Analysis
-
max time kernel
1200s -
max time network
1138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 19:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase/blob/master/ransomwares/PowerPoint.zip
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
https://github.com/Endermanch/MalwareDatabase/blob/master/ransomwares/PowerPoint.zip
Resource
win11-20240704-en
General
-
Target
https://github.com/Endermanch/MalwareDatabase/blob/master/ransomwares/PowerPoint.zip
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 4692 [email protected] 2788 [email protected] -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: [email protected] File opened (read-only) \??\H: [email protected] File opened (read-only) \??\K: [email protected] File opened (read-only) \??\G: [email protected] File opened (read-only) \??\L: [email protected] File opened (read-only) \??\Q: [email protected] File opened (read-only) \??\T: [email protected] File opened (read-only) \??\V: [email protected] File opened (read-only) \??\W: [email protected] File opened (read-only) \??\A: [email protected] File opened (read-only) \??\B: [email protected] File opened (read-only) \??\Z: [email protected] File opened (read-only) \??\J: [email protected] File opened (read-only) \??\O: [email protected] File opened (read-only) \??\P: [email protected] File opened (read-only) \??\R: [email protected] File opened (read-only) \??\U: [email protected] File opened (read-only) \??\X: [email protected] File opened (read-only) \??\E: [email protected] File opened (read-only) \??\I: [email protected] File opened (read-only) \??\Y: [email protected] File opened (read-only) \??\M: [email protected] File opened (read-only) \??\S: [email protected] -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 53 raw.githubusercontent.com 55 camo.githubusercontent.com 127 raw.githubusercontent.com 52 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 2 IoCs
pid Process 848 taskkill.exe 3188 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133649404701997700" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1403246978-718555486-3105247137-1000\{3E16A139-D3BF-477E-943C-CB1B01030780} [email protected] -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe 4028 chrome.exe 4028 chrome.exe 4836 chrome.exe 4836 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 2768 7zG.exe 2768 7zG.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe -
Suspicious use of SendNotifyMessage 56 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4144 wrote to memory of 1080 4144 chrome.exe 82 PID 4144 wrote to memory of 1080 4144 chrome.exe 82 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 2056 4144 chrome.exe 83 PID 4144 wrote to memory of 208 4144 chrome.exe 84 PID 4144 wrote to memory of 208 4144 chrome.exe 84 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85 PID 4144 wrote to memory of 1344 4144 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Endermanch/MalwareDatabase/blob/master/ransomwares/PowerPoint.zip1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2f41ab58,0x7ffc2f41ab68,0x7ffc2f41ab782⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1896,i,11082023319679740057,17528205712629314735,131072 /prefetch:22⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1896,i,11082023319679740057,17528205712629314735,131072 /prefetch:82⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1896,i,11082023319679740057,17528205712629314735,131072 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1896,i,11082023319679740057,17528205712629314735,131072 /prefetch:12⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2816 --field-trial-handle=1896,i,11082023319679740057,17528205712629314735,131072 /prefetch:12⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 --field-trial-handle=1896,i,11082023319679740057,17528205712629314735,131072 /prefetch:82⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 --field-trial-handle=1896,i,11082023319679740057,17528205712629314735,131072 /prefetch:82⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1896,i,11082023319679740057,17528205712629314735,131072 /prefetch:82⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4260 --field-trial-handle=1896,i,11082023319679740057,17528205712629314735,131072 /prefetch:82⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2668 --field-trial-handle=1896,i,11082023319679740057,17528205712629314735,131072 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5052 --field-trial-handle=1896,i,11082023319679740057,17528205712629314735,131072 /prefetch:12⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4288 --field-trial-handle=1896,i,11082023319679740057,17528205712629314735,131072 /prefetch:12⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5084
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3396
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\ChilledWindows\" -ad -an -ai#7zMap23522:90:7zEvent84861⤵
- Suspicious use of FindShellTrayWindow
PID:2768
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ffc2f41ab58,0x7ffc2f41ab68,0x7ffc2f41ab782⤵PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1952,i,6349955625715406793,9771614525741608814,131072 /prefetch:22⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1952,i,6349955625715406793,9771614525741608814,131072 /prefetch:82⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2196 --field-trial-handle=1952,i,6349955625715406793,9771614525741608814,131072 /prefetch:82⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3112 --field-trial-handle=1952,i,6349955625715406793,9771614525741608814,131072 /prefetch:12⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3140 --field-trial-handle=1952,i,6349955625715406793,9771614525741608814,131072 /prefetch:12⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4408 --field-trial-handle=1952,i,6349955625715406793,9771614525741608814,131072 /prefetch:12⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4548 --field-trial-handle=1952,i,6349955625715406793,9771614525741608814,131072 /prefetch:82⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4812 --field-trial-handle=1952,i,6349955625715406793,9771614525741608814,131072 /prefetch:82⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1952,i,6349955625715406793,9771614525741608814,131072 /prefetch:82⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4984 --field-trial-handle=1952,i,6349955625715406793,9771614525741608814,131072 /prefetch:12⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4284 --field-trial-handle=1952,i,6349955625715406793,9771614525741608814,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3348 --field-trial-handle=1952,i,6349955625715406793,9771614525741608814,131072 /prefetch:82⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1952,i,6349955625715406793,9771614525741608814,131072 /prefetch:82⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2576
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Trololo\" -spe -an -ai#7zMap18544:76:7zEvent274201⤵PID:4048
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\ChilledWindows\" -ad -an -ai#7zMap7982:90:7zEvent146821⤵PID:1260
-
C:\Users\Admin\Downloads\ChilledWindows\[email protected]"C:\Users\Admin\Downloads\ChilledWindows\[email protected]"1⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
PID:4692
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f0 0x4f81⤵PID:1008
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Trololo\" -spe -an -ai#7zMap25259:76:7zEvent253651⤵PID:4368
-
C:\Users\Admin\Downloads\Trololo\[email protected]PID:2788
-
C:\Windows\SYSTEM32\taskkill.exetaskkill.exe /f /im explorer.exe2⤵
- Kills process with taskkill
PID:848
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill.exe /f /im taskmgr.exe2⤵
- Kills process with taskkill
PID:3188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5d4ff3603ae1515f18f286a39197cea53
SHA193cc9863a19d881501cc056f7d8ea709a8efe4a9
SHA25626e8881dd0ec0b294ee2bc487c7205ac460f7d85c3d9944337c2d3762ab32d7a
SHA512cf8f42798e6aff6952cbc49bfc928179d88035c9c29d52149ec918d4393bdfa94450dc7134bcef5e32bf5878098584e1da0dbb60432352c5c13c1f2dbbe4c4cf
-
Filesize
44KB
MD53cd4d6ee817445c99aa58a6e44b0f30c
SHA183522695ae9770c4db029fcaab1b9a408d99f8c0
SHA256a52fb2d8e247d443107d24320c0b81c840be2f55e7ffda9d59f0c9b3a84e8ee8
SHA512c2eab443af045ecf0986a922c9ed4eff2bbf5b0f5d6d7ff01cb15f16a3a7cb498957216a3582f103712fc8daff85a4867212b08cefbeb205b1973ad66ea9ecb0
-
Filesize
264KB
MD52f46207cca82c3fb824d269efaf44327
SHA1aa4d05942ede94c0574e27ff2cb8e539e00c9044
SHA256a55e4a13ad6383ea79e6c7d24216bb2fee84188eba7ebc9ae6aaa48db1ddbf2f
SHA5128b07e7bc1f47f795f40c9f2336e4e935544abf06ba42902353f7c88f5006d7eecc880201758bc1e9a555a21a0a58d46d1292b880805fd52c46fe70263635d570
-
Filesize
1.0MB
MD55c4fcca467e4047e84dac91562899aca
SHA1276a7c15bf6cb674df8a7f6bd8160a5c2ef13b7c
SHA256b9904e68af69f98f02c54fb2db31009a80e826a0a4940c36e44a460c19dcaf8d
SHA51224f3fd13e21c6be0bccde1c6a9a04d04219560dafdbad050c835496d96d609bee711792f54fcb39514cd3249be3d7ef1b5042c66357ae4a5c397aff967a78aaa
-
Filesize
4.0MB
MD5c5fcd02caa47f55cd4672d5f4d84a8b5
SHA146c572a1ad576d75cbd08afcf73f10ba38306acc
SHA25623768f521f071f35f0f2edf7f410b3ffd35615910934de3b981ef37f4290f20f
SHA512f99761c06ee0f9b5e61f71d78887bbe03d578db241df8a0c1a5809edf5fa70f16cc6a5ca7895b66ee748b0081e148ec08c77e04d99cc4c84968608c47bddd81e
-
Filesize
46KB
MD5bd4ff1e82f332e333ae04b61eb79d79a
SHA1b3495759a79ce73f2b216bba2e3c7b1109058cbc
SHA2568b65127167c1527faff370a7667690de38d4ec37be3fabef041686d1d4a195eb
SHA5124582912a93b4e815464fc0fb00135543ebf259617f51f28c69697139b29de4ded2610cc5125c5221d9d8960908641e66143aef91ad0811588cd17da1a4d503d9
-
Filesize
37KB
MD5f31a1ab9f483d9db21349522e39dd16e
SHA101a275d7fc1c4f578fa506c8e0bf9b7787dd4806
SHA256463800c9ec072ae72a4f6fdc1f2f779c792cb7ceb6f57c7d1231eabefad2bd9d
SHA512cab9bf13c36b854bef939e1d09c8d896caf1d7c20f6948f70f27eaf2869e49c8b9be728b4c95926ba869a987516a79d3193d416b0582b7570a58269c8caa7603
-
Filesize
20KB
MD5628ba8d31375849e0943894669cd033c
SHA14fa6d50a37fa2dadec892474d3e713ef9de2d8a1
SHA25680e3440c312f921afe33a7d4a3d11d1d2dc7162f8f50b748b796f424441d10d6
SHA512d4406493dc8767c479460f3039b038866549feebf392280384da08adbcad2e871720d046220cb67ebe3ab75c14e06a31df2fa7c0f2c17f91eda26ba0a709d27f
-
Filesize
37KB
MD5838ff1c9432529e8767cb82eedd81504
SHA1b19d6bf6d966c59592600097d27bc4dcbdd20bdb
SHA256eb231ce985c270c3f38016ec8095b7f350952f971452fe6500d8c62bb886a97b
SHA512f1239ceb6d557b06867e5cc487dde32d72e035154de3855e52b4e66d2aea1582b07c0fb0b0a1a1369caea3e58a876fdf24255fd774e9b4417376844abe1574d4
-
Filesize
25KB
MD56f0d8c2d86b40b21934ff819a3961667
SHA12e411280d2191d0f9732fe01ebc522aa87363b34
SHA2568ef59cad09decea1d3b42a9ddd4a9b25a6c7d7bdac03d0621b4bef1448276c88
SHA512b9406b8e4f3ca0fb1a45d3ce677d12a84c83c9c1039be109b0002c4a42435d68107cacaec2e07474b7e9d48e6e00df1734e33d1b18d6aac7a604ea6500e01024
-
Filesize
20KB
MD50f3de113dc536643a187f641efae47f4
SHA1729e48891d13fb7581697f5fee8175f60519615e
SHA2569bef33945e76bc0012cdbd9941eab34f9472aca8e0ddbbaea52658423dc579f8
SHA5128332bf7bd97ec1ebfc8e7fcf75132ca3f6dfd820863f2559ab22ac867aa882921f2b208ab76a6deb2e6fa2907bb0244851023af6c9960a77d3ad4101b314797f
-
Filesize
56KB
MD5a3fc500be9f5c8dd0f13cf52ed7a551e
SHA154a21a2c36b2a39f3d219e0f3bebe16fd35d4b0a
SHA2564bd614768b6b3b2648bfb816e4f19cabab02a70ba2b4668763cb6e8cc0cae1b8
SHA512aa79a060842cf41d855a8cd37563f5b9a80ad5e1e12f1dab6d603d12e66b36c42ffb995100fd964bcf690bffea35d4f7d58b043a4f33db2f9ba3434f511465cd
-
Filesize
53KB
MD58fcb818bc23425964d10ac53464bf075
SHA1396f40d25a7d38eed9730d97177cd0362f5af5d7
SHA2568b56333cda4211c50ada778d598348b8a846d557ed9117d8b265e004db31e9f7
SHA5126ec7588257bd1261f9b2876c3aa57fba2b6bdc33a2a68830c8d8d539f449c552cf6923a5e8afb5e665d12cad253a10d68ad665d9eb74ff8250c6daf2f61e6da8
-
Filesize
73KB
MD5670f33fed2d675ce88331ca66a9fa3fb
SHA18f3c98a08799216cb883cd67c06be75188ec1bed
SHA2562ca008e2aefee1a9e1f76f0183926ed6cbaddac56e0eee0bc85cc76e37ffb528
SHA5126c4f95780f0b7b97806bd9e898fd068b0c837f4b8f14d771e799c8850aeab423c274f4a2a24ca3638740a17f1d3daa00601b8da7246b0088ce8f2ff17192d11d
-
Filesize
132KB
MD501088b35a7144b96e1c65db9ecf5aeab
SHA13d5b4a4fafdc3867adca4a4a640d6296bba06f82
SHA25666616d0b8be2030b1f40d1da2a80bdf930172335226111b7965a4480bb584f1f
SHA512bf639e6539792c3ebab0ddb646b795a1cb14e4359fe97726db69ba2e082debdb920c15d5eb96a552613ead61ee4320de0331c02aaba3f14dd83956cc7affba89
-
Filesize
22KB
MD5f2b3b5ae31aad5857de6b472b4b33502
SHA194b2968bcd37264d68fbd1189eea5271bf0399ff
SHA256afb3b56c3fb32ea5657cfe81ed543e4f216ae5496476f567a1c800084ec6cb03
SHA512bdb04854ca0a9cae61cf4c3e3a48ae40776a19da50d95ad54486c0c07a083328105739d8dc0235185f3d86d5f5a3104dfbe92c31357550803946402949e73b70
-
Filesize
54KB
MD5746a7e21d636ee24726ea23b1818d647
SHA10f39fa94490c24b954cec8d197b4171dd722c9e2
SHA256923c728e920a26545eeae1d231e7c9be06aa128cba092b47d6f8268459089066
SHA5124395f56725dc2b9c58a65740a4e8137f96080b3e88e382bca996e7c6afa0476d90a93cb32009de00c9eddd61fe598ad7973bd214c616ce3f26b600e88530c7d0
-
Filesize
19KB
MD505fc6f081e0756bfad4782fed25acdc3
SHA1b4e2f791a47a801e56dfd49e21545500cabc4ced
SHA256b3e69a4234a4bf932302a0025ccdb86ea0d958bfc80454801b50c3bc155147cc
SHA51285e5b37d36fabeebc00249e99645637ff48ecea6cc6716cefb73937ffb5c2e59ee5f4f543633022da0ea9b735ae29893464245e0f5daab06b699a62a91a8bf93
-
Filesize
21KB
MD5329dbc0fc2ffc416b29bcb919df54c63
SHA12ce4525aaee6a876df4f866dd85250bae2385572
SHA2564cf05494e7b784b7dfab5fbadaf457aebd3040471f8751c135e7440c91d7c040
SHA51214e25ec3a04a912d5309118d6410d9ead8f106f032a961c9359006fdfb1599568c22caefff49eb4abe0050428d5021618f1369f25de4c6ab8f55213fe285b612
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
38KB
MD5e6f8dcbbb1b37bbea0a7cfb4887fd652
SHA1a44cca2690c3f7ef44978c7e92fbcd7020a058ea
SHA25619e48b1dd86e2d92f79969fd64ce72b7ec04acf7d5319ccf4cd1fd880ff1df2f
SHA512f5e64427ce088d431a1010600deec3fd612dbec179d0565ab0d327c43fddf1e9fb9215aa8954cf74e611ef6177f5a6d093df0266ef3b432f284235862b2f926a
-
Filesize
43KB
MD5342100a741cf219c9f87f45dd8752643
SHA1bc5ad36be483addda879dcdeae945ac7bcb24b21
SHA256c5a363800b5fbfd756cfa75fe4a79f5a6a8a017239f36a6a45b5e6fe98ccb6cc
SHA512e8185a57d47784c36fe7d596058401fdac15c87d2844aaf8c8839d2b7922cfeaea436e6b4a33bc92f5019ea11eb26d3cb3477702ab9ac36b962a4d5325ec7f78
-
Filesize
47KB
MD5b17e3a3034083ce4ba8422cbc08e1a90
SHA171f619eec1beaf87081863a6a83044bfc870117f
SHA25627a4040535605e5886f502ca2662d4446d9769cb18ee67174f6e3c4dbca49385
SHA512b9aaa5c2bc7034d8c69addd26a55c0f3bf235bb42ff9e8adc9b273137338a4a29fe6d2b2ff89a8a6b62be9bc87da1efb2b1beddd3337a111ebd1dd0a44e125d7
-
Filesize
29KB
MD57ae61ee60c248f14713e309113cbd134
SHA1825e71bb97016992a5ae1d9de672741a872e75c8
SHA25651e6af46805d9380c32cd8780c33d2059cbb407f22c281a88b89d5e9d78057b2
SHA5120d9752d311ddf0f871050140198eba40c84ced1647d3ea02d36e201ad32e4c38fac66c25a2793e5452aa5a06c3ccac21c06f14363c02419e93fc99b644b74aa4
-
Filesize
52KB
MD5d5c166d139791e565edf9b14b08c02a4
SHA1e0fd0d5d52cd6aa616e4d18d1fc58cf9873b953e
SHA256638fb893c7dfe2efc327386c1788d21068f75c88cd8079448ac97abc10829777
SHA512a17802a9ea30273516fb425b5856be28a55e56429e7cef0537f298cbc1fdae653382ac602d95945b9e0064706b06fd61031301d313e6f34b6e815ed903d949fb
-
Filesize
26KB
MD5edd3756b3260e291abf572ceeaa05070
SHA1d8679ceba78baeea703a4aec8f27efd73146add5
SHA256626e259cb12c149f9ad451f719fb38d1bfa0ee4fb7cd6c85c873d28db12baf2a
SHA51299d687d53f6cddbb87dcdf3a4e57c2480e5abf5784dcce1b1ca885604bccba529bb31b26b043bad5cabe42ec6212638fb3f415a0897fbfed8aa971eae706eb0f
-
Filesize
36KB
MD5dc096c5d553696764d71767946af20ed
SHA109116721b2c06dfb87979ce96e5cc3c0fe1c46d3
SHA25656932b5bfa7cf323acf9cfefd0708c9c2c7ec000ef932219ba025029a15f45d7
SHA51210fe4a51a06e689d59cbd87c868dc14fce21845a7104eacd5c387b15e14eae14c15cfc9d5fc563425deafa27a7ef9f67890f388ec920fcc3d2dac7e110fb2dbc
-
Filesize
39KB
MD56304950b79d6f81a564665130a60402f
SHA1950ae5d00ebcce7c9a0444f0a7a9414e769e7e3f
SHA256ad5bc704cd46fe929c5ab723b28e26ede9308d6b26fae2feb74b51710e88d0e4
SHA5125f37076bb74e5b7ccac09e20a104c7da332e09a01d4ba9ff66444c77be316303a62f36e22a9a1b324044adb25e301be6ccad0ec01a49f1d4720b6c1f861c41bd
-
Filesize
2KB
MD5d5d8361616b00ee77a39ff626f55fc0c
SHA137b4d03e7a639fe949f0bbdd344b2a548f607b08
SHA256892c8c02604cb85bd73751764c86423e1ce45c0ddbdf474da0e3e15e1eef8f02
SHA5120a74f99fb61ca302885d757f25337ae27cad8443fc4e19a675fdcd80ad93f08f64f234802b44e74f0415a37514f3d44ae8f2b11968cb47d90201eeee406435e2
-
Filesize
2KB
MD5a588e63a4c17c5bd8504db5a57db254c
SHA19db1f545937fb8a8913aa97ae56f43e61a0123e4
SHA256498bb9c5feb117a1fbc569969672f92d1e6402d862fa87ec0a176ffee9657819
SHA512c7e8778f90f2304583b2a012ca0b8ca6503225993bc5995d554211be35b212f9c9841c58efdb7207e3144833f9d7583a5c1bd6496e9581ef0b1abaaef59a0e99
-
Filesize
2KB
MD5587c325b6817230ce0c6566c6bca6a43
SHA1bab3adbfe69f254279c1aeba62fa93bfdf86a307
SHA2562938827877446ed5f2032a08a4762c082a8555513d0932ddae8c50581966fe6c
SHA512a6564bb7771a775fbd6a735f6be9cd06f7cd4e7423ae17b3e2ecbd1e5ba0af1fe197e987f8ad37c97c7b1a376adb68d41c75c1080c4b01b9f2f2d2fb9482967d
-
Filesize
2KB
MD560310bd2dcca7cb4d67671e30447d3d1
SHA1a0374ea582a899c5d91a7b6b84001751cf53981a
SHA256715098f0b0d12f345af793c3ca81920afa40a966e19aa56a87722cfc2ab04814
SHA512fbfd2e328233428a36f3c3799b644e199f8cc75d977ab7733150b2b1197cad383d9e656f61ca46534fde57840a174f660bcab0860794b547690d5ce5fe86c9fa
-
Filesize
24KB
MD5fa790900b129295e8c24ed16b49cb527
SHA14fe1ee8f4013293016330ff00fa1819bec7a6c47
SHA256d472dac6769f17648101a6b23c4c0b633571c223175a173900535f25095f922b
SHA512bf3152e9bcd565d8acb265e4aea8799dcaaf4ea633bfdf2d42e581fdcdf4805cae429a82778ce712e7ad0802a29619258c0e98352313b30fd01d54e2ea538040
-
Filesize
152KB
MD5c61f74b14f6347700179e9a4fe676bde
SHA1be09f9c311404d90604ae8f6c076ecfe8b350dfd
SHA256789157bf99ea5969677a1013bc04fed67ee0c340816c52a62d6e0d543543f7da
SHA51245407170cbf201e12d4558c91a2a0f6a8b488b8c023ae78a0f013a8e1ba1de266e3916e1aad64964d60c2725c8f44fd144a41f0b9f6c6db8802d5f1a54a6e44d
-
Filesize
20KB
MD5923c27e9d1faad4ee85d84c14c25bc4c
SHA16c7f69c7eae14ec593581a7a66561da1d1c1ffc3
SHA2564be6faefe523ed7a787d5554044988351844fe5e8d51a4b849bf5c5fbd969aa7
SHA51250ac50054951cac241c7470f8d9da6407607810dfd8ed5f34b8ef6b894bd6b7d04159336a5d1d87f5e6fbe89de04fa46b6f2ec257de0697dd136b939cf0662fc
-
Filesize
2KB
MD57490e4f2bd3d76a766e0f7939ef3e4a8
SHA15af9a89c80b51543871fe30870dd6d5691f64e6d
SHA2562621ff2598b9fc11ccabcea205af7b7516f9a67d7fa04cffe25e294d00833b34
SHA512ce95393ec2f07efe3e30e1672773757174aecb4a5bee3667327b3f236c348a297e6f1ab42ba1a1d91488ecbbc810be49ac61f4a70aee27649350fc367a277454
-
Filesize
1KB
MD577481cc69c1c731aad5905344e90886f
SHA1cd526f4e11388a8024512a070f5d4a21047cebc6
SHA2569fa1611cec827a0f9bf65f4a0f2406b581e0b8adb8a518a4f1f6dbd2d751ad69
SHA5128fcb01d38110dc206be53013adca612c781891d9ec85cfb804f41b4bcfa8e0df8ff9617b105906eba63f2c4d926a96f904fa24f498d5190d9c2fb193db114847
-
Filesize
2KB
MD5e2d8040da72bdb8a4eb3f87a2836beb2
SHA1d79b56befc49a9784b8f43257a3a8de663b1d0fe
SHA256a8d0465f691279087e756e037ee2ce9e498067dd5ec4cf86caf94fdbf3d1ee52
SHA5128b309059cc2ab66e7bc0f1171ad1b1e35608cda97c1a0bafca4bf2264ce0dacc3736587458b08ec25d9adc040c0dc4841259c165b15beb34544017ede915630c
-
Filesize
2KB
MD566a5017f121d73e2b1639e863aac6113
SHA126a21bd0318726b54d80bcf7b5af81f82e75a55a
SHA256a404b65c239020928f7444c4bae76ef70a51eebe7a0d2704ae393bec33f5d74e
SHA512341a7734743f0bf8adaae8d7eb9470a07acf7e95a571edfb8d0c27545c7e79be80d7a169930abca07f33f1053d6e2c270495164b0d6b2d38e8cf5e138046a38f
-
Filesize
2KB
MD50103554aca897972b0de46184d2639b9
SHA1d9583bb32dcddfdb89305d54153e35aaae9b0891
SHA256b36cbb82d15d08773c08294ea3ecbc58adb9dc4a3e41f676547c89bb56aabd4b
SHA512df8405dbb9ffad95eaaf3f4ad02ec177715d42ae0cc1e8b0353229983df513490c68d58e1eb4f1bf2996a4ab4ce502efab60cdf20d175d87a2c71cf0a39d348a
-
Filesize
36KB
MD577da33e20c037077b92b359e189708a5
SHA198355157fb1eed6ad72f1012a794faa7fafb0364
SHA256213863a24f97f4bd14f6cd2aa85e78b8fd6ff7534323fd608b05e5b98e6cc49e
SHA5129e32e40949cec8f310ce63ec8950a752a94323fa656bd7684c8b8da5571c2df6ef582b9f3aa74f7b3b7ffcf57fe7ed1eb0b268f80710d6a059002e49639e4490
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5170ce21b4f44210528804d4c0a1d2c6c
SHA164dcd26d302f803fc372f4a0ae4442a6c304408e
SHA2560bba72d7c556ded363d6c5541d4c3173e8010c5e10d9a277b54efd46dd2ff96c
SHA5121cfddf4def04b8d84bf24ce79fa68237043ec8cef356289d06f135e4e8d1d0a72b51781258b3a9b5e241abb1e86aee945f749cfcfcc592ccaa01489247b8f0b1
-
Filesize
1KB
MD58d577b47d857e1feda8b16447d9ff14b
SHA1b703e21855bc7dc65b99e7a05b09db96395b9b92
SHA2561e951c80b0738f215e180691b167157d3f8c0621295cec9455fa147b024f64a6
SHA512f9f541df6e3fbecc5c9014a084b2657450a7efb1bd63f5d1bedc6c5d6db22d552be7fedb2ef19531480a931e9986634b7693c5768ea9fa78d9ea9699b1cb418d
-
Filesize
1KB
MD54fd74b005a6be5a22732bfd6fe32162f
SHA1a5bf91655362e4e72f86f6174963b6b015dd01a1
SHA256951b9092d7b77dacc8510ca7e8e2813f89ff378e6e55ab2faa3e083ac0222df6
SHA512539cb757d5d28ba7aa36d6e3ce4d99add7337b49bceff383fbeef57124d30825428be771c93c24b27bab605ac2e87fd2e7a712e7e0266a12251ef3292bc6cd05
-
Filesize
1KB
MD5b7485b90240239d03e487ebd4c64014c
SHA195c7516290e67050c05322aa11738ca683bb88ff
SHA2564fee05db4de1bbd8109b35602273464e4e140c9b34e7ec281551419996b8bb44
SHA51205ca18bc5e5eca7b5faa20e6137c6cc910be9158c3c78e984b11cc5a34db1b2a19664965bcb8ed10ff6dd427a49f2feca6cc75fcb78e114d435f917ae6f1d1c6
-
Filesize
1KB
MD5d4d4e3ad2b80b0b262809801a345d188
SHA14dbd109a1e497f3247da835a789691395c2d09c0
SHA25645339fe24c21c83de9182ee8ad93f34e1ceac61c416e36b089703b35d708e074
SHA5122b71b9d3e4ecaaca8dfd9712b8bc283682c87886c94dde442ee0917b22d78fd562b83b3a7682bdbaff14b8bcf6f7eff382b97b2ddba6a62ef54758da17f6732e
-
Filesize
1KB
MD5e4cdb4d9ad006ccff36189c1db9b990e
SHA10ca8b40157f3605f27e5f4def342fff922bcfcaa
SHA2562c6f79a1720e5660546c9cd653d9b2605bd44ffe56a073ab583e70c9b941a6d5
SHA512cab2a49db399b9fbdb3cda3a9247625f928b755c2b00228eda93bd5700295877d74af70d2cb29b021657239bb7c2a755bf8d6aa0c9684ae1cb9a4fc2e4db5f67
-
Filesize
1KB
MD5899abacc353e5410f967519fe1939f87
SHA1f5f7325cb01b8fe748a1e1560239b1d9ab75d0f1
SHA256d554f3535d3abad780946b75b97c9b62968164e30a02710dd3b3fc8d38441001
SHA512cf9d2a9b7bf25f471272fa84826e9dc65164b0c788d3810b3e8905595308432fa7acf508829b1f541e322390dbaa420330ef1e0b51f825e529606b6475102c9a
-
Filesize
1KB
MD54e7b4efd09e22e3bbf1fc0f890c0398c
SHA14c2f384b42bd33cc5e21126cab1afc6074f8ddf5
SHA25625a8a970f51cb0c4e573366cba219bde9865338897cef6fe190af0fdd92b36cd
SHA5126aa3aff965a6bb40e3351ea768bc3553002084c38d7b42ae973c9c6f0de7d16c8fc4b8d2961929d430a81e78342acc92e81d5b31fd0a0b673b6c104fe84b3b2b
-
Filesize
1KB
MD5aba92eb979077c39e74403d983262c9e
SHA1cb4f81bcbb8f4ebe39aa55ceb1c77d33ca38e91b
SHA256a7a739f0522096bbbfdad642f0f1f3376b89653d57e6010126241e82bc07c071
SHA512963135c676a8c5dd37f66f0292c1efe12eaa06aa2240f1a325f052dc462168d59af9a21cb67605d3a477f8ddec46558291b8acaf0666785b21994b4871c91832
-
Filesize
7KB
MD58c1f2e70afb78912b76492878530c3b1
SHA18932301f12f7f883e25ccf336258e437267acd3d
SHA256ef30007929d706a2a4eb37950af92b95f036716c09afb27262ae97854c3cbfc4
SHA512935153e62fcc1c95938ae29f6432c52ac03a7d466d2ddf9d7309f5dfd968989b8d4caf8bd30bd14bc8be3cb37bdf7f51ea6fc72f429987048288fe4a1eae006c
-
Filesize
7KB
MD5c0ec14b8e2638e13318cd7ae5ad2409c
SHA116a5d7e189f9083069a0f7b6955bdee59d3b9de8
SHA2562e9f4aaded6731a6c71d695eafb0beca880de5a055534a75528efb2046c4b5b7
SHA512632aec83b4a7b5c69290871707fd90e543970c8a432c5e6bcab5b3f0cec0504ca48fd586d3c0eeaf9c59218366c190c6619faef7cb9f633987dbf09c9d4c90fd
-
Filesize
7KB
MD5e1ba24b9550e6c114a1cc63796b33064
SHA1ecdd5cbbac5ecfdac21f5adda4c92b760667d878
SHA256e251e072c448e3a952be5b8d86c9e461b7a13c6287d52821ef627d1bfa68ae42
SHA512da26996e01e8878410be0d0a5a6893f2f18cf2f0ac6827a4d5a836d7f017fe6f89f122ff48107156a764bd50b58a0a0bfa6bfe09b715e8ee41f5f8dfd265d78c
-
Filesize
8KB
MD5b89607a6ec7d92f23789bf6493f48f54
SHA122f6f45b30cd6ffb230c27feea78c57d1a0cbd57
SHA25653f03916453d57a9bc2577c66d20942a8f0f41f2b5dbf960688b0ca8a74bee29
SHA512a6ae30d043c32bca6352162f13c7c6eccd0f7f105ed72152486dddf713563c03e85a333bfc7a39a2b777a323f685caa2178303119f5cbfa7d03d1efb8f218425
-
Filesize
6KB
MD587a4f5f6e92bb868c13e2307e8383b51
SHA1a57efc8b045e676b70c34a1791e89f23dead4e0c
SHA2567d00a767b21d98c6ece61df5e1ed51e4212f9b21e72a64a75c334c4f078e3caf
SHA512c32bb64fd2b4cc8c81647d898b38134089ea0b2228542b2d225a78ac6827e32094041db2290965fec81b1a3c388d3cfb2d36390b3147321d08d8b59c8b4a412e
-
Filesize
8KB
MD551431c73a920557d109d4cdb6a631812
SHA1513b933eedab61e8951501306e4419f224d45f5c
SHA25653915eefc6181a0b0af93301260f03cb073539ef8ca734e75b9c5ef652ad6ebb
SHA5127f41a77fa0ffb9b4b440539b6c5fe597ce7309c02b4e83fbf85d720b9f7bfbad084cd776eda86e3f50d790f910884c68cc290f7e11ceba48f9419d27b3fbe80f
-
Filesize
16KB
MD5c067989fb451ce56c1aa9ba4e89db7db
SHA1aecb106c7d5108370909808dce80ba8b119845c4
SHA256062fc42a8b3d3038ee4ff05f3d2a0612371ec2ced756c51ed5fb2b22a26d9d0b
SHA5125bc5276e42dca4388f9a19c206260bc2df1a452146ce54f664c2d5eece088235fd592875c62952a1eee04d701dffcf70daab4c472613d8f49f0bf8d55ea9da21
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000003.log
Filesize184B
MD56f79682c131567de31dd1b07015ab556
SHA1972307537784408efc599269c9c0a1ac8d87bbc4
SHA2564959b0069c36f11e1d4965582b3324438ad44124daa76e9239c3fc6f9a5b2b89
SHA512640e9f5f802e8f8638a108c0dd2726784ae9100cf3d87c448daa02563751880bb22e1023a5ae430250c944f7e1d8884c18487b7aa7a906cdc7c71d616b9531c0
-
Filesize
348B
MD5155a296a675bb4040df995f04a4a1ca7
SHA182ba622956a40936ace73be58d290e87db26170b
SHA2562a3696d0295f7d16892801243b748477098893f8f64a4cbab78b31cdc1cb962e
SHA51289c105acb67c579e898319de91965e285ae313511ffcef4242204af7f777d148f0c2668fb572537e7a0eb2a929c940616ff4340b07ab5b3560988acc5072aa8c
-
Filesize
15KB
MD5e2e2f549126ed05a620ed4cc19518e98
SHA1ac1830c971faa77dbbd8266d19fdde5faab30f23
SHA256cc4cd2a43b481129e1d02c6b9f878b62894ede42ca2d5a10dcaeaadd264eaaa5
SHA51280090a5924ccae8ee583da93b7aac7eb55ab33da0ce9a09137af516e8277851c4cf318056657a3fa4d03dd6f6b8bff91819c27dc51fd8416a17687979047a424
-
Filesize
324B
MD509ca9ac29595b0b8155678392a0dc55d
SHA1cf350c1c5bb7262688df6e2b121d74561d983274
SHA2565e299a6cdc67726955529bb0e2471966df77d6c27b2c9660b26d4412cf312377
SHA512ae083df70b4f088a2c9b54f3da57376bb76422863f14eed8e42334d824b3ea5901447e294d32a966fdec3ec7ed6e198bcdafc53f8e6345446436e45c1c1b6bac
-
Filesize
128KB
MD58764888903412cd6d84d944927fca848
SHA182ce1a03d50e8ddbbe7fc3fa922464bf2924958a
SHA256a73327da0a4df5a98c3b700aa6fc65873be1a51286e7669f128cda504ebee2b5
SHA512cd5ff26f020db803cc1a4ed2146040ac69e2a1579c98e3e12734d17569b30dc2da8c3312acb94f57274c1a6b8e6d9f8fbdb76df17aaa5c427994ead57aaf384a
-
Filesize
100KB
MD5cfdba722f6cb2a9a0d97ebeface52818
SHA160e70dedaedc19c907b6a665a1fdf7904a94b787
SHA256cf7c7cb965b011b8634ed775d8ac30abd809bc2d34a0eb02e9a90285b68aa4aa
SHA51287f0d4780a8f8595b333fb7efe505712454dde4c657d70bdcb6549a0f3d886de7e9d9642447ce3d7485243e1b2659da6ea83d57a462d2a8575b50cb22c9a8473
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\dc2c7fab-b687-4e1b-b767-8ce81b777bc8.tmp
Filesize7KB
MD58a6882b69ce00b472462c6b2d326ed82
SHA14220e35fc03fa15229a60ad4de468529bf0e66d5
SHA256eb0eff534625ae7ae2878ef8d130c58e535187b72750ec9284dd8ad21ab46bee
SHA51204c74511e96e06b890a7b85b39a0570f62892a403b9cb924c1e664c7519fa9cc068cd417f7804aae4d0d54b821e0e3e76ffdab14e8a20551bac94e29c3f210b5
-
Filesize
14B
MD5009b9a2ee7afbf6dd0b9617fc8f8ecba
SHA1c97ed0652e731fc412e3b7bdfca2994b7cc206a7
SHA256de607a2c68f52e15a104ead9ecbaa3e6862fdb11eac080e408ba4d69f1f7a915
SHA5126161dd952ae140a8fb8aa5e33f06bc65fdc15ce3fbfe4c576dc2668c86bce4a1d5c1112caee014e5efa3698547faad3bc80ec253eedb43148e36e1a02ce89910
-
Filesize
144KB
MD52ce4113ee2f2e1b24ac1a4e1b39a173e
SHA1b6d9516a64720634ff340233d69febc3e425406d
SHA2568015497fe90013388824989ae36397b46633ba09f5472beb36c74c9ca15cc92b
SHA512c97df280da3bbf1699b95cf3fc122ce15c34fa0f4d015f6780278d3e34d89dca10bbaa4508ba4c11128e70f9f8f4b2318c8d6fac7e71c3e15f732197973ab99c
-
Filesize
144KB
MD50daf660f0a8d1daa393c491607a6c3a5
SHA16f572f5710c57937411a11c8f6715e0cf1699135
SHA2566f31008482e93ee82bce9b19adf6838960fbe6cf5b2d30ad7693d6d200862f76
SHA512bb4721a9daaa774b80473029d095eaf59aaeed20ce71679361571ede1e54f010d2666b52e415fc2e375e2e4883da2688c5e20d9f0e231bcf191f4bb74d259efc
-
Filesize
285KB
MD58b4a18f2689ac37f7db1350d7dd6a3bb
SHA1314a239070ad326b7df21fb3d494579ffe8aff05
SHA2564dcebc3659cfc67a1ef4f3d85d68ee90f509972561c1ac15ed249fcf883282cc
SHA512f783f60e408a929044a27e0da966a3d9c79cbf48799957bf761bce54c554a4da16919cf96d835ff1dd368d22534cc150dc9633fa1fe34cd81d9408b330260b2a
-
Filesize
144KB
MD5d5bdd981e57ead8a91f5a9e8d4c1123b
SHA17f516f103cf04709a765f8362c56777c49af6c94
SHA2560ef3cc15ddaf9fb7d1ef974bf08306e3410dbd1252874460e7b61e567d2f5c77
SHA51284ee6462d5391e502edf3fe82bf6a542b15a152d8be190136c417da65fc835c84dbed25bd833602348f4e4bddf1fbd90b33b146ab84ab983d1fa3df59ffa33ea
-
Filesize
100KB
MD529972fc020074d3817d87924f4c28be5
SHA110f7948f8c286964fb147019efc0efeac7d39c54
SHA256d5983ac9193401c8627fcd4328b0a462ca02446511f84e8af7ae848262298f06
SHA512b63506de78da66d64d320ddc15541208ce2ebd2eb53188263981f968c43542c8d8f25331e18bf57bda52c1d632ffe12b83b31295605c3841064d7b6eb020cb37
-
Filesize
97KB
MD51c250bf0832f2187c46ac185cb75c59b
SHA15ab8d0956272a2f7a829be42897d37775cd747f8
SHA2569a6ac807bfdedc0a65aea4c211e1c623f184322f8688559a8c545467a2ae22c6
SHA512aa83c566087f12ce1c79637027a596f5071fbb46cd96b8058193664d70fb48cf9bcfd5ac334bdc77d8eb64aab73b43a3f2728b4e9b5429db9d3563711b59e090
-
Filesize
100KB
MD532e592bf97309c73c82baf989f81bf31
SHA1fe70b9ad854b965ce3130e142cd2dab05224f44a
SHA256d5e3f92e957b29711a1f2462a12e24417bbd09d21d85d885fc1e1b585fa64323
SHA5123270d3437cc36d9cef67c35841b87b8e24d337278002e7384facb02828148fa74a3d49a36d8495eab7b9f0b202cd30966d7ffc078d373ae3c6b979a713285b59
-
Filesize
94KB
MD50cbb3cf2464ee1c39cc1d46616c16c9e
SHA1e1944c49e3f2640a7cae2c4fa905f304317920b7
SHA256a94eb07896e4226c81d299ba0f75273dd9c2cc5e245fc90002c0535450488e59
SHA5128e2df6dd3a39801faf7d03e52b5e79256f03a6c3a5be69b34addfae4997c87d4403387858a0c9c10aa4e10042e2c736a8c0e1f65fa94ad8a6760a72c3b36e04b
-
Filesize
264KB
MD514b7dd81c4470eb481ab5303b55129b6
SHA1025e73b737f2bbadcb37ebf0ec2bbc6089b9b18c
SHA256792fb065e3305e1ee659268b1762fdce026441779ed92166e438715726ea29bc
SHA512ca5cc3fb634adfe66a8d86be97eb3b56a4f92500f8758f6267ec3cb9b9fc5c973c1b67a28bf301b476634538ecf03e8dd01dd5623b626e961ccc0fe9ff13c798
-
Filesize
85B
MD5bc6142469cd7dadf107be9ad87ea4753
SHA172a9aa05003fab742b0e4dc4c5d9eda6b9f7565c
SHA256b26da4f8c7e283aa74386da0229d66af14a37986b8ca828e054fc932f68dd557
SHA51247d1a67a16f5dc6d50556c5296e65918f0a2fcad0e8cee5795b100fe8cd89eaf5e1fd67691e8a57af3677883a5d8f104723b1901d11845b286474c8ac56f6182
-
Filesize
384KB
MD554bf4aa53f3e467cc16b8eeb2d64548e
SHA1b5c14a1c3e8e270dd86f20f732ba3be0330ee79f
SHA256824f8d90356a28148c97943ff976c1f68cf9ce42227c8c7ee682d1395ef47f7b
SHA51237f60da444255ef87b7c5d1ca1dbe18784c09d2f2c9abe2b04a55e1d3ae016237674d08e5b5a24c66104c82af77b1adf0fced68d53b004143930537e49db77ca
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
4.2MB
MD55806c691583167135665b6aac348d3b8
SHA134d14feafac0946097fbbc03e3be2b235392587d
SHA25600cf66b0bab94b1ae74d534160a801315df8a7efea764cda906af49f99be54e9
SHA512dbcda2362ba5aaba904087a512e3423e2356f0e824e4bd4de99f277316afb32e03d6f8ea109d4d046ba9f14fc32f21a5d80cceb982fbce529c6f15abd7c6fa7c
-
Filesize
3.6MB
MD5698ddcaec1edcf1245807627884edf9c
SHA1c7fcbeaa2aadffaf807c096c51fb14c47003ac20
SHA256cde975f975d21edb2e5faa505205ab8a2c5a565ba1ff8585d1f0e372b2a1d78b
SHA512a2c326f0c653edcd613a3cefc8d82006e843e69afc787c870aa1b9686a20d79e5ab4e9e60b04d1970f07d88318588c1305117810e73ac620afd1fb6511394155
-
Filesize
2.1MB
MD50d6fc3ace016c93aee727de88e129563
SHA1b7ff775554b565c2412209bb13a6bb101f91b269
SHA2560475c528402646e56df92200386b7aaedec2208eb03f8ddcfff64efa16b750fa
SHA512537e971007965187fa25c9051f61f92061cf9fb9dd50208958e75e687e493ac5df2c30073d2cf632b5c7c59e0c7dc4a77984e740e3eb0007f8e515656d6168e5