Overview
overview
7Static
static
7droidkit-2-3-0.exe
windows11-21h2-x64
4$PLUGINSDI...er.dll
windows11-21h2-x64
3$PLUGINSDI...Vs.dll
windows11-21h2-x64
3$PLUGINSDI...ib.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...up.exe
windows11-21h2-x64
7$PLUGINSDI...00.dll
windows11-21h2-x64
1$PLUGINSDI...00.dll
windows11-21h2-x64
1$PLUGINSDIR/nsDui.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDI...ss.dll
windows11-21h2-x64
3$PLUGINSDI...7z.dll
windows11-21h2-x64
3$PLUGINSDI...ry.dll
windows11-21h2-x64
3$PLUGINSDI...ll.exe
windows11-21h2-x64
4$PLUGINSDI...er.dll
windows11-21h2-x64
3$PLUGINSDI...ib.dll
windows11-21h2-x64
3$PLUGINSDI...el.dll
windows11-21h2-x64
7$PLUGINSDI...tn.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI..._1.dll
windows11-21h2-x64
3$PLUGINSDI..._1.dll
windows11-21h2-x64
1$PLUGINSDI...gs.dll
windows11-21h2-x64
3$PLUGINSDI...ss.dll
windows11-21h2-x64
3$PLUGINSDI...ry.dll
windows11-21h2-x64
3$PLUGINSDIR/un.exe
windows11-21h2-x64
1Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-06-2024 20:00
Behavioral task
behavioral1
Sample
droidkit-2-3-0.exe
Resource
win11-20240426-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/CheckProVs.dll
Resource
win11-20240426-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240426-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/dotNetFx45_Full_setup.exe
Resource
win11-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/msvcp100.dll
Resource
win11-20240426-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/msvcr100.dll
Resource
win11-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDui.dll
Resource
win11-20240426-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win11-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win11-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/registry.dll
Resource
win11-20240419-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/uninstall.exe
Resource
win11-20240426-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win11-20240508-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win11-20240426-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win11-20240508-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/SkinBtn.dll
Resource
win11-20240508-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240426-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/libcrypto-1_1.dll
Resource
win11-20240508-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/libssl-1_1.dll
Resource
win11-20240426-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win11-20240508-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win11-20240426-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/registry.dll
Resource
win11-20240426-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/un.exe
Resource
win11-20240508-en
General
-
Target
droidkit-2-3-0.exe
-
Size
19.5MB
-
MD5
9c5c721c156afbcb80dfc81bf5f136eb
-
SHA1
80e3fe09adc550883eea23e415358ac30591fc8d
-
SHA256
b320de1ddb0c255b9374c5a0496ebdfb2ea9f7789b26278bb5bf6b52ce3df8e0
-
SHA512
7c4f25e2096bd227ff6f82e5bf06f14d847942451ad1674d46dd9c6df0bdcf2e95cdc395e3610aa5f94defe63ef1c1538ffe8e2b6984ebcfdf9413b549d5dce9
-
SSDEEP
393216:rFiVQTXypl8pBja9MnNQLvcjjNUIsBwc6XYbTkrXDTNiDRUGJwPAEWXI:rnTC8pBjMM6CzYUX3NiDRUGJ2YY
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\iMobie\DroidKit\Microsoft.WindowsAPICodePack.Shell.dll droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\resource droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.base\ADDITIONAL_LICENSE_INFO droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.smartcardio\ADDITIONAL_LICENSE_INFO droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\jdk.xml.dom\ADDITIONAL_LICENSE_INFO droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.base\zlib.md droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\jdk.security.auth\LICENSE droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\bin\javaw.exe droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\amd64\ssudeadb.sys droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\resource\backup\x86 droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\img\left_top.png droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\img\mediaCallOut.png droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\conf\security\policy\unlimited\default_local.policy droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\amd64\ssudmdm.sys droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\jdk.scripting.nashorn\ASSEMBLY_EXCEPTION droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\lib\jfr\profile.jfc droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\bin\api-ms-win-crt-convert-l1-1-0.dll droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\bin\java.dll droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\Utilities.dll droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\jdk.management droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\jdk.unsupported droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\CharDet.dll droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\amd64\WinUSBCoInstaller.dll droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\AppleComponent droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\ssuddmgr.inf droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\resource\backup\x86\CoreFoundation.dll droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\lib\modules droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\Odin3.ini droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\ssudqcnet.inf droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\samsung_motorola_frp.exe droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\conf\management\jmxremote.access droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.desktop\LICENSE droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.smartcardio\ASSEMBLY_EXCEPTION droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\jdk.crypto.ec\LICENSE droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\amd64\ssudqcfilter.sys droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\jdk.jfr\ASSEMBLY_EXCEPTION droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\ssudqcnet.inf droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\Core.Samsung.dll droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\bin\jaccessinspector-32.exe droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\ss_conn_usb_driver2.inf droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\Core.Android.Message.dll droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\install_x64.exe droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\bin\freetype.dll droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\conf\net.properties droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.management.rmi\ASSEMBLY_EXCEPTION droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\jdk.sctp\LICENSE droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\ssudbus.inf droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\Samdownloader.exe droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\i386\ssudbus.sys droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\amd64 droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\java\legal\jdk.zipfs\LICENSE droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\Bypass\cyggcc_s-1.dll droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\Languages\Language.ES.dll droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\img\noPhone.png droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\Modules\Module.Recover.dll droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\i386\ssudbus2.sys droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\java\legal\java.scripting\ADDITIONAL_LICENSE_INFO droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\ssudnet.inf droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\amd64\ssudncm.sys droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\amd64\WdfCoInstaller01009.dll droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\Modules\Module.Extract.dll droidkit-2-3-0.exe File created C:\Program Files (x86)\iMobie\DroidKit\resource\backup\System.Data.SQLite.Linq.dll droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\resource\SamsungDriver\i386\ssudrmnetmp.sys droidkit-2-3-0.exe File opened for modification C:\Program Files (x86)\iMobie\DroidKit\img\voicecall.png droidkit-2-3-0.exe -
Executes dropped EXE 3 IoCs
pid Process 3984 DroidKit.exe 3660 DroidKit.Main.exe 4968 aapt.exe -
Loads dropped DLL 34 IoCs
pid Process 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 3984 DroidKit.exe 3984 DroidKit.exe 3984 DroidKit.exe 3984 DroidKit.exe 3984 DroidKit.exe 3984 DroidKit.exe 3984 DroidKit.exe 3984 DroidKit.exe 3660 DroidKit.Main.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier droidkit-2-3-0.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 droidkit-2-3-0.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 DroidKit.Main.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 DroidKit.Main.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 DroidKit.Main.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E DroidKit.Main.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 DroidKit.Main.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 DroidKit.Main.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 3984 DroidKit.exe 3984 DroidKit.exe 3984 DroidKit.exe 4340 msedge.exe 4340 msedge.exe 752 msedge.exe 752 msedge.exe 3660 DroidKit.Main.exe 3660 DroidKit.Main.exe 3660 DroidKit.Main.exe 2036 msedge.exe 2036 msedge.exe 3660 DroidKit.Main.exe 1204 identity_helper.exe 1204 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeDebugPrivilege 3984 DroidKit.exe Token: SeDebugPrivilege 3660 DroidKit.Main.exe Token: SeBackupPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeIncreaseQuotaPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeTakeOwnershipPrivilege 3660 DroidKit.Main.exe Token: SeLoadDriverPrivilege 3660 DroidKit.Main.exe Token: SeSystemProfilePrivilege 3660 DroidKit.Main.exe Token: SeSystemtimePrivilege 3660 DroidKit.Main.exe Token: SeProfSingleProcessPrivilege 3660 DroidKit.Main.exe Token: SeIncBasePriorityPrivilege 3660 DroidKit.Main.exe Token: SeCreatePagefilePrivilege 3660 DroidKit.Main.exe Token: SeBackupPrivilege 3660 DroidKit.Main.exe Token: SeRestorePrivilege 3660 DroidKit.Main.exe Token: SeShutdownPrivilege 3660 DroidKit.Main.exe Token: SeDebugPrivilege 3660 DroidKit.Main.exe Token: SeSystemEnvironmentPrivilege 3660 DroidKit.Main.exe Token: SeRemoteShutdownPrivilege 3660 DroidKit.Main.exe Token: SeUndockPrivilege 3660 DroidKit.Main.exe Token: SeManageVolumePrivilege 3660 DroidKit.Main.exe Token: 33 3660 DroidKit.Main.exe Token: 34 3660 DroidKit.Main.exe Token: 35 3660 DroidKit.Main.exe Token: 36 3660 DroidKit.Main.exe Token: SeIncreaseQuotaPrivilege 3660 DroidKit.Main.exe Token: SeSecurityPrivilege 3660 DroidKit.Main.exe Token: SeTakeOwnershipPrivilege 3660 DroidKit.Main.exe Token: SeLoadDriverPrivilege 3660 DroidKit.Main.exe Token: SeSystemProfilePrivilege 3660 DroidKit.Main.exe Token: SeSystemtimePrivilege 3660 DroidKit.Main.exe Token: SeProfSingleProcessPrivilege 3660 DroidKit.Main.exe Token: SeIncBasePriorityPrivilege 3660 DroidKit.Main.exe Token: SeCreatePagefilePrivilege 3660 DroidKit.Main.exe Token: SeBackupPrivilege 3660 DroidKit.Main.exe Token: SeRestorePrivilege 3660 DroidKit.Main.exe Token: SeShutdownPrivilege 3660 DroidKit.Main.exe Token: SeDebugPrivilege 3660 DroidKit.Main.exe Token: SeSystemEnvironmentPrivilege 3660 DroidKit.Main.exe Token: SeRemoteShutdownPrivilege 3660 DroidKit.Main.exe Token: SeUndockPrivilege 3660 DroidKit.Main.exe Token: SeManageVolumePrivilege 3660 DroidKit.Main.exe Token: 33 3660 DroidKit.Main.exe Token: 34 3660 DroidKit.Main.exe Token: 35 3660 DroidKit.Main.exe Token: 36 3660 DroidKit.Main.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 5052 droidkit-2-3-0.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5052 wrote to memory of 4140 5052 droidkit-2-3-0.exe 78 PID 5052 wrote to memory of 4140 5052 droidkit-2-3-0.exe 78 PID 5052 wrote to memory of 4140 5052 droidkit-2-3-0.exe 78 PID 4140 wrote to memory of 2424 4140 cmd.exe 80 PID 4140 wrote to memory of 2424 4140 cmd.exe 80 PID 4140 wrote to memory of 2424 4140 cmd.exe 80 PID 5052 wrote to memory of 4984 5052 droidkit-2-3-0.exe 81 PID 5052 wrote to memory of 4984 5052 droidkit-2-3-0.exe 81 PID 5052 wrote to memory of 4984 5052 droidkit-2-3-0.exe 81 PID 4984 wrote to memory of 4348 4984 cmd.exe 83 PID 4984 wrote to memory of 4348 4984 cmd.exe 83 PID 4984 wrote to memory of 4348 4984 cmd.exe 83 PID 5052 wrote to memory of 3612 5052 droidkit-2-3-0.exe 84 PID 5052 wrote to memory of 3612 5052 droidkit-2-3-0.exe 84 PID 5052 wrote to memory of 3612 5052 droidkit-2-3-0.exe 84 PID 3612 wrote to memory of 1548 3612 cmd.exe 86 PID 3612 wrote to memory of 1548 3612 cmd.exe 86 PID 3612 wrote to memory of 1548 3612 cmd.exe 86 PID 5052 wrote to memory of 2892 5052 droidkit-2-3-0.exe 87 PID 5052 wrote to memory of 2892 5052 droidkit-2-3-0.exe 87 PID 5052 wrote to memory of 2892 5052 droidkit-2-3-0.exe 87 PID 2892 wrote to memory of 4916 2892 cmd.exe 90 PID 2892 wrote to memory of 4916 2892 cmd.exe 90 PID 2892 wrote to memory of 4916 2892 cmd.exe 90 PID 5052 wrote to memory of 4256 5052 droidkit-2-3-0.exe 91 PID 5052 wrote to memory of 4256 5052 droidkit-2-3-0.exe 91 PID 5052 wrote to memory of 4256 5052 droidkit-2-3-0.exe 91 PID 4256 wrote to memory of 4636 4256 cmd.exe 93 PID 4256 wrote to memory of 4636 4256 cmd.exe 93 PID 4256 wrote to memory of 4636 4256 cmd.exe 93 PID 5052 wrote to memory of 3984 5052 droidkit-2-3-0.exe 94 PID 5052 wrote to memory of 3984 5052 droidkit-2-3-0.exe 94 PID 5052 wrote to memory of 3984 5052 droidkit-2-3-0.exe 94 PID 5052 wrote to memory of 752 5052 droidkit-2-3-0.exe 95 PID 5052 wrote to memory of 752 5052 droidkit-2-3-0.exe 95 PID 752 wrote to memory of 4560 752 msedge.exe 96 PID 752 wrote to memory of 4560 752 msedge.exe 96 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97 PID 752 wrote to memory of 2364 752 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\droidkit-2-3-0.exe"C:\Users\Admin\AppData\Local\Temp\droidkit-2-3-0.exe"1⤵
- Drops file in Program Files directory
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Launch App\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""2⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\curl.execurl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Launch App\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw"3⤵PID:2424
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Start Download\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""2⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\curl.execurl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Start Download\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw"3⤵PID:4348
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Download Successful\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""2⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\curl.execurl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Download Successful\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw"3⤵PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Install Finished\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\curl.execurl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Install Finished\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw"3⤵PID:4916
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Start Application\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""2⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\curl.execurl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"6DC7782D\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Start Application\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-es\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw"3⤵PID:4636
-
-
-
C:\Program Files (x86)\iMobie\DroidKit\DroidKit.exe"C:\Program Files (x86)\iMobie\DroidKit\DroidKit.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3984 -
C:\Program Files (x86)\iMobie\DroidKit\DroidKit.Main.exe"C:\Program Files (x86)\iMobie\DroidKit\DroidKit.Main.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660 -
C:\Program Files (x86)\iMobie\DroidKit\aapt.exe"C:\Program Files (x86)\iMobie\DroidKit\aapt.exe" dump badging imobieservice.apk4⤵
- Executes dropped EXE
PID:4968
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.imobie.com/droidkit/thankyou/install-complete.htm2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff899153cb8,0x7ff899153cc8,0x7ff899153cd83⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:23⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:83⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:13⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:13⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:13⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:13⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:13⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7601798542814231971,15377099176919362341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:13⤵PID:1316
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5e8b850077bddfe93d36316c346f8259e
SHA1f5d580d41da59a937ac0888c91347ef12f3c83a9
SHA256b23b63627685d3bf82229ea57f26cffdd77e2fcd398dacbfc6f327918dd54bd5
SHA51265394c4ecb3821d953a3e00421ba950d85e8040ef8bfa2753cf9e0d7eb6b0a56fd2bdacb3ea24ed0ad4ac5dae3a384c71b47da7af52b6958c87419a310a59c18
-
Filesize
360KB
MD5716134b10d22cc35644e32d7b122ba6b
SHA1f505be1c58b7121b205f45120e9a2dfc4996ece6
SHA256bde232cef06ad28e507fabe5ba43d6cb47673925092a1a9c12db10db68f7c4d5
SHA512d08f9a134ed2e1183543ca430be6851c2b6162f1c5b74174713535587d5e0741cc0f141767c550cbd142769ea58989475d87420e6034fde37c66b4ce734652f0
-
Filesize
43KB
MD52cbb5aff6b89858b06c4c14a736437a6
SHA161df5e1ec9efab1c9c934b418c2f9be1f24a9857
SHA256008079ce2b9886bd957d6c75d91f18c0469a485dcabc6f55cdb61282e52d199f
SHA51272a9acf64ca7f4e35bc7c094a53a017ba01d997e739af902ceac03b85494302b08eebf2cb1f75eef77c06d74c6ef6048b2a7e3286e22cd7da7d3e874d31a7920
-
Filesize
369KB
MD554a92cfe0d35dd76165aebad00a94d2b
SHA172d46209d65d02fa041148542bf197f6a21c44cc
SHA2564475e64459d0003a9980c45776893454006f84c6e5870265c8aaa91a8d78f145
SHA51262ff9a18cd77fcc3c1eb28fcd767cb7e144a9c567e163db337149fb192cf225d2acfa444588c2e07eaf020329a71ebc91b7aaeb46c0b83e1535962bac062da4f
-
Filesize
134KB
MD54bff532cb6c7a95533879c93acf657f8
SHA1e59a9758b459ac0381f9d83707a49759d4b88967
SHA2560be4dab72c61e9c255337786cfe9cb147decf5deba3c8e74517da2d5b4ac8db5
SHA5127a8edf224aaf43fb338f7386960e5556e6ebb89d7b00ab718bcf3fee62e4ca5665988e043b0490438fab494bad5ac059142a8ab9bc8ab29293a3c1469cb311a3
-
Filesize
1KB
MD537c8496f8bb31c32b20a12465731e134
SHA12f9f4e6b75bcc6bb8cae2505150acd2e61244adf
SHA2563bbfeb77ee305c4ee95362d2caca743af8e34ac1cb752487c1c2a14edf3dce51
SHA512458150c1937d0fc4d3f3ba7d9fe2ddc2a446f370c568018b1a02ee477bbd4843883518a4b9def4c3f2d566a5636bf304c9c657bb960870c5cb35ed955d8f20d4
-
Filesize
187KB
MD59ca6d8dcdc3a93521270fcb52c33e491
SHA142da181d0f73676197f50f3a2203708dd2543c0c
SHA2567056eda1128f8a3a0c7217885972359cee99b6a62a62d4bd7bad79b04d7db227
SHA512d28bce4de41036f25493ea28c64e840f8b62325eee6dbad03a4bb32439396aef16cf73eaaa95e975b82786c2aeac4eba86c13a6d703e616ef3ec82f41e463e28
-
Filesize
195KB
MD58ad392268a27d055700e7f672fe1e928
SHA119bcaa4685842883eed1cb0488a41da182ba3af8
SHA2566120cc40b8518e51f1dd2d255961538d6fdf230a55ea7e651e705823be019179
SHA51201448e2ca748076ebb29bf2298ef25bfeaa38cef8897745e63f23aa9df1ef7f4623036cd0c599fb4c04407db4180e96b7e20113e4d3e4db4336f59d4bf98f8f5
-
Filesize
29KB
MD5cce587b8ff219b482e304e8d1105335d
SHA1349e075ed476d9ebef6f939848a04221ab740151
SHA2565429cd9cca2e972c2d0607767967b7e78db3dc4c74c874c96be66bf11c2c95cc
SHA512fe3286efe04d229484f9a56b591409884c0cc58413bd54d0d10d245efee88f6060d0dd2d326ef02176c90a9c5f1e7245415515cdee43c8681c1555bdaeb7e312
-
Filesize
143KB
MD5f9fcc9bf77158750f4dc5f3ae063378f
SHA163b6c36c7d30e02abf873049e41a505f671e6c4a
SHA25639849a5ad96c2f524c653e423a466aac1412d462f18a7c5264956b23c7f57d01
SHA5128a5acf576ad98804ff258f2833d5f4bdbfeb8b181469d4ad37e5306fa116caba57c7de979bec37967ee78498268c8359e0a15aa813b07f3194dcfbd52cdba525
-
Filesize
74KB
MD53512d7bd528fa43472d63e413791784a
SHA1103456791eaa487742bd71e1d4892d20dc46bbd1
SHA2568c635d69f8b1e9bea6940d0f1fdf5a6604be8532018d9712cde0df1389d23a8c
SHA512f923409e03419ccaeecf40d782dac50c016d06726b658b73e641182d0467c4cec478d75a3231107e6aa731c18693e344ba48869086a7a15da8852c9e3faf8b91
-
Filesize
109KB
MD5e01458c0341ce2e620de53d7ecae642e
SHA18c3874c5c5e0f1a7e1df1fd6a620e9811ecf570a
SHA256991ad3eeb4cb4cfd37a53d621d8a40c2180c85958465b2726265a1c31bcedb20
SHA512894bb3a91abb7b67121ae6922037a993577df08700ea5177342eef7bcb49d63ef598fa750a00095e4c8f05c3f881a4cd0e7bfd4a4586db96a59b4a9a7d994cff
-
Filesize
36.1MB
MD5f1740c63effee7bf9d766cdfc48a20d2
SHA1a8316f298d969e9c5d61c1e36999eac6d083a150
SHA25686bff28d1fc5f4e5c330af898ea34a7f04a5174c76d9a5616fe6e91aede0736b
SHA5120268e561095cf7c9881e0b8b1370d91d268f8f0a26bbb3d26a4667bd44bfa2c3bda41affd8aeeec38a703ad9640e47e92cc6f01cce59e36783fd714c2ade94f2
-
Filesize
76KB
MD5e8f53cacc10bc0731fa5dde221e3c8df
SHA17c9a1dfc60144dba2452166dadbf81d72f5588fc
SHA2566544afbae436d116d26f766ccf024d0160fbcf689859294aae3d133de2b8a07f
SHA5122be6c069060c013ef679d9b22fe1b87ff1d136be9ab421c2ab26100725b43a1e42694f742a11e3fc8c5759242d4cf5662c572a5c2817a9e694b0b92898439a33
-
Filesize
4.7MB
MD515da831e042c6691bb461fb3476d655e
SHA115b5788d3fe43840e0cdbb9fa7f8aa7bfef4f80e
SHA256909f5924f39c9c018aa8b972bc0b86262c0f959f76d9be4a86a6340dde7585b9
SHA512660a7a0df431ffa08141a510947ebc9e882aaa7ace4c07e6374629d071e03d6d321dbb56ba82e7ea30a9ac43414361cd2c239b8047e5ade4f5bb56b1599e42ae
-
Filesize
49B
MD519c9d1d2aad61ce9cb8fb7f20ef1ca98
SHA12db86ab706d9b73feeb51a904be03b63bee92baf
SHA256ebf9777bd307ed789ceabf282a9aca168c391c7f48e15a60939352efb3ea33f9
SHA5127ec63b59d8f87a42689f544c2e8e7700da5d8720b37b41216cbd1372c47b1bc3b892020f0dd3a44a05f2a7c07471ff484e4165427f1a9cad0d2393840cd94e5b
-
Filesize
44B
MD57caf4cdbb99569deb047c20f1aad47c4
SHA124e7497426d27fe3c17774242883ccbed8f54b4d
SHA256b998cda101e5a1ebcfb5ff9cddd76ed43a2f2169676592d428b7c0d780665f2a
SHA512a1435e6f1e4e9285476a0e7bc3b4f645bbafb01b41798a2450390e16b18b242531f346373e01d568f6cc052932a3256e491a65e8b94b118069853f2b0c8cd619
-
Filesize
33B
MD516989bab922811e28b64ac30449a5d05
SHA151ab20e8c19ee570bf6c496ec7346b7cf17bd04a
SHA25686e0516b888276a492b19f9a84f5a866ed36925fae1510b3a94a0b6213e69192
SHA51286571f127a6755a7339a9ed06e458c8dc5898e528de89e369a13c183711831af0646474986bae6573bc5155058d5f38348d6bfdeb3fd9318e98e0bf7916e6608
-
Filesize
166KB
MD53935ec3158d0e488da1929b77edd1633
SHA1bd6d94704b29b6cef3927796bfe22a2d09ee4fe7
SHA25687cbd1f3bf5ab72089a879df110263784602a574c0ae83f428df57ae2f8115db
SHA5125173891b1dfad2298910236a786c7b9bbcfce641491a25f933022088c81465fb93fd2385d270e9a0632f674355538da464d1edacf511140d6f31d91d1afe64fc
-
Filesize
264KB
MD527fe8d18682fd9901e589e65ef429b23
SHA16426e96243911beab547f2bc98a252a26692f11f
SHA256896ab9cac41e3977792ba2034ea8730610c2779fa51bab6bed426094ea8d3ecd
SHA5129d6bc8c77c72cbad15e808281818c2768f1b44aa6ea1d54a979c91218b8fbf2a02fee49fa97db6cfa6087ddc363d6cdd6407e4494934b4568c514437030a2615
-
Filesize
45KB
MD58574627d4a5415c36176bf4ab9058183
SHA1a50ab8e8983ce2afa54cb23e4629c83889cd0c56
SHA2563b8c37db1af7f30a2baff39b587ecf7edd30027ee3e91d5e596e39dd0f0e3908
SHA512ea27c071f047d200f45c5c82943e39df05bf5755aa72c44983ed367fc1d2ba30781cd24a0ff4e4da6224106d9f639f0872848d0fa7058f088467d1b4b5205954
-
Filesize
213B
MD5cc99a9c0b700052a7902f697b58ed058
SHA130cb88fe7f8171e82c824df40b0b9afa379abfac
SHA2563f6dcf365afec198abe4c2358bf937bc2ea9ff558d3cfa8a1bce75969d208667
SHA512059bdd6164ac6f5af32a8419853e7d6ab6bf757a7ff3093849b9be55b2d6e9e9866722aa5d213097f2f47481fcbb4a2407c29ae936cfa16dc64b617ea5c99029
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
299B
MD55ae8478af8dd6eec7ad4edf162dd3df1
SHA155670b9fd39da59a9d7d0bb0aecb52324cbacc5a
SHA256fe42ac92eae3b2850370b73c3691ccf394c23ab6133de39f1697a6ebac4bedca
SHA512a5ed33ecec5eecf5437c14eba7c65c84b6f8b08a42df7f18c8123ee37f6743b0cf8116f4359efa82338b244b28938a6e0c8895fcd7f7563bf5777b7d8ee86296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5367be39f0f0bd10ee528276085ebdf48
SHA1bd2d8f3b91e3d0e5dcca4c0734f27ca4b0f257ce
SHA2566568d4a4c638ae3fec4d5bef16d7f5378195466005a7d7de3667b501878e566c
SHA5121e33cbeabbf89c1d5f5320be70459a27b2b4fdbbb4e5bd8fdcd4f4dea5b5b7761e49ca4cc72dd0a33423e4ce15353495eeef01472c7cb005c9d9dd4ea9d4a606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_58B04C7F2B427798A9D4E10FBBBAEBE8
Filesize471B
MD5b7c5776f549c99697a2c1d6cdf52ba28
SHA1b5960ff8171247901c0ef10fbe18619b58f90dec
SHA256ac01195b04bf5b2a293b144238c8c4d649b4d9c1987686784b28a3596e36e654
SHA5128bb0a996c31014dec2ba2621972538f4ee5fc20caddf8c055af01d4dbe20438d209013db180266fbf21ed1ab1e042e060adf863c2f0a759b1274378250748fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5da5bb5e19aafb6ae0865453e3e1b9e01
SHA1daa2b50d5bc9292dcfe31f8c15aebb862a7f204e
SHA2566d8d4e6442b2cebd201bf6b3fe8de960750a715df5817b00180c93c5249b52f6
SHA51230cad7eb8b828ba74b10b48d2ba97d021f06966a56e3ac9e3081c1f5d41079a1101e5f9d206910bcd219e4d0d9d5c32558e5abcbcd998a4663b925d128bd9879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61
Filesize192B
MD580d5d675191a09071fdae8f8a9e094c8
SHA123ffa3fabf1d529dba8f86bf82ab1ba87aff77d6
SHA2560c5b4954c950b72049191a827a68b671f7dfa45606783365d92773f200aaaf65
SHA512c0c0f7646b2535c103d9484e9930731036bfc66d5ede4618b812454dab1939cfb22b970798a2756b3ece4354ad226e50b80734d5562f2124934cd9522997b683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD557c52353695f5a034a3290e06029716d
SHA17d6b964a9a3c673a4f713cc018cfcabfdf2ff504
SHA256f9ceb0d880e97aee5e0c3fd077e4f8d50f200e1ad338064015aa55d3a644fc36
SHA512ec9c492af414f00da60e63d283a333a20a41021a3ee3cf65732520611388467b3322e97f46b58ee97baec0b6e3382de647257a77d446fd49f0916d394bee4842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD545b539c2858a953a885ea3fc6f79decc
SHA185f2cda332a85cf78b1f3ff970cc9051ead2620f
SHA256ec3eba853fe7453648bd93eb94b3733d2ab0e12b821b01323080e93d3cd0a17c
SHA5122f37f62c78d7a7f2a359bb025c83713e188ba498bb55b5de7f46851d9bcf682d17149c192f61f82bdab7131bb85da069aeec5498d803212fe0a437f1e3829aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_58B04C7F2B427798A9D4E10FBBBAEBE8
Filesize410B
MD5092dc63ec1669b6b4b08b528bca23d6b
SHA1c9b6c43f3f3a54ebb167402c9aad1160737ba6bf
SHA2560c59651a80aec4367b3800c7150404b03d36d86b2631f6ed6996589e4d906b9f
SHA5124fd75a11e871934d8dc30ebe9c441d5aa665d87c4cfadcb739d498544bbf7e1a14f2196dff8cbc9ae9fa7f83794de9a46ab2421dd85a2a4f9d3729fe3070cd26
-
Filesize
152B
MD58ff8bdd04a2da5ef5d4b6a687da23156
SHA1247873c114f3cc780c3adb0f844fc0bb2b440b6d
SHA25609b7b20bfec9608a6d737ef3fa03f95dcbeaca0f25953503a321acac82a5e5ae
SHA5125633ad84b5a003cd151c4c24b67c1e5de965fdb206b433ca759d9c62a4785383507cbd5aca92089f6e0a50a518c6014bf09a0972b4311464aa6a26f76648345e
-
Filesize
152B
MD51e4ed4a50489e7fc6c3ce17686a7cd94
SHA1eac4e98e46efc880605a23a632e68e2c778613e7
SHA256fc9e8224722cb738d8b32420c05006de87161e1d28bc729b451759096f436c1a
SHA5125c4e637ac4da37ba133cb1fba8fa2ff3e24fc4ca15433a94868f2b6e0259705634072e5563da5f7cf1fd783fa8fa0c584c00f319f486565315e87cdea8ed1c28
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD584f06d58321cee1100aac6627a3bb1d1
SHA19a9bc4ae4c4e24bf22e6818663d7cea4880ead1f
SHA256c5757ff98902f37788a12bb20691ab0d2e12ed2c50cc450c8c022fdc157d8c4b
SHA5122428132ae5033d5431f135b4ad9b9cf8701c42d20d64b39adf9d37233a008d57ffc0581723859695a63993cbb43fe2d9383dcbe3d15aa0a42d38912e412d5fdb
-
Filesize
1KB
MD5a8846d133eac11033ec264be88937401
SHA13120e3c1f0a30818b7f9f4f7e93368385b03cd4c
SHA25640b9e264ebde015b75c2aa7f1c7efe9c9b9aea9e4fd27097c0941d7a99bf78c7
SHA512fb193ce5106ce3e1eb0d1cf289bcab27951e11230982bc61e4161c9ee2f368f90fd1bbb7b617cbbed4324887acda0b8a5457892aba9c693961dd4644d4bf0f90
-
Filesize
7KB
MD5f8be0bbec4aaf90f7853f801258bee37
SHA176a3e05b0c2cccc17fc38eab25f5a203d6d0be2b
SHA256245f73147954cc5d8c9fd58b43eedcbb059f3fae15da593d3aae275c6c55f2d0
SHA5120c1563789fc45756994c227f6884a92cb7588680a48acb072a1a52f249afdca94f378d5e81f7fea99bf2e6656ad9ebe9b527468541effb3963af050c8a04c9a2
-
Filesize
5KB
MD5fc9f9163cddc605d0bdce038940aa207
SHA1c3e06d83c84cdd1f4e963e9af9e2fea28e4f1a5e
SHA256e6540c2b1d90ee90ec73bc2e62acbc47bdb0a5b9e9f237bd875d952ce419d2bd
SHA51270752a65d312200903c97a6aae449b6cd5be84aec74e9ab81cf8413c444ac90435f979d7246ddedf90a82a72840492d641ecc566844eb1510f16c1bb68ec8500
-
Filesize
6KB
MD5cb79cb29de916823cc1d2e35710bb2ad
SHA112e67a507d5618bb0370de638f28141a6f4772f6
SHA256c4fbd6bb274f301a430b36ab1bf3315c505c3350debc47b131f619883dd183f4
SHA5125548656a8b603b75690d040b1291e20eb3749185d29965e4d8c59c5be56b98f752ea00f9e09b0e1e58565da3c5c71f23d7d4b5ce804844711719f28a0af48f87
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5adff071fe898a5d04f7563fe9cd2bfb2
SHA1e7c48d8c7e524e9a406cb22e94b0108df8f93276
SHA256b5811e007908e1b42b03c3d540384a1c91dd7675f241fa04f38a8500a2e099e1
SHA5126008d788b56708729d8497ab2790fb200d705c777ebeac038c0895bb67ec85ed53f931aa752d2a8c4929979cb4b3ebae352e2841a3f5eecf53d362bba0ab6e61
-
Filesize
10KB
MD5259f0a2e6c75128ee3126c097e099a9f
SHA17d411ac3c7875a722e9b5f04739e78f44ba2fbb4
SHA2561ebe8a2bc9b21811f93b8a76d7c63bf20a76bba00503819b56053ce21776d729
SHA5123ce21a0c0aa1ab44508d0dd90ac89dca3c31a73a73d62c13dc979ebf30fdee9b98f54b968d3a98b627e920d0c110832a18c8401ee6d635b15f6ff3427e5b475d
-
Filesize
11KB
MD5f81e33f15d1e5e0d5c0b40c73f63fdc5
SHA1f80c2aaf3de50d74eefc48a4b8b15ddf0e6ad5ab
SHA2562b9e6e8fe7a6dceae7cfc36536e44c6e8fdb9f5085019cf25b5a474b5f578c60
SHA512a1f216f49c163e12f5668f237e1553721e442250f5eb1bbdaf2a84567240e92ef449f674b4487e63e6c36fcb9abd09f603d2c499eb676a4605d7b47e1bf927b7
-
Filesize
2KB
MD533ec04738007e665059cf40bc0f0c22b
SHA14196759a922e333d9b17bda5369f14c33cd5e3bc
SHA25650f735ab8f3473423e6873d628150bbc0777be7b4f6405247cddf22bb00fb6be
SHA5122318b01f0c2f2f021a618ca3e6e5c24a94df5d00154766b77160203b8b0a177c8581c7b688ffe69be93a69bc7fd06b8a589844d42447f5060fb4bcf94d8a9aef
-
Filesize
7KB
MD562e85098ce43cb3d5c422e49390b7071
SHA1df6722f155ce2a1379eff53a9ad1611ddecbb3bf
SHA256ee7e26894cbf89c93ae4df15bdb12cd9a21f5deacedfa99a01eefe8fa52daec2
SHA512dfe7438c2b46f822e2a810bc355e5226043547608d19d1c70314e4325c06ad9ad63a797905e30d19f5d9a86ee1a6d9c28f525a298731e79dbf6f3d6441179a8e
-
Filesize
36KB
MD5d8fca35ff95fe00a7174177181f8bd13
SHA1fbafea4d2790dd2c0d022dfb08ded91de7f5265e
SHA256ad873f1e51e6d033e5507235ec735957256ebeeb0d3f22aa0b57bb4bd0846e4c
SHA512eb530b10f137cb0cdfdcd2c11fd9f50f774e0ce44e9d2da3e755f6a6df24fe6e7525c27b109e3e68e9d3e49a889937a22f4d9d78703b1055a83b8a58808a58ba
-
Filesize
11KB
MD5ca332bb753b0775d5e806e236ddcec55
SHA1f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f
SHA256df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d
SHA5122de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00
-
Filesize
593KB
MD5d029339c0f59cf662094eddf8c42b2b5
SHA1a0b6de44255ce7bfade9a5b559dd04f2972bfdc8
SHA256934d882efd3c0f3f1efbc238ef87708f3879f5bb456d30af62f3368d58b6aa4c
SHA512021d9af52e68cb7a3b0042d9ed6c9418552ee16df966f9ccedd458567c47d70471cb8851a69d3982d64571369664faeeae3be90e2e88a909005b9cdb73679c82
-
Filesize
809KB
MD5366fd6f3a451351b5df2d7c4ecf4c73a
SHA150db750522b9630757f91b53df377fd4ed4e2d66
SHA256ae3cb6c6afba9a4aa5c85f66023c35338ca579b30326dd02918f9d55259503d5
SHA5122de764772b68a85204b7435c87e9409d753c2196cf5b2f46e7796c99a33943e167f62a92e8753eaa184cd81fb14361e83228eb1b474e0c3349ed387ec93e6130
-
Filesize
10.0MB
MD5368841af8b0074e348418f106716e603
SHA175469510665b651b38e3b4fb7c4240722c756126
SHA2563be54dea5aedc0d8d16d6c4bd4e046e2d93bfc550a1a035a94768c2d5901e327
SHA5123804afa3930a90f258a2b4e7106e1d0211e5d4ca6a7f5ba23da11e3908b4e202295ddbcb1ecf1e15215bc9a0aece1a46efad07ad94feddd4f316b0de674c50d5
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
313KB
MD506a47571ac922f82c098622b2f5f6f63
SHA18a581c33b7f2029c41edaad55d024fc0d2d7c427
SHA256e4ab3064f2e094910ae80104ef9d371ccb74ebbeeed592582cf099acd83f5fe9
SHA51204b3d18042f1faa536e1393179f412a5644d2cf691fbc14970f79df5c0594eeedb0826b495807a3243f27aaa0380423c1f975fe857f32e057309bb3f2a529a83
-
Filesize
24KB
MD52b7007ed0262ca02ef69d8990815cbeb
SHA12eabe4f755213666dbbbde024a5235ddde02b47f
SHA2560b25b20f26de5d5bd795f934c70447112b4981343fcb2dfab3374a4018d28c2d
SHA512aa75ee59ca0b8530eb7298b74e5f334ae9d14129f603b285a3170b82103cfdcc175af8185317e6207142517769e69a24b34fcdf0f58ed50a4960cbe8c22a0aca
-
Filesize
31B
MD5f54fc12cec48ef26292c26de6c74b266
SHA1851372eb1efb727c12d7483c28216d2591b4cc4f
SHA256c238a16a30e777602432f60932c4c2ecb908b5d9aece661c4926eb02e2230d04
SHA5123505827e76813220ba53984c340d48cbb059f3549253c8871028c0675aa2ae486a11bd49d73fcac5ae50318804d51f704f8da003e3d3efd64561ceb390bc28df
-
Filesize
8.1MB
MD58cf66dc36cb0bc65799819060cd4fe5e
SHA1834e9d6c79d99baa1592705c01dd2dd2a91f93f4
SHA256d01e365210b9d7040322e568fc1fb036487da4848f293e83cedc962a3eed2c70
SHA512f45eb7b920578fb3fffd2021231b3063aa47928855530f9019aeb9b4cfceabe6fb176d642fbfb9b64bda83f926b4d771616189e45ba688eb6f1264f4495f3a96
-
Filesize
52B
MD5e978a46d7e23c139e4df7b526f86745f
SHA1f280d921ff3bbf5e171b0f6aa9e48e9914e32dd6
SHA256435288e587018aa375e8a4bf3f35cd8dfffd559053f5ca6a0e487a61ff23e5db
SHA5127b7150f3b2385d7a7264839d626e9b7c7026868d57f9f5df7d42ddb01688a7bf3008937ef2aa06c3f49089cb4cfbbfb8b6d9661fbc6a4f8e555305552759a75f
-
Filesize
3KB
MD5b36489cb554c11a7bf85cd14c7c1cb84
SHA1c7349c67c34aa9d536dba6c20e5aaa65095db710
SHA25685ced2c6b72c435ca255179c6136c8b25061fe1a6981c9b7fdfd8c7d359955d2
SHA512fd3adc41759e7f789110a8d13a60a5503ea45fccd3fe7d773ad44a284dc3eed89585c76422678051a390266711c11cc5a3bb9aff569f0ddced3bc359b3054922
-
Filesize
2KB
MD580eea9cdf4bf1c3fd53b237959a0ac7c
SHA1f1d4249cccdfd5929e441aa593263e0a62d42c1b
SHA25652e424e4bd3f6a5b79d030c10815b22fc55fe33a4ec28eb133ec9b292bc49257
SHA5128b0623ce0f94fa9458236db5294b3d1d4aaed47dd3fe816dc2e5f2caa90502ef3c1452692b4deb4a2a5748e08200a49d96eef61fa38db10e822fd9c4328207e1
-
Filesize
1KB
MD5f9e7bd7f460010ad6e0928bfc7c158f7
SHA19591ea28790605219347d5c76b3c8a924f193609
SHA256f2178b13663f6dde182d855d3e724c28dd64c3693efde7593f20d126b0c6640b
SHA512ec55df0e8ebc36e857dd710ab9a1b70a3c63d016cfb950ec916860f484d8ae50d6a312a31b8363613864414c9e6cdcec9ff52e09e30fb63b88fe4fc9f2884a3b