Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 01:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Ransomware/WannaCry.exe
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Ransomware/WannaCry.exe
Malware Config
Extracted
C:\Users\Admin\Downloads\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SDB38.tmp WannaCry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SDB21.tmp WannaCry.exe -
Executes dropped EXE 4 IoCs
pid Process 2868 !WannaDecryptor!.exe 5560 !WannaDecryptor!.exe 5664 !WannaDecryptor!.exe 5712 !WannaDecryptor!.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Update Task Scheduler = "\"C:\\Users\\Admin\\Downloads\\WannaCry.exe\" /r" WannaCry.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 141 raw.githubusercontent.com 142 raw.githubusercontent.com 143 raw.githubusercontent.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\!WannaCryptor!.bmp" !WannaDecryptor!.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WannaCry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WannaCry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Kills process with taskkill 4 IoCs
pid Process 2712 taskkill.exe 3376 taskkill.exe 4156 taskkill.exe 4804 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D02279A8-5C39-11EF-A2A4-7221D8032630} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2762644968" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2762644968" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31125574" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009a7bf3bae5f3a549b81f23758225dc5c00000000020000000000106600000001000020000000bca07cf4d2d2df242bce837c11de7b24b36e3b8304a7e04e0e9b4e278f0b9331000000000e8000000002000020000000c369c754bd3d94a9e6d032ad4c869c295198f11191082c17454909ca25fc078d20000000b39c1f372593f59244afbd5ebd589b760117227d0d125f81a155324ca42fd4ae400000008d5742775d22ad914753a92d245aac3f7f23fef67508e8f95a47ad5c3be775b613dbd02ba951f4094573b0df8af4addbed4d2e70de0ba8063331edf6fc957044 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2768426312" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31125574" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e7c5a846f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009a7bf3bae5f3a549b81f23758225dc5c00000000020000000000106600000001000020000000b08b1dfe85ec0d1b56f9c5e4e996d6cfd37274dfc85b943b800ea09539b7be01000000000e800000000200002000000094ee2c1c70beaa7a48206f4a58b0cae918002c2e221524fa7515041f90b19521200000000020bb5565c688fba2b7eb2677832dc101cac7c62255bb3839f4b6bda86078bd40000000217657099b25a08a917e75757d413cc02e93717af181f481565d3a7a687ee00bb34d650318ff2c43971f3dd84cfb715f3af835043dd16f313db45b9a5434b483 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31125574" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e2bea846f0da01 iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133683325017498047" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2170637797-568393320-3232933035-1000\{B7BD8C58-CB3B-4F1C-9BF2-BA741859086E} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5540 ONENOTE.EXE 5540 ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5540 ONENOTE.EXE 5540 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 3376 taskkill.exe Token: SeDebugPrivilege 2712 taskkill.exe Token: SeDebugPrivilege 4804 taskkill.exe Token: SeDebugPrivilege 4156 taskkill.exe Token: SeIncreaseQuotaPrivilege 5884 WMIC.exe Token: SeSecurityPrivilege 5884 WMIC.exe Token: SeTakeOwnershipPrivilege 5884 WMIC.exe Token: SeLoadDriverPrivilege 5884 WMIC.exe Token: SeSystemProfilePrivilege 5884 WMIC.exe Token: SeSystemtimePrivilege 5884 WMIC.exe Token: SeProfSingleProcessPrivilege 5884 WMIC.exe Token: SeIncBasePriorityPrivilege 5884 WMIC.exe Token: SeCreatePagefilePrivilege 5884 WMIC.exe Token: SeBackupPrivilege 5884 WMIC.exe Token: SeRestorePrivilege 5884 WMIC.exe Token: SeShutdownPrivilege 5884 WMIC.exe Token: SeDebugPrivilege 5884 WMIC.exe Token: SeSystemEnvironmentPrivilege 5884 WMIC.exe Token: SeRemoteShutdownPrivilege 5884 WMIC.exe Token: SeUndockPrivilege 5884 WMIC.exe Token: SeManageVolumePrivilege 5884 WMIC.exe Token: 33 5884 WMIC.exe Token: 34 5884 WMIC.exe Token: 35 5884 WMIC.exe Token: 36 5884 WMIC.exe Token: SeIncreaseQuotaPrivilege 5884 WMIC.exe Token: SeSecurityPrivilege 5884 WMIC.exe Token: SeTakeOwnershipPrivilege 5884 WMIC.exe Token: SeLoadDriverPrivilege 5884 WMIC.exe Token: SeSystemProfilePrivilege 5884 WMIC.exe Token: SeSystemtimePrivilege 5884 WMIC.exe Token: SeProfSingleProcessPrivilege 5884 WMIC.exe Token: SeIncBasePriorityPrivilege 5884 WMIC.exe Token: SeCreatePagefilePrivilege 5884 WMIC.exe Token: SeBackupPrivilege 5884 WMIC.exe Token: SeRestorePrivilege 5884 WMIC.exe Token: SeShutdownPrivilege 5884 WMIC.exe Token: SeDebugPrivilege 5884 WMIC.exe Token: SeSystemEnvironmentPrivilege 5884 WMIC.exe Token: SeRemoteShutdownPrivilege 5884 WMIC.exe Token: SeUndockPrivilege 5884 WMIC.exe Token: SeManageVolumePrivilege 5884 WMIC.exe Token: 33 5884 WMIC.exe Token: 34 5884 WMIC.exe Token: 35 5884 WMIC.exe Token: 36 5884 WMIC.exe Token: SeBackupPrivilege 5936 vssvc.exe Token: SeRestorePrivilege 5936 vssvc.exe Token: SeAuditPrivilege 5936 vssvc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 6052 iexplore.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 2868 !WannaDecryptor!.exe 2868 !WannaDecryptor!.exe 5560 !WannaDecryptor!.exe 5560 !WannaDecryptor!.exe 5664 !WannaDecryptor!.exe 5664 !WannaDecryptor!.exe 5712 !WannaDecryptor!.exe 5712 !WannaDecryptor!.exe 5540 ONENOTE.EXE 5540 ONENOTE.EXE 5540 ONENOTE.EXE 5540 ONENOTE.EXE 5540 ONENOTE.EXE 5540 ONENOTE.EXE 5540 ONENOTE.EXE 5540 ONENOTE.EXE 5540 ONENOTE.EXE 5540 ONENOTE.EXE 5540 ONENOTE.EXE 5540 ONENOTE.EXE 5540 ONENOTE.EXE 6052 iexplore.exe 6052 iexplore.exe 4404 IEXPLORE.EXE 4404 IEXPLORE.EXE 4404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 2712 1168 WannaCry.exe 120 PID 1168 wrote to memory of 2712 1168 WannaCry.exe 120 PID 1168 wrote to memory of 2712 1168 WannaCry.exe 120 PID 2712 wrote to memory of 1560 2712 cmd.exe 122 PID 2712 wrote to memory of 1560 2712 cmd.exe 122 PID 2712 wrote to memory of 1560 2712 cmd.exe 122 PID 1168 wrote to memory of 2868 1168 WannaCry.exe 124 PID 1168 wrote to memory of 2868 1168 WannaCry.exe 124 PID 1168 wrote to memory of 2868 1168 WannaCry.exe 124 PID 1168 wrote to memory of 4156 1168 WannaCry.exe 125 PID 1168 wrote to memory of 4156 1168 WannaCry.exe 125 PID 1168 wrote to memory of 4156 1168 WannaCry.exe 125 PID 1168 wrote to memory of 4804 1168 WannaCry.exe 126 PID 1168 wrote to memory of 4804 1168 WannaCry.exe 126 PID 1168 wrote to memory of 4804 1168 WannaCry.exe 126 PID 1168 wrote to memory of 3376 1168 WannaCry.exe 128 PID 1168 wrote to memory of 3376 1168 WannaCry.exe 128 PID 1168 wrote to memory of 3376 1168 WannaCry.exe 128 PID 1168 wrote to memory of 2712 1168 WannaCry.exe 129 PID 1168 wrote to memory of 2712 1168 WannaCry.exe 129 PID 1168 wrote to memory of 2712 1168 WannaCry.exe 129 PID 1168 wrote to memory of 5560 1168 WannaCry.exe 137 PID 1168 wrote to memory of 5560 1168 WannaCry.exe 137 PID 1168 wrote to memory of 5560 1168 WannaCry.exe 137 PID 1168 wrote to memory of 5552 1168 WannaCry.exe 138 PID 1168 wrote to memory of 5552 1168 WannaCry.exe 138 PID 1168 wrote to memory of 5552 1168 WannaCry.exe 138 PID 5552 wrote to memory of 5664 5552 cmd.exe 140 PID 5552 wrote to memory of 5664 5552 cmd.exe 140 PID 5552 wrote to memory of 5664 5552 cmd.exe 140 PID 1168 wrote to memory of 5712 1168 WannaCry.exe 142 PID 1168 wrote to memory of 5712 1168 WannaCry.exe 142 PID 1168 wrote to memory of 5712 1168 WannaCry.exe 142 PID 5664 wrote to memory of 5768 5664 !WannaDecryptor!.exe 143 PID 5664 wrote to memory of 5768 5664 !WannaDecryptor!.exe 143 PID 5664 wrote to memory of 5768 5664 !WannaDecryptor!.exe 143 PID 5768 wrote to memory of 5884 5768 cmd.exe 145 PID 5768 wrote to memory of 5884 5768 cmd.exe 145 PID 5768 wrote to memory of 5884 5768 cmd.exe 145 PID 6052 wrote to memory of 4404 6052 iexplore.exe 156 PID 6052 wrote to memory of 4404 6052 iexplore.exe 156 PID 6052 wrote to memory of 4404 6052 iexplore.exe 156 PID 5692 wrote to memory of 5220 5692 msedge.exe 161 PID 5692 wrote to memory of 5220 5692 msedge.exe 161 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 PID 5692 wrote to memory of 5720 5692 msedge.exe 162 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Ransomware/WannaCry.exe1⤵PID:1136
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=3964,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4632 /prefetch:11⤵PID:408
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=4952,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=3828 /prefetch:11⤵PID:2684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=5076,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=5424 /prefetch:11⤵PID:4580
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5584,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=5596 /prefetch:81⤵PID:1036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5600,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=5676 /prefetch:81⤵PID:3720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=6096,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=6036 /prefetch:11⤵PID:3228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=6008,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4944 /prefetch:81⤵PID:4932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --field-trial-handle=5456,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=5536 /prefetch:81⤵PID:1628
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --field-trial-handle=5512,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=5020 /prefetch:11⤵PID:2324
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --field-trial-handle=7000,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=6940 /prefetch:81⤵PID:4764
-
C:\Users\Admin\Downloads\WannaCry.exe"C:\Users\Admin\Downloads\WannaCry.exe"1⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 201551723858817.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\cscript.execscript //nologo c.vbs3⤵
- System Location Discovery: System Language Discovery
PID:1560
-
-
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe f2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MSExchange*2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Microsoft.Exchange.*2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlserver.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlwriter.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe c2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5560
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /b !WannaDecryptor!.exe v2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5552 -
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe v3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5664 -
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5768 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5884
-
-
-
-
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=7008,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=1676 /prefetch:81⤵PID:5312
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2712
-
C:\Users\Admin\Downloads\WannaCry.exe"C:\Users\Admin\Downloads\WannaCry.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5280
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5936
-
C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE"C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE" "C:\Users\Admin\Documents\OneNote Notebooks\Quick Notes.one"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5540
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -nohome1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:6052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:6052 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.86 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ff95e63d198,0x7ff95e63d1a4,0x7ff95e63d1b02⤵PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2216,i,17151189423712100729,4131752628831011858,262144 --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:5720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=1976,i,17151189423712100729,4131752628831011858,262144 --variations-seed-version --mojo-platform-channel-handle=3184 /prefetch:32⤵PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=2408,i,17151189423712100729,4131752628831011858,262144 --variations-seed-version --mojo-platform-channel-handle=3288 /prefetch:82⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4504,i,17151189423712100729,4131752628831011858,262144 --variations-seed-version --mojo-platform-channel-handle=4520 /prefetch:82⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4504,i,17151189423712100729,4131752628831011858,262144 --variations-seed-version --mojo-platform-channel-handle=4520 /prefetch:82⤵PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\elevation_service.exe"1⤵PID:5564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
12KB
MD582db17d7967571dbd9ed89ebc46499c5
SHA1e048e7b7f8712e82ea26de47b5d71b90d59bf155
SHA2567ff3dc80fd8a45782db75083b0237bc9c12c2388641ce33fcafafa82d370414e
SHA5129c3b8d1446d9624d00765957796eb021592e3f70e839c132405e5f0d66e394c92e2a5d094a734cbe3b4b676dd0e4ba651b9aa5921c2aea788b6c2e983f1a21f2
-
Filesize
30KB
MD5fb01262627cb84cb4326d93ea88ba810
SHA1b3e18caccad0fe0974e2c559572bee0a0a2ac3da
SHA256de13ab6a0cb582662e7f4841adcddce1852099b605db3582753203849447d2ca
SHA5120d17ee22d30d5ee248069b81de4dff53856b3b62e16784395e8451b443e39f75f6529ad6d1cf3a2f8a35050f35abc625703653da02f031562ff3182d1cb23d2a
-
Filesize
74KB
MD5ceeb2566f17c245cbcf4907c76cea300
SHA1492230899c067e93cba65af977e818207e94c68a
SHA256dd3070c0d3854abd868d8b0bf45ee61885070b1f97b7e30f82e5fe65e0fe405d
SHA5127455d9a1d283e3d6b3737b76e0a13f86a5e221620e2a4ac944f5287a3b5df4d46015ce9aa29c3b5fdc3260a8fdcac39b2a1f0b947624710fb62e6279370e9aa4
-
Filesize
74KB
MD5912542ffce5cb5c769bf547a6a3237ed
SHA12350d691e00b5104c68fe877209fbd63e3b28a22
SHA2566e267364281effd3425379f45764cb0d88b2f5476e40ecbe201f8e3bf5d1ae51
SHA512789ab4b7748368de8e289949a2b2df13b98c51b54fe28d310f6f2e1082ebe77c2a8ad68d876438280b62e3181f1f3b179f5dc7e1438108fb5a311cb5651582a3
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD5d9206d21cc1e83cdf638762ea46c9411
SHA1698ddd192278ae5555c57ae2127d120ac9dd4fcb
SHA256d40f3925baa2881bfb3bd7f18811e08993291280d3acea3dbba67a68d0346cf8
SHA5127e804c9f5105d9698163fcc05f35a0b0db6b5775f97926c97c62c2b3335e4e27ec9c8b8db23719f0a459ff288c1a06c6da6858fe78e99a73e860d8359529548d
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD5ddb9717bb7b96232a2a132b75f6a8a49
SHA1e0034aa866554261f28d2009177286261bb82849
SHA256d8b3d6cde6a8610fcb9f35a8d4cf05d2189040e1dc3509c6af0a20a722c41176
SHA512940a2eabe7ba704502cedf1b99838d8e2b5dd9e9583198af460b00bce534d388b937a403d58a1da7dfd3d21477fd071f483d8b472f6f874418df9980d9fa12e9
-
Filesize
797B
MD5afa18cf4aa2660392111763fb93a8c3d
SHA1c219a3654a5f41ce535a09f2a188a464c3f5baf5
SHA256227082c719fd4394c1f2311a0877d8a302c5b092bcc49f853a5cf3d2945f42b0
SHA5124161f250d59b7d4d4a6c4f16639d66d21b2a9606de956d22ec00bedb006643fedbbb8e4cde9f6c0c977285918648314883ca91f3442d1125593bf2605f2d5c6b
-
Filesize
590B
MD53b049df135ea56c994653c6d97c52924
SHA1dbdb221e6afae5a7b647b06200d3f389de3cdf10
SHA256845894c184d01800ea187465286c97d4786cbf2d5b77836f0287998ada629cf5
SHA512e2dbc3b489416e842969ec2c327dd965d5ac1de7c956c601526d6d949e8c576458bbe267b645973dc6dbd99674b2faec6fc188089939d2d6efc06449f07c0edf
-
Filesize
136B
MD547c641b99ad048359aef106904d4d16f
SHA17404dee5aa6853cc4832251e4dc9597e0b319a1f
SHA256319227998273b3bf085386cc60c4f0a784a7f55ee87a0ab2caa0186fa2d4fee9
SHA51291aa4c8f05fc14828d01503e144b51373c408a612c0f635bb0972fd164ad7d4a86a8bd701152eb80cfa204437db8fea853bef01919fa608effbae0b5920a8d70
-
Filesize
136B
MD582afc86a6b814cafce9de78625be86b1
SHA175b53a741fe17b4abc8d481cb5abf1a14ce5781c
SHA2560d395d4d4e16c1b5fcca81a76129e5d85c29c231b4bbb77222fbb01f8d2a3ae9
SHA51236e85441681a0d2274d0165b0e302ebba77124846640033c87059191ee3b7464116dad23df9e7d157d3dad2ca06ec6a0782f744a0fb4d37c28d7a87acea45f0f
-
Filesize
136B
MD5a80782af21bed64e4d866f4844d749b0
SHA15348b524d0a8ae6bde23a251c940f79563b7def5
SHA2567e4b6c961a9c1165800baf6e4ca583f04ef76b3b4bf342e87799c3f5c92f9ff3
SHA51243f3a1d803aecb04ed33355f4018a35e7c3c3af2a08929095cab3fbbf5555510662daeddaedb3e66aa3b0e54d6c16a0a788201e67cb574fe420f7cda9dd463f8
-
Filesize
318B
MD5a261428b490a45438c0d55781a9c6e75
SHA1e9eefce11cefcbb7e5168bfb8de8a3c3ac45c41e
SHA2564288d655b7de7537d7ea13fdeb1ba19760bcaf04384cd68619d9e5edb5e31f44
SHA512304887938520ffcc6966da83596ccc8688b7eace9572982c224f3fb9c59e6fb2dcaa021a19d2aae47346e954c0d0d8145c723b7143dece11ac7261dc41ba3d40
-
Filesize
201B
MD502b937ceef5da308c5689fcdb3fb12e9
SHA1fa5490ea513c1b0ee01038c18cb641a51f459507
SHA2565d57b86aeb52be824875008a6444daf919717408ec45aff4640b5e64610666f1
SHA512843eeae13ac5fdc216b14e40534543c283ecb2b6c31503aba2d25ddd215df19105892e43cf618848742de9c13687d21e8c834eff3f2b69a26df2509a6f992653
-
Filesize
628B
MD5663e55df21852bc8870b86bc38e58262
SHA11c691bf030ecfce78a9476fbdef3afe61724e6a9
SHA256bf22e8e18db1638673f47591a13d18ee58d8c6019314bab5a90be82ae3dc9538
SHA5126a54be1fa549633a2fd888c559207437b8f6efda98bb18d491c8749f39e9754f1e680fa8e2d623777b5f665b2c04d19385c75ce4e61fb251db16018963a9a6f9
-
Filesize
628B
MD5ca2c794a5b33580293578ddda668ed22
SHA1693f3f6ab7d531ca5e7fb1d8a41842c6131b2dc1
SHA256cf8def586158772e317443fbac98d0012e80fed894dd5faab2be6e3d00052031
SHA51276b40d40c79dd0c8d70f092edf49af3a95e06d35d1a6938acb80d8b600713cc7990bdbc138bc2a071cc487a5e1c34c48c279bb472379512b9e6d1f6d48ad5851
-
Filesize
42KB
MD5980b08bac152aff3f9b0136b616affa5
SHA12a9c9601ea038f790cc29379c79407356a3d25a3
SHA256402046ada270528c9ac38bbfa0152836fe30fb8e12192354e53b8397421430d9
SHA512100cda1f795781042b012498afd783fd6ff03b0068dbd07b2c2e163cd95e6c6e00755ce16b02b017693c9febc149ed02df9df9b607e2b9cca4b07e5bd420f496
-
Filesize
729B
MD5880e6a619106b3def7e1255f67cb8099
SHA18b3a90b2103a92d9facbfb1f64cb0841d97b4de7
SHA256c9e9dc06f500ae39bfeb4671233cc97bb6dab58d97bb94aba4a2e0e509418d35
SHA512c35ca30e0131ae4ee3429610ce4914a36b681d2c406f67816f725aa336969c2996347268cb3d19c22abaa4e2740ae86f4210b872610a38b4fa09ee80fcf36243
-
Filesize
68KB
MD55557ee73699322602d9ae8294e64ce10
SHA11759643cf8bfd0fb8447fd31c5b616397c27be96
SHA256a7dd727b4e0707026186fcab24ff922da50368e1a4825350bd9c4828c739a825
SHA51277740de21603fe5dbb0d9971e18ec438a9df7aaa5cea6bd6ef5410e0ab38a06ce77fbaeb8fc68e0177323e6f21d0cee9410e21b7e77e8d60cc17f7d93fdb3d5e
-
Filesize
236KB
MD5cf1416074cd7791ab80a18f9e7e219d9
SHA1276d2ec82c518d887a8a3608e51c56fa28716ded
SHA25678e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df
SHA5120bb0843a90edacaf1407e6a7273a9fbb896701635e4d9467392b7350ad25a1bec0c1ceef36737b4af5e5841936f4891436eded0533aa3d74c9a54efa42f024c5