Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 18:20
Static task
static1
Behavioral task
behavioral1
Sample
StrafeOptimizer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
StrafeOptimizer.exe
Resource
win10v2004-20240802-en
General
-
Target
StrafeOptimizer.exe
-
Size
12KB
-
MD5
f464eb37d2109825b58ef57c88d3e0f1
-
SHA1
b462fc663d77336a3ca4d8c15e9035a9651b274d
-
SHA256
cde822c9ab0c98c579b21030c5477907399e485ca96dc8a7ea5784e20ca93d3d
-
SHA512
fa35736aa1475729bac4ce714f38826c73fb707b7ba5a8e18d4da1cd470d3040e666223f533dd417e1c1f739603b097642c471b989494de503b35d2b77386f0e
-
SSDEEP
384:Rkl7k2e1E3q73zUiGJ3oM5dUbV8bmVzDOofcoEpMY:Rmw7M5dnmoTd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StrafeOptimizer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2972 chrome.exe 2972 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3028 StrafeOptimizer.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2752 2972 chrome.exe 31 PID 2972 wrote to memory of 2752 2972 chrome.exe 31 PID 2972 wrote to memory of 2752 2972 chrome.exe 31 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 1728 2972 chrome.exe 33 PID 2972 wrote to memory of 2404 2972 chrome.exe 34 PID 2972 wrote to memory of 2404 2972 chrome.exe 34 PID 2972 wrote to memory of 2404 2972 chrome.exe 34 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35 PID 2972 wrote to memory of 872 2972 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\StrafeOptimizer.exe"C:\Users\Admin\AppData\Local\Temp\StrafeOptimizer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3028
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7a49758,0x7fef7a49768,0x7fef7a497782⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:22⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:82⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:82⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:12⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2300 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:12⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1480 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:22⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3224 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:12⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3472 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:82⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3588 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:82⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3488 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:12⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3672 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:12⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3848 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:82⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2660 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:12⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4108 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:82⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4144 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:82⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4180 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:12⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3924 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:12⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3480 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:12⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3536 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:82⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4352 --field-trial-handle=1328,i,6533069772572876308,7163148851165357654,131072 /prefetch:82⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341KB
MD5f5e494caaf865a15586d80cb59020424
SHA1830a809aea0f794fe57facf80792ba926e395dc0
SHA2569c99d050e7cac79454ece3696b3dc892b9315c2ce1b6ff3546c791229020ad3f
SHA512eba86a7489ce02c69cdca786a1ab701b8588f7772bfa499ac1e2a1f206367ffa36edcc9155c1a3b2e9ee0a28659475d62f87d1a2abf8970af8c6a8383935de7e
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
690B
MD56b9da45569987de750672f9b0694c291
SHA1d4b5e5502e497d19e552551ce7f778d27b6384b2
SHA25623421c4ee112e169e3f01d3b7c2bcc98499bb8b0d7c563b5bae0510a5de1de27
SHA512ad8949e3bb256360f4ccff7eed1c748525d8425ce44593da4a7ed592d640529f19fabfc6f35b8d7861f84f120a1447eed4a09fb71522ba9bf14c0c210583c386
-
Filesize
1KB
MD59aebb7bd69a349d61590a4f7fc65a078
SHA1b39e3bd6db1b21da9c7b31cc9f5c45be6294db83
SHA2563e99c3b2b6e4cf035eadd3b79aac9d296a1e64388994f603c052d4d446e0876a
SHA512fba3b8e98da5b0d66881e11469cb95118b1e230adc3236a4c2b460664e123ce14aca95172a836942535b6a6995ba6fd22f4e2193fc43ad5b54626baa2474edb2
-
Filesize
5KB
MD51ed4804e2bfdebc6253233ef03483014
SHA1676fb4f2b69b80e5545eae3c4d06455735138aa3
SHA25674128d8417eecf4567d60eb1d151469bcebe4d25b3378e978c6e74e20a243db0
SHA51266e7d1b50217af2958d423fb63058a45b7a00f21b8d7d95370c8ad09dfa10b5b9ad1e3fee8308aad105df232f8acf1f7a451dbf813246b2eaf80d82d027894d6
-
Filesize
5KB
MD5ac39e9e140c7780f06168700d25f6715
SHA151996298fdd0647559501c3151e48cebe9853cc9
SHA2563b6bb03fbdac2063c396c3b041ad3d462835b0ffa0b98bd5c4d7c8002ca212d4
SHA512456636797bc5427e61204414324436ef2f7a947c5b67f2998a3847f250f42d90a2548c1dbc115cac00f91e26ef1a38ad0709c7574cce6089456f2a5df9e4e195
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
341KB
MD57f782f03862d48b77e42141123540327
SHA197e03671c91ba418b9da11c8dd95754fe821b801
SHA256ed403ebf1b07998f55724e4d5e2632445b7a76403ddc334205358a888f2213ee
SHA5121507f50e91c2690dfb45d02e1a09f5a2d70ccbe7ce3a9ed4b152449bc894b3649ce2725613a0b7b8207987dd624cb0053def2a40273ce4821b612fbc3c0133c9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
21.2MB
MD5fc92390477474b02eb1cb464405c6ef6
SHA1b2f8b41d0b8ecd39f2c50db557f92fa088c02f42
SHA2561ac2b3a873ffc3f3fb1f346d7c03e1c12b9e718fa3aedaa212aa661fc3a12a42
SHA512c6537b4a1b374a9e3697c1ef94feb3b923daf42ccaa4b3fcede47bf34d8c042ab2973b511e2c27f316620e7a62cdae47659e51e4b07b14b7ea3fb02549c0dea3