.94:443
98.173.34.212:995
173.22.120.11:2222
108.46.145.30:443
108.35.135.148:443
94.96.84.73:443
86.97.9.224:443
67.11.43.93:443
154.56.71.174:443
24.99.180.247:443
65.48.219.163:443
69.47.26.41:443
188.27.27.107:443
67.247.254.82:443
172.78.82.95:443
72.204.242.138:6881
199.247.16.80:443
80.240.26.178:443
76.187.12.181:443
5.13.102.138:995
86.153.98.2:2222
208.93.202.49:443
96.35.170.82:2078
2.51.240.61:995
67.165.206.193:993
5.15.84.129:443
67.8.103.21:443
151.205.102.42:443
96.232.203.15:443
72.240.200.181:2222
70.123.92.175:2222
73.228.1.246:443
75.111.145.5:995
24.231.54.185:2222
98.115.243.237:443
96.234.20.230:443
96.255.188.58:443
174.82.131.155:995
90.68.84.121:2222
73.227.232.166:443
71.182.142.63:443
109.92.251.113:995
24.139.132.70:443
130.25.130.19:2222
35.143.248.234:443
190.204.24.148:2078
45.32.155.12:443
173.163.115.89:2078
207.246.75.201:443
35.209.218.146:443
45.32.154.10:443
217.162.149.212:443
72.142.106.198:995
75.137.47.174:443
83.110.92.29:443
36.226.77.179:443
5.107.157.123:2222
176.205.255.97:443
213.120.109.73:2222
41.97.200.95:443
2.88.50.153:995
173.44.112.112:443
200.38.254.177:443
24.229.150.54:995
71.10.43.79:443
72.82.15.220:443
99.231.221.117:443
47.44.217.98:443
186.6.197.11:443
217.165.164.57:2222
71.88.104.107:443
68.204.164.222:443
73.104.218.229:0
173.245.152.231:443
24.203.36.180:2222
86.98.89.132:2222
24.28.183.107:995
Extracted
stealc
Extracted
vidar
9.3
03cea2609023d13f145ac6c5dc897112
https://steamcommunity.com/profiles/76561199680449169
https://t.me/r1g1o
-
profile_id_v2
03cea2609023d13f145ac6c5dc897112
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 OPR/101.0.0.0
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/2208-430-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2208-434-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2208-433-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 1840 c1a01b10b2b9dad03d7e7e37e8e2f3b5028ac1a3f13f7bf574671c661a4e719a.exe 1160 c1a01b10b2b9dad03d7e7e37e8e2f3b5028ac1a3f13f7bf574671c661a4e719a.exe 4860 c1a01b10b2b9dad03d7e7e37e8e2f3b5028ac1a3f13f7bf574671c661a4e719a.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1840 set thread context of 2208 1840 c1a01b10b2b9dad03d7e7e37e8e2f3b5028ac1a3f13f7bf574671c661a4e719a.exe 123 PID 1160 set thread context of 676 1160 c1a01b10b2b9dad03d7e7e37e8e2f3b5028ac1a3f13f7bf574671c661a4e719a.exe 130 PID 4860 set thread context of 4872 4860 c1a01b10b2b9dad03d7e7e37e8e2f3b5028ac1a3f13f7bf574671c661a4e719a.exe 132 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4956 2208 WerFault.exe 123 2444 676 WerFault.exe 130 4000 4872 WerFault.exe 132 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133590321586926206" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings chrome.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 32 PING.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 236 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 236 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 3696 chrome.exe 3696 chrome.exe 2164 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 2164 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 2164 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 2164 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 4872 chrome.exe 4872 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 1128 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 236 wrote to memory of 2164 236 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 91 PID 236 wrote to memory of 2164 236 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 91 PID 236 wrote to memory of 2164 236 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 91 PID 3696 wrote to memory of 4764 3696 chrome.exe 97 PID 3696 wrote to memory of 4764 3696 chrome.exe 97 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 4344 3696 chrome.exe 98 PID 3696 wrote to memory of 3172 3696 chrome.exe 99 PID 3696 wrote to memory of 3172 3696 chrome.exe 99 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100 PID 3696 wrote to memory of 1332 3696 chrome.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe /C2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe"2⤵PID:5008
-
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- Runs ping.exe
PID:32
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3528
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd6e36ab58,0x7ffd6e36ab68,0x7ffd6e36ab782⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:22⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2136 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:82⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:12⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4384 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4572 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:82⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4576 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:82⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:82⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:82⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4716 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4936 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:12⤵PID:240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4904 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:12⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1572 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:12⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5892 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:82⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6100 --field-trial-handle=2092,i,7024588551659307808,1473489864547977561,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2188
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap12214:190:7zEvent253181⤵
- Suspicious use of FindShellTrayWindow
PID:1128
-
C:\Users\Admin\Downloads\c1a01b10b2b9dad03d7e7e37e8e2f3b5028ac1a3f13f7bf574671c661a4e719a.exe"C:\Users\Admin\Downloads\c1a01b10b2b9dad03d7e7e37e8e2f3b5028ac1a3f13f7bf574671c661a4e719a.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 21883⤵
- Program crash
PID:4956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2208 -ip 22081⤵PID:700
-
C:\Users\Admin\Downloads\c1a01b10b2b9dad03d7e7e37e8e2f3b5028ac1a3f13f7bf574671c661a4e719a.exe"C:\Users\Admin\Downloads\c1a01b10b2b9dad03d7e7e37e8e2f3b5028ac1a3f13f7bf574671c661a4e719a.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2152
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 21283⤵
- Program crash
PID:2444
-
-
-
C:\Users\Admin\Downloads\c1a01b10b2b9dad03d7e7e37e8e2f3b5028ac1a3f13f7bf574671c661a4e719a.exe"C:\Users\Admin\Downloads\c1a01b10b2b9dad03d7e7e37e8e2f3b5028ac1a3f13f7bf574671c661a4e719a.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 21363⤵
- Program crash
PID:4000
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 676 -ip 6761⤵PID:1184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4872 -ip 48721⤵PID:1580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize471B
MD5139e586a854e814fa5f3b8b88c8113a6
SHA12e1a1eb54e2d6675451654badfaf9a8170c63416
SHA2568ac3ff9c94df2b0837ee7877dd0114c95ba512db9975b71e021028673adc52b2
SHA512ea954a493799298603396e909f0ccfea69d14730520d7a76255e957f08b446ac32fcab7d8c9a43de341cf63a3e33ef5a4575622082876cbaa4822b3462887f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize400B
MD5f423c8050278deccd85bf2b2a87e31e7
SHA1354f4229a9e6d379f87ea69afa7680c422aa1578
SHA2566a87704bffa0d2c0fdbfeb06e417eb90584c99389fd56d52fd4f1ed5aafe82bf
SHA512a6cf9074b388a52289a1d57c6c12ec8248afcdf1dbf5b4312304bef07997914f58b11a92d34c69b47efbd4e37039a32fb9e96afabc077a4ee8733ca8957bced7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\86d7f19c-1d79-49da-9362-1de9d3e45793.tmp
Filesize6KB
MD5150408486c1064609bdbee4dd0e5c8a4
SHA16cefb6c983ca074a52b3afddc722a010eeac4697
SHA256d2f6fb439ab8bde17c294ded5efae8d920d301d58c2417c50c8e1d5a30e183a2
SHA5121ca39879d804b2d713adf00f4bcc796647bc19dd9de0d13dc9e8aaf3eaa0fddf6c7e26ef6bb1a9210b1aa5b5d3e9c98a9ab9b04c597c570dc9cfaeab0aa63d06
-
Filesize
91KB
MD51770dc7278bb85d0225b07ee97350743
SHA11758d49be9a71a975843ffc65df29cec010ec16d
SHA256fde8ba48b761bcac55caf7f988543fa7f3898bf41c08dc9e2ae642d7656f932c
SHA512bdcbc271004ccfa288ddce2a06e56958289cfa27aa35f932b4685f24d62fd291bdc32c8d63510b22ac0f82131b7b22bb64a6381e1e983838b810871da1516baa
-
Filesize
200KB
MD5a484f2f3418f65b8214cbcd3e4a31057
SHA15c002c51b67db40f88b6895a5d5caa67608a65ce
SHA25679cbe928773386d07f0127f256f383debed5ccea5ff230465bf46ec7c87319d6
SHA5120be1bb8db08f6e6041a85cfee90cd36a5b595afbca34d52a125465454fc806b4bb7ae569eaf4c882922fb1b962b6060534e597791cd0ad23483be5981d9be85c
-
Filesize
259B
MD58fd5e84947a44b056c5c0117c42470d7
SHA1ca323f8e3e299ba31d391e062544373ed12a6532
SHA2568da37179922e07609bbdb32cd12b0e3c1f4c7838a46298a942dcda76bd0bb755
SHA5126407ed98b899034c85e41085313dc113395c8c88327a979572c949abff175f087ca8efe635b8b2a10811b21c415e6c8184b1f07498f4fe36a20e20ce56f7128c
-
Filesize
402KB
MD5aa8fa42f3cc3fbc62d37093fa44be4ca
SHA172d91f9d13f00c1bd73cbdfb016e2e33b0b7e840
SHA256cb040b274395f16d76a8af1d5334ac12e5cdf50b68dbf7791db88cc788db6dbf
SHA5121a6bc2238adfa3c3d207b9a28bc5f653578b4bfc67abbcb09ef630b4df612e29b9124bdc2afa04e39a9dea39b464a2f4065166cf307a8445ed238965a37aaeb7
-
Filesize
576B
MD5183ae7bada89a26791483eb8f2d0c532
SHA1e53dacdea8461f151d7580459b79cbf2e673f3ee
SHA256131e91b16759205a77912e96005f1b49794c1849ae7f604ae8a339edfcea328d
SHA512642bf43d1679ffa97000534f189d61f9932c532f9b349382091dfd9b7e9770b2856ebed282cdb57ed031b08d2ac4717e51d645d05638943d8b41b4126622c315
-
Filesize
1KB
MD5a2d0ed1624177174064242e7801c9b67
SHA1e6a6ede949bef3e5a7625e17feaa5be6d98f0e9f
SHA25684313a114e782e26b6dd81753a655104182e4f4f6c64ce19488fc33a55528d98
SHA5125e1f4a4a5dff90dcf07b13dcfb5002871e66bfb8f82b952744421fcec3c54ea91a43bb9984caf284ebc3ab88de3835fac67e3e77a9f053ffcdae910dff0634ee
-
Filesize
3KB
MD570e4286757403796d062f5a8675496cd
SHA180cba6fe1232058a0d518cbe4b186975b255c0f0
SHA256d7c6de4048d75423c9931c331af061d1b54533e9b35c9beb03fcdbea8af7104a
SHA512728c55d1011f5eed0c84fa2e427615fc886900a6badd934ddf22d6a9fac254c5715b4ef43febf12163a8811a6d3766c8b10d9e6c149cd6b75e68cc96c0cf4917
-
Filesize
3KB
MD5155fc78b399b4b51a6f7b5df14803103
SHA185ba8ae06fbdebb201abcd29a1ef6934ec5eeb70
SHA25684134372daedd018cd2b1728b2ffafd96d6a5416efe3bbad3f801e82b2e4e281
SHA512bdee8c90e3155fa69f17299af664e3b36e7370daf826f7e619a9c5427c6768d1ec1f63b5d3530790948f7feb4cec9ee45317246c3d1404dac92d66f1e0d0a97c
-
Filesize
3KB
MD594426b5fba8ca5dd18dda799690e1a2e
SHA1e63b3929546f1005bee4258d22e69f4135d3f709
SHA256f5935a7605c36a1353ed88dc9874693ebfa782ee48556346849add6020fff39e
SHA51248253b5c93c171d018970d7addbfce3a50e6ae842476005e4614631b2ca94ba7f3ec99be612246a8e70c1dec5cf94662462c0979e320535c72a324838a60e2a7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
852B
MD525e48da77a97e7c001e0a24f97bc7fad
SHA1999ceeaab120391276d82c6a32dfaf59db0333b4
SHA2561734eca7ff56048dee09b7bf2689018e213fefebc406df1e4351d438ec6837ff
SHA512121c5759b630f808b69facbbdf1548055c2cf447f50e2530caa0e49628cf2587780a711d2c813545cf15a7a647be0baf7501c37eb37e5e0f6920cfc8afe007d0
-
Filesize
520B
MD5f3ebeb066dd159a3ee2174f3da3044d9
SHA1aa1267b70f7bed6fe6e7e08adda43be2738bc4ec
SHA2568692e5735bdb3668809a0a30c1befcaa2e3ad075a7b551e59f774d22150a6e8e
SHA512f2521196c61a3a474ae7555d53da75c1a9d8fb2083fb0bbf98cbba83683700f0612231ef8eeb9b0e2eb9256ea747e0da29249390a760a950acd4c4919841f50e
-
Filesize
520B
MD5ca090a3cc935433563d15c0e045b16cc
SHA183d380830f21d31c008ccb27e4a97fdaa21128a6
SHA256397d31d006be5f5882ff4bd4e4b0ac789773aa2542e4215db66654136d3c5c9e
SHA5123c248d2e6020e634058d6f99227e4ed331adaae236929018341d7a51c4bf6dff767793996cd21a3a53a6db5cf6aab7052cbe140159ca0cf71515e560ccb3dd38
-
Filesize
850B
MD543c767c3bdaf007a7829d20543adec65
SHA1bd0089cac4116a6498e0b8102d192df1b53774ac
SHA25677fc0b6abe944f6f3443e5f66c384a2e480c46b10e807d8da0fb15eade1cee39
SHA512443cb4a252e53c3ab81cf8387f9da890ffbf4e1da8d4fa8fdbfb5d7b10436c1212f8e7b73db5e721ace379be819ea75a882da89fb41b4b52498d790148dd8991
-
Filesize
520B
MD50013d9a8a0b9dd999ab0f2377ca5c5c7
SHA13089f66fd5baf97c937cddd98d296ae59d7b3d32
SHA2565eed0054e0d9d70ae965ce40ffd6179fca2e86ca114c92c2bc42ce4c81a95f57
SHA51265c4fa69a48f2a342a9f6341bbf35a4f741c42d38601bb6a330a1e66bfc024f1b1e40523fc4579b049ec803ba00d830efa155bd297dea8cd925f1ce305069311
-
Filesize
850B
MD5e33ed33c35c9a04b4d6b657bb4b62b85
SHA193b95bcd108c5f1d3bf07c80fa22dd5a8504da8f
SHA256cd6547a78899921479ebc362868d89c7ba5b575bf7f5d006559d9cadfcf75474
SHA51282f0b26fbd14d124256ea7ff1ab76f4898dda7283c6a359e96a4a125a26a131facab3f99045ad02abaff00abcd87f953c0effc95c94b331ab288a9efb75adc95
-
Filesize
850B
MD5b1bf1a11c9790e02b113afa87de2702d
SHA12a83fb14ca357f26575c341fd571cfacc7e7bdc7
SHA256dd2d645ed088b897fe2c7691ac2f73a4242c72f5edc3f3e837cba58c6d3d287f
SHA512f25a2d6a801424f495ea4e253c19f05613f827bb9b325cbe125dc9e5138e98262901fd5694f57eadf97fb80f89546551974eacb31cf1ba6ec3503bc7df22b155
-
Filesize
850B
MD5dc050704c77f2466d959a080b5a3880d
SHA1d03bc669b5a5cd2b006374563755320c0a8eb2db
SHA256d91427ef0994fbe758301300cb6ba562ffc8a7665296a6374c2a8e5197cb75fb
SHA51254add2a855760ba057325cab1c08c4b6b247dac8bce1dc261ae4ef63cdbbc0ed60c56cc22aa89baecaaa111938c05eb7380b0c8b303c208e1a26107a8b0af016
-
Filesize
7KB
MD5e8a3cb5acf27c3079072ccc11ba814aa
SHA1cfd5c895763287d0b9ac8052f502710b65e00d3b
SHA256f9e51199c73445f7d0903da817beb09c05be17a3710370049d6180ff1d703c9a
SHA5122874219c2b5cd2dbcfa43a107ecf1c2ad2ed49b43e4af6b25c04df8db05c80ac407f55e3d483b00029ae1df793b47bfa344ffee80e5deb2db9151e9035e569a9
-
Filesize
7KB
MD551bdb43a91d84a0beba51d6c073c9b8a
SHA18fd5fb7431b68535629be3e42b1408c8c5864796
SHA256fc9f5130c8c134807484eae67324b6ae388d9ab92382836acb4a9f9990124f00
SHA51294b253bf4d74dc201411f4bc161d08b453c59217399c91c63f8e2f738dc2dc4dc8e527ac001eefba46a9b8202a6c245f6ee510c7caf66844292a053b28ba6680
-
Filesize
7KB
MD5ab68b0b30bd806d089c2987f5d6eb54c
SHA11bf49a0cd46cf57577b521f3b2caee25b0787f9f
SHA2569857524b747de1ec194bebf3fc8b3b833ba2d8f8892e3c49ac66f869a7d99d29
SHA5123335bfcac16616ebdd1e6a5fd204f8e6f2043afec3094243c84ee099b3bf0ec566a64e50a36e904aee8a2acead0a81e3c87ba08d185c0f34ef55e9b0cd25e32e
-
Filesize
16KB
MD51da65b2a3b84b6ceced5f956d6b89673
SHA12a4c3c89768b31deb5377336c6444d455872cf84
SHA25657b8b15682146a83c75184cd02704c6c84be9ef346624dd81704da701ca16e93
SHA5127bf5cb75060b6ab8402f9e319d81d35adda376cda7230b132d7f122e6c3547c7671bb550bd8dcef05b5adad3b2f3c79ff8aa2528f96d6a6cdae2baeac3993794
-
Filesize
255KB
MD5e0d0d2c37f5927224c61df737ec5e4d5
SHA19528762ce1c59b6b4246c897bb61f35b0d49a734
SHA2564629871c840e17a56ec39191e078a33519f446acc32a1d2c897733a2cd9adb7e
SHA5126213344a330a05e4809da10f77226ba456e07b5970f339113a1a87bc2a4e77f75ee1e8a8c862fd6a50656273b0b562862feb50d6f9ac297a13a086ca1ffe6244
-
Filesize
97KB
MD56f9b453171039f175bf9e86898b47582
SHA16f7ee28f294d0696eeb1bd1b94018ad8f67e6bda
SHA256a243b914df8c7fb7da71472572139f907aba1fede4d93ea86cc7053eb9626a34
SHA512ebaa9f8062d29f6c0c2fa9e54641c630cca8ea2822e2aad238889373b7d817c5dee8f99b93844fe4eb82c3b05e0ebc08b454f684387eab34120c5bae88573757
-
Filesize
89KB
MD5de6085e292db82a440e313b9a140d537
SHA1822b87e9124fc07b53d69839d8b06db613998a40
SHA256a7384dd4e9e2346417f43871a18f5b100b3fa937a63d3ed2e31d748a2e94e18e
SHA5125e1a77135e1c70649adead0201464f7057716617223adde16ef702039ca7743a4db1bdd041e7c8cbb2694837e9a7bf908d03def7b9dd337c305fd4050e6adda3
-
Filesize
33KB
MD50aaaa9fd552e80cf872f683f1cb5e879
SHA1dd6d0ceeee7c4faa71598a4d954e085865565573
SHA2560f05cac309593ad0fc665e70cc3ec89521263b7c916db8c46df28b4da934427d
SHA512b9b04962ddd3a488f541732c0117216d7c94fb142b780cace13ab86abb99301b8ece2d1be6ae2703f71e58b739ea46f518f7663093aa00e9959e5b14a48a1c6e
-
Filesize
33KB
MD5b8b4aa6d66205936f94ad030af66f147
SHA1e3bd74336447a3b238c3d442f2c402bf638f2011
SHA256e7b148c786c519b8814b00280b4fc4f2b168d5a29d9597eb1101fbc013a88984
SHA5123773a15a6ecaa55dab9d727637cb00396d6e665eea9383e517f803274080fc598f414531d8c211e60294c3fe980fe70999f697d3af31e40eadfc0f982236c14d
-
Filesize
354KB
MD55e26f758424a931e10f47df3a5bd657b
SHA1ff652da66f4c6e517f71a6bd12b7d13a4433950e
SHA256c1a01b10b2b9dad03d7e7e37e8e2f3b5028ac1a3f13f7bf574671c661a4e719a
SHA5121f7135903e57df3ff110eaee0700b64ea3d2ce865cbdeb3344c44d8d1fde34058e268f441bd74fc25c0a153c90019d8b1dce783372adb27276eeccac25176292
-
Filesize
277KB
MD549e16961dbc85ff44eac2c71051e32ac
SHA19b04274409c9966eb92f6c5791f4455fcd0bad73
SHA25600b7ef3a058e2751b5ecfb106729457a0e4950dcd6de921a874b305e2cb00a90
SHA512b72f6479d76d3b56e28870b699ef7170567e5d5e7f18d041a61c18eaba9bf45dc9da1ad29e3a27b9334a290f99092375c6f652402c47a2c6dae4422586044a00