Overview
overview
5Static
static
1URLScan
urlscan
1https://edi.blackboa...
windows10-2004-x64
5https://edi.blackboa...
android-9-x86
1https://edi.blackboa...
android-10-x64
1https://edi.blackboa...
android-11-x64
1https://edi.blackboa...
macos-10.15-amd64
1https://edi.blackboa...
ubuntu-18.04-amd64
3https://edi.blackboa...
debian-9-armhf
https://edi.blackboa...
debian-9-mips
https://edi.blackboa...
debian-9-mipsel
Analysis
-
max time kernel
300s -
max time network
274s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 05:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://edi.blackboard.com/webapps/login/?action=login&new_loc=%2Fultra%2Fredirect%3FredirectType%3Dnautilus%26userId%3D_3167_1%26courseId%3D_376_1%26contentId%3D_5029_1%26sourceId%3D_5029_1%257Cblackboard.data.content.Content%257CTE%257C_2800_1%257CNON_CALCULATED%26parentId%3Dnull%26sourceType%3DSC%26eventType%3DDUE%26disable_promiscuous_decodes%3Dtrue
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
https://edi.blackboard.com/webapps/login/?action=login&new_loc=%2Fultra%2Fredirect%3FredirectType%3Dnautilus%26userId%3D_3167_1%26courseId%3D_376_1%26contentId%3D_5029_1%26sourceId%3D_5029_1%257Cblackboard.data.content.Content%257CTE%257C_2800_1%257CNON_CALCULATED%26parentId%3Dnull%26sourceType%3DSC%26eventType%3DDUE%26disable_promiscuous_decodes%3Dtrue
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
https://edi.blackboard.com/webapps/login/?action=login&new_loc=%2Fultra%2Fredirect%3FredirectType%3Dnautilus%26userId%3D_3167_1%26courseId%3D_376_1%26contentId%3D_5029_1%26sourceId%3D_5029_1%257Cblackboard.data.content.Content%257CTE%257C_2800_1%257CNON_CALCULATED%26parentId%3Dnull%26sourceType%3DSC%26eventType%3DDUE%26disable_promiscuous_decodes%3Dtrue
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
https://edi.blackboard.com/webapps/login/?action=login&new_loc=%2Fultra%2Fredirect%3FredirectType%3Dnautilus%26userId%3D_3167_1%26courseId%3D_376_1%26contentId%3D_5029_1%26sourceId%3D_5029_1%257Cblackboard.data.content.Content%257CTE%257C_2800_1%257CNON_CALCULATED%26parentId%3Dnull%26sourceType%3DSC%26eventType%3DDUE%26disable_promiscuous_decodes%3Dtrue
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
https://edi.blackboard.com/webapps/login/?action=login&new_loc=%2Fultra%2Fredirect%3FredirectType%3Dnautilus%26userId%3D_3167_1%26courseId%3D_376_1%26contentId%3D_5029_1%26sourceId%3D_5029_1%257Cblackboard.data.content.Content%257CTE%257C_2800_1%257CNON_CALCULATED%26parentId%3Dnull%26sourceType%3DSC%26eventType%3DDUE%26disable_promiscuous_decodes%3Dtrue
Resource
macos-20240711.1-en
Behavioral task
behavioral6
Sample
https://edi.blackboard.com/webapps/login/?action=login&new_loc=%2Fultra%2Fredirect%3FredirectType%3Dnautilus%26userId%3D_3167_1%26courseId%3D_376_1%26contentId%3D_5029_1%26sourceId%3D_5029_1%257Cblackboard.data.content.Content%257CTE%257C_2800_1%257CNON_CALCULATED%26parentId%3Dnull%26sourceType%3DSC%26eventType%3DDUE%26disable_promiscuous_decodes%3Dtrue
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral7
Sample
https://edi.blackboard.com/webapps/login/?action=login&new_loc=%2Fultra%2Fredirect%3FredirectType%3Dnautilus%26userId%3D_3167_1%26courseId%3D_376_1%26contentId%3D_5029_1%26sourceId%3D_5029_1%257Cblackboard.data.content.Content%257CTE%257C_2800_1%257CNON_CALCULATED%26parentId%3Dnull%26sourceType%3DSC%26eventType%3DDUE%26disable_promiscuous_decodes%3Dtrue
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral8
Sample
https://edi.blackboard.com/webapps/login/?action=login&new_loc=%2Fultra%2Fredirect%3FredirectType%3Dnautilus%26userId%3D_3167_1%26courseId%3D_376_1%26contentId%3D_5029_1%26sourceId%3D_5029_1%257Cblackboard.data.content.Content%257CTE%257C_2800_1%257CNON_CALCULATED%26parentId%3Dnull%26sourceType%3DSC%26eventType%3DDUE%26disable_promiscuous_decodes%3Dtrue
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral9
Sample
https://edi.blackboard.com/webapps/login/?action=login&new_loc=%2Fultra%2Fredirect%3FredirectType%3Dnautilus%26userId%3D_3167_1%26courseId%3D_376_1%26contentId%3D_5029_1%26sourceId%3D_5029_1%257Cblackboard.data.content.Content%257CTE%257C_2800_1%257CNON_CALCULATED%26parentId%3Dnull%26sourceType%3DSC%26eventType%3DDUE%26disable_promiscuous_decodes%3Dtrue
Resource
debian9-mipsel-20240611-en
General
-
Target
https://edi.blackboard.com/webapps/login/?action=login&new_loc=%2Fultra%2Fredirect%3FredirectType%3Dnautilus%26userId%3D_3167_1%26courseId%3D_376_1%26contentId%3D_5029_1%26sourceId%3D_5029_1%257Cblackboard.data.content.Content%257CTE%257C_2800_1%257CNON_CALCULATED%26parentId%3Dnull%26sourceType%3DSC%26eventType%3DDUE%26disable_promiscuous_decodes%3Dtrue
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133687766340110116" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4476 chrome.exe 4476 chrome.exe 2612 chrome.exe 2612 chrome.exe 2612 chrome.exe 2612 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4476 chrome.exe 4476 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe Token: SeShutdownPrivilege 4476 chrome.exe Token: SeCreatePagefilePrivilege 4476 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe 4476 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4476 wrote to memory of 3196 4476 chrome.exe 84 PID 4476 wrote to memory of 3196 4476 chrome.exe 84 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 968 4476 chrome.exe 85 PID 4476 wrote to memory of 2540 4476 chrome.exe 86 PID 4476 wrote to memory of 2540 4476 chrome.exe 86 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87 PID 4476 wrote to memory of 1592 4476 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://edi.blackboard.com/webapps/login/?action=login&new_loc=%2Fultra%2Fredirect%3FredirectType%3Dnautilus%26userId%3D_3167_1%26courseId%3D_376_1%26contentId%3D_5029_1%26sourceId%3D_5029_1%257Cblackboard.data.content.Content%257CTE%257C_2800_1%257CNON_CALCULATED%26parentId%3Dnull%26sourceType%3DSC%26eventType%3DDUE%26disable_promiscuous_decodes%3Dtrue1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa2e8fcc40,0x7ffa2e8fcc4c,0x7ffa2e8fcc582⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,14279780056536366587,9277862470943252336,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,14279780056536366587,9277862470943252336,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2164 /prefetch:32⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,14279780056536366587,9277862470943252336,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2404 /prefetch:82⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,14279780056536366587,9277862470943252336,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,14279780056536366587,9277862470943252336,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4620,i,14279780056536366587,9277862470943252336,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4632 /prefetch:82⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=208,i,14279780056536366587,9277862470943252336,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4756 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD59c928b74fc2dd6f79034c450d49dbcfc
SHA1a1c8e7b33dde0ba9e5838221fe8674aa3460f72c
SHA256580a128d4c2c2e0196bedeb87292f2fd261fe8588764c9a9595209d0542d908a
SHA51270830b1a2d80513ae80997d6782660dbc904ba7881e1d2b5dc1bd19dde236d8408f9ac595f0e360a0342a0eb06df2b6a1957acf2f347d797bf52d1d27fa20474
-
Filesize
456B
MD5aa698085144e3e976e02d8dd755a4680
SHA13cc326cbcc7b8955ad73b5f221f3533deb1689a5
SHA256e4c9383929a729e67912b3314a89add975fc1ec7b878c4aa4dac32dd2bbf8e89
SHA512564effc8ed1cbeef52d5e1b00490c4372be008f4d15ddbe31c4add9e7d3d4cffdf0895771d055b87fe9e4f72853f18d5a5b71e32faa45c0f6b942ca1789e23c0
-
Filesize
2KB
MD5eaaa4b6f5bb534dfebdb7f92af41d0f4
SHA1a6adb3dc66c704b99dcc71e0a1c204e840b71764
SHA2569cd9033016091a4e36d324aafd40899e05145d8dd7020e75f7b929269e6cdf90
SHA5123e50de2daad111de3d20a439aab5b6b55866941a61fac8fc96483ae6670ccd45641da929e390aa874f71d98b7a0b303f665333d1929c4db353df3a36f58f1b20
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
687B
MD57837536024ea9947b680165bbb192142
SHA1ef6b90731eb731aeff5f95bffe9f8c8ca96056d8
SHA256cfa66a1fd14a5507c488c2d14904f2ac1bfb5ddb921971de2ddb3818bd7dd85a
SHA5121947a37b1c7970d927a2776ab40bc586d49af9de2b1635ff26f2e27854d473ecd5131a3c11339c4abef3973f28bc26b6b0c31d3f20c32737cba2b0cce37528a9
-
Filesize
9KB
MD5fb3eed49dc65079952dabe945ac439ab
SHA18855fb0ce503683f955d6ecbff5ddeccfa082382
SHA256cf1afb5b993069769a45d9d8c6901377a7b39a0a76aca23de6d2056c3a150227
SHA512b486b302ec41ef68c3238c056fad56268a958d885ea0a221e57314833d156dd98250be4567011cd80e431d700c3f5ed7b69ef70e17361cc37af26db2fd9bf42e
-
Filesize
9KB
MD50aa14c50d9f7890ed38429a08869b330
SHA158bfa6011c5bb90636da1c15d31fa89a4dd7383c
SHA256a4be52632142084187bb110fc77b4926cc7b87fba029f74f96bb7dab5bcff182
SHA512b9606758bc162a6a73f61f4b6dd88eb03ee6e684afea99593af8ab3e1b11a667180b88fbdce32c1025473b5ca32c8585ceb0cb4c43da93ee01443e05df93bd47
-
Filesize
9KB
MD55dab0ca69172b8354a2601e2727ccdd6
SHA1764b658ac3fdbbe81e5cd6d9caa4690e3604547a
SHA256f3e188b9dca58f6762ec7725323b564162a37b17af44400004fd7d8ac235330d
SHA5125ba6982feb8504f0bb2fc0982c1f2e7503a7b1dbc3afc8f803bc8f4b4532136868ffa79a5c7ae3179971d678661605e726518d62b598b1d81d887f50a305798a
-
Filesize
9KB
MD5a3fa12bb2f4b7e90df8d4475de1fe46d
SHA19af9c7ccb7f07e6cce579806847fa0fa781eca66
SHA25624eb757dc6c4940db1b27e243a8db2d655a17a464f392795b21b0cecc8d56384
SHA512acc8bcba8d3b307491da5fd6078c4e06b43fb10f0d7e599e5620df18d5c775727b7c18715a232c1a213aff3ff017a3dd9a7c2345a12450f47cb050ba61484b6b
-
Filesize
9KB
MD584cce8b8cd9b30ddd8c2c08c160df933
SHA170e48b34d02fbdbad5f67b4a79beda900a44e0ab
SHA256e5c1539d21e08d260a21d5dc122e792c0d6ad91ba40c654dda898f1776fc7a42
SHA512aa65655f7034959df34e09bb30b1a9161d73eefabac85182241e1fb4115c0b1442b0b960649373d026153389cb34cc3a609fb780fce75d1a6f6fcb9981bcdaa1
-
Filesize
9KB
MD5b173c030dd0c723dde70b3340172c0be
SHA1669b83fb8a592a69f80927230568995fdff3edee
SHA2563af7051b1c8dd98ec7137b7422aa3d247fb24cb36698d4ab64a0e7685bdc33ec
SHA5121ab3955b0ced2ab29fa9b83aee7855d9c26dc3dc640913d66f8fa9c08cfcd23683a142365836cfd0463f6fc26aa12ec66538ebd2fd6804f8dd169534d4393eda
-
Filesize
9KB
MD5e2718fdec48075d997b8f48c38fbbd4a
SHA1a88df1c51a877c20da336c65fb87b42478bcd3b1
SHA256966e632e9896e222487ac8dbacc7d1f943dfe1f7648fd5b7e9b7d9d671e861c8
SHA512935509b771cb3b69c90c0fba23a87901cb483980c0a3adb21914496d3207f6b6a640d146b46ef83a28341019e240597c238228661b48e9e531142cb3aa081cf3
-
Filesize
9KB
MD516e63a1ba463f6f21ec6d5cf01f817d0
SHA1f33c577c093137ab2b048e31698704d45e4a1b88
SHA25638fe09894c4bd4edb642d0cbab57dd7bdd7f992f84eefa09f0d394ede358b75b
SHA5120ec7ba7e841083e2c3df2667498d11a60fd09a2432694e8e00438507e6d6dfbd77579442afb26b547a97d608b03fe414c9e65d3929a1c3cdf777a021d80cbf86
-
Filesize
9KB
MD5befda00d7749261fa98e8f71e681aa7e
SHA14190a51d3db2a25699893c30af88a2a200954540
SHA25615ad32619dff84cc265f7f9f45d647f3bf9337a13b9ef8de9f5390bf27d0e06f
SHA512fb21cf70b736e2d15549284619e11da574538bbf91205b65ac2861526845793822e9b1cee40ed34d32c492c1ec7b3907dc59a484a41f2d0e9ddc6c9583d67fbd
-
Filesize
9KB
MD54e138c64cc7bf6e474b302467f2d1be7
SHA12fc4d851f54727cb8b951835b28f1e714e681c36
SHA256c2a7dfe150c33ba367aa15f3407b8596559dcaabaff6cbf193e4331045120c67
SHA5129fcc5ec49674d65effd2ab904eeee6fff0cd575737c53290972c138b2d821db38c73a7676a3ddec752da9c3527594bf5a348cacd95da8fc8aad476e4c9304b83
-
Filesize
9KB
MD57dfb1da1db676eaa0f47f8c2be78efb9
SHA1c663114b6eb4ccac7a871da8ea5e055a77d34066
SHA256c688c5d6dbd0eeea66a568219b70facdb332b0d9860070d521394990c7a5bb05
SHA512b51a729db3ca82c5ddfe609f2b636c199d1516b7d95cbaa8e358d7f955eeff322c43a5b6593cfbb5e339ac22d928e3b61b171cf443befcb8063cd09c15ffa69a
-
Filesize
9KB
MD5ee12e00c23da1624a4965ee29e40862e
SHA198e96b2fda27a13ef469dca1f5783f73830891ca
SHA256b58128eb3a4325b8b34e35fcadb42d51a9fe6aea2556f063f03139e85e1724b0
SHA5124649d55b85f5319cea1f16283069b93bd0dccda7dda78b2226501f24551c2ef5afa9fde1b4b9536c86d67c06cf4d079e3f3aa785d25cc537cbe26fc1e6f590d2
-
Filesize
9KB
MD5e4dc2da03c4808cfec235b660ba61321
SHA10a8a5c5b417f179e1975a91a13bc2cfab5f42bde
SHA256b85464157f1d458899366290f5415adcb320489447039fd122c84eaa94516d1f
SHA5126372c91f6c513bda8d5ed4cec509a7f1a1bae9c99508ca78268ec2d8a1ab0e24bf6d54783b695938c82476941b2b4d8c889b316bb1ce8a12d039ef85a56988b1
-
Filesize
9KB
MD5e0fc12738177ebaa0785014f1234c9d4
SHA1d4f9de13b7ab2442c99a6516cc043974de4e6483
SHA2569da3ace65e5392774f22de8b9b5c56fe3055a5181ba286672fc03aa9d5b1f824
SHA512ce71d23388260a7d3e57fce6c65760b05860d0f35aa8871daa215e69a126bbc5663b5a56b6af875b26d01c1a57bf0b5a6ef01291acba565449163300944ef552
-
Filesize
9KB
MD5e5fb617b7b03e78ee8e2c41924d2f05b
SHA19822e00c0c5669adb93ea59335717b4f25222769
SHA2566202df21bb5201bf3e9f6a458d48aad605eddf34cd2b3e00fa24145c10497b50
SHA5129e08458abbdf9989059ea8097d2ba22fba04d45af1aee2c1e93196a5b06e4223e9fe41dc1eccddf878e1777ea8a1d7f76bf70a6e570290f50a8eb5b65abf4e4a
-
Filesize
9KB
MD5cfe11f83925b45de60c82c0070d3897e
SHA116e9a188840ac26cafec047453a133c307c9559e
SHA256af0fa55437e6fcd82efd34f3697072e196d504ed87ee1918b1976d929cafe813
SHA512b4cae1694cb5897483506584fcb4021ca87d6ddc2c530702723944951628a7aad374badcee52473429a73dad7df846218e9ff98efb59145a0bdd7ad3af03820f
-
Filesize
9KB
MD5cf3f824cef55add761f59315aa228733
SHA1dc27f9c2db5c084cf6d820505aa66280b6e94e03
SHA2562d8b610003f780254a515eda69af40bb1aa17c488593aebf121ea6fca0791c95
SHA512d7b5c79c1db0819869d8b284aa1b3961f15c16b3f27cbbeb2e9549f0b9c3228b59993b69c7e37762018f6ee9b6a0e88cb3e5700e6607a063d1bb72add8ad2f50
-
Filesize
9KB
MD5e2a757eff9250bac7d6ad36305509eb6
SHA124373f2656ae389502d1b5db03713b4673d89f17
SHA256722f04935e6583de217e44591329ff6b1b563d5b3fee450ee4430fca7c5a7879
SHA512db554efe315e181a3e8fb7d5d9a61534fb20c08adf7cc623f0501568525a78b2a4dd1a6878c96d5385bdd16cd40cbdfa77d8754525f311c72e73d07678271e6e
-
Filesize
9KB
MD5ee71c9929578752b5d3735627d2f52a2
SHA1581cf34a4133486592d2c5da49f82b5974e061e5
SHA256e6b5e35f5face8b93e6f134e6d7770312d7a37aee06cc9e644ef37cd8435bbb1
SHA51286bafb3378b3ce86f045ba267466b3c47e04d0c515fea6f7119a87bc7837827a8b54be673c22d2f3835563ba972db78609e85e0bdc9738179119e6bd1489cdd8
-
Filesize
99KB
MD501e6cc92d147957103d2d75de083bad8
SHA1798d58f8dfde8f9e6ba04b4db5d1bfd3081fcfc3
SHA25657fdd12f973d2654e277a92c2106d65db5bd2b632512cb3e1c4287f631469fda
SHA51254e5de1c68debf1c15667c92bb6ab604edc369a0fc77c8bdb78ceaddf12008c1481bd2f7bf8af8606e9b107529fb042094d667113f1ca74d0c89d701f468b296
-
Filesize
99KB
MD57260bdd94104216d1b4ffc9e39daf6b4
SHA149d906c39757defcac5506ce6d8451f6a02638e4
SHA25656a50a79e68910c674925cee13ca3dd12d7034fcfa23bbfdaadd1255d663b9bf
SHA512a68db852511336178811faa427a0fdac2c2301425faee7ffe750a632552b5edc3f3a1574e9084dcc727a5040c17eb388089a4996ec5e580c7c68b435ccd8676f