Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-10-2024 19:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=1zLAfc36gIRBGUdUaOPxpj3yYLCqlQpIZ
Resource
win11-20241007-en
General
-
Target
https://drive.google.com/uc?export=download&id=1zLAfc36gIRBGUdUaOPxpj3yYLCqlQpIZ
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 4 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133735809617277120" chrome.exe -
Modifies registry class 48 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1092616257" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 010000000200000000000000ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Mode = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:PID = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByDirection = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\LogicalViewMode = "3" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 3a001f44471a0359723fa74489c55595fe6b30ee260001002600efbe10000000a7150e1bb218db01ad54a357b718db01aed309f20220db0114000000 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\NodeSlot = "3" chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000100000000000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\IconSize = "48" chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Downloads" chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\REMISIÓN CONTROL DE GARANTÍAS JUDICATURA COLOMBIA REF 00239599445.tar:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3940 chrome.exe 3940 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2620 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe Token: SeShutdownPrivilege 3940 chrome.exe Token: SeCreatePagefilePrivilege 3940 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe 3940 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2620 OpenWith.exe 2136 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3940 wrote to memory of 3796 3940 chrome.exe 80 PID 3940 wrote to memory of 3796 3940 chrome.exe 80 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 4428 3940 chrome.exe 81 PID 3940 wrote to memory of 3224 3940 chrome.exe 82 PID 3940 wrote to memory of 3224 3940 chrome.exe 82 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83 PID 3940 wrote to memory of 4152 3940 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/uc?export=download&id=1zLAfc36gIRBGUdUaOPxpj3yYLCqlQpIZ1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5e1dcc40,0x7fff5e1dcc4c,0x7fff5e1dcc582⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1776,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1768 /prefetch:22⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1704,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1808 /prefetch:32⤵PID:3224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2108,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2120 /prefetch:82⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3076,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3092,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:3204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4528,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4536 /prefetch:82⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4616,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4888 /prefetch:82⤵
- NTFS ADS
PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4908,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5204,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5404,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4852 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4948,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5400,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4768,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5088,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5092,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5116,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3228,i,4789793260475353857,14825929791112414531,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:82⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2136
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4620
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4452
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5fe2d38a58adee53563f5b091997c4c1e
SHA1353aa48bdfe13895eef68625ef898c837ba9a228
SHA256ad360dcf8226ae35a275019c3baf795871671b6b204f47e6c41f1209bba85afe
SHA512ace53973db54ee8efabcdd3a8be8b0e610bc1bf90f1c0d8c5309564c2940d15ee58604bdb04f2a907312821ca2eaa0d7830ec4e604bcab0c8a70bee9709ee0fb
-
Filesize
215KB
MD51585c4c0ffdb55b2a4fdc0b0f5c317be
SHA1aac0e0f12332063c75c690458b2cfe5acb800d0a
SHA25618a1cfc3b339903a71e6a68791cde83fca626a4c1a22be5cb7755c9f2343e2a5
SHA5127021ed87f0c97edc3a8ff838202fa444841eafcbfa4e00e722b723393a1ac679279aa744e8edde237a05be6060527a0c7e64a36148bd2d1316d5589d78d08e23
-
Filesize
120B
MD5ef26ecd7a3b3cb72449d980bb637ba57
SHA13529c10fe2a87bbe09882de91a568410df3e53d9
SHA256c1364b63062602e4a28ea193c698e489f929b972d46d295c8be7ab6622efebf1
SHA5124cb89c1f03b8d613eda23625b1de3c6c9781feaecf4007a82f87e518248f6fdcf6aba6ff68f5094d0126bb4931c3c4e8be338ffc9fd3b4a93e0909941c6c54e9
-
Filesize
3KB
MD5e28d5aba7ff5819bfe89175ea3d78cd6
SHA1481bcfc99b8309f27ef4c8dc163f35553288406b
SHA2560ba23660a1c3c9336912a8c55534c2db15d518f7339919f13ce41c5b14f507b3
SHA5126ad8a84b4e62171cc33b40839d6631965bb52bfd78bea704e5b3cb65c7f4e22f980b729d5c0a9efa3b7e5b6225aa02867a6fe859b1e238a97c300345b17a69cd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD59bc78d19a61780f496a8f9143f78140a
SHA11ed83c100efb993e6bf4409856cfc5fcf03c6bf8
SHA25672a60bebd5c7a4c31d651cdd3a122c412668cb84fbc7af4b8d3e500386a5f606
SHA512de2dcc5ea6ad538ed1df84ce73ae98452ae5f566dbf8f9522e87b704274aa29cf5f380359c46249dbb71b4171ac582c5599c4a754c6460f84106402f11c45da5
-
Filesize
524B
MD55095e476a3e31a259e44739bbe5bd088
SHA157612167fba9f1a239d8667cf9fbac5183760d61
SHA256e8745ae956fc87d9fa9113052199a692600e7fdb633143ae3181e104430aebd0
SHA5122187d387767430c6dd3beeece35b8700b368d875a318568b5d4c76d300d930051fd8671332df8041c73fbd7a1b958ed56a12e080679954266cfe68c56a5100d2
-
Filesize
524B
MD57ff862ec631f9fb56281227a7796c14c
SHA198b24f3482e5075b27a91f168f0c9ee38d05da14
SHA256d50bdf76deb95b124b55029253ce87f3f42e7e8aa6b1419a01a6f94bf3b9a3e7
SHA512666b68f016c9d2217baa3528558552abd34c2688083d79e3cf02673140e133def3f55e5f58ab8a42b926157629913962a35bb98096ddf65231c5510f8c63f264
-
Filesize
10KB
MD59dc290a5017aadc4d8726c7d9e826d95
SHA1d20c453fe26e1d4e623b9c0a199a14300eb5b5dd
SHA256a491131a653674aadfac8c044ab296027b3aef2968598d5697a7cdfd251945a8
SHA512e8572643b5947f117f0b3d4c40728c8ec8a5e265bab66bd53448675b8512cb58b1e3263e5b92a2c5d80b05631f3021491c66ee25ae68bf3975004769d8a6d950
-
Filesize
9KB
MD587ccc5b2f7a6026d00368d75cc5c5df5
SHA1e8cf1f67a22983cc0ceaea8abfc5eaba52637775
SHA25670347565824e9d949815a485302c001319b359265fff8c48000153f91a504b4f
SHA5122f356a2b27bc6dca9ec86f6841df560124cde9a4d3454267c7ad92da94aacf77875fa42fec01413abb5f4e46746a4778da65f21a966828de65ebde2f10c1ee26
-
Filesize
9KB
MD5aea9e748405f0e0f064b35a8f5d47fcf
SHA185f8f590c1cd4c7f20e45d279b4e096b49727a4b
SHA256cc7323434aeb09b6bb5927b402bd7cbea69d30f5136f73a9928096e9f45393a1
SHA5125a2993a34802add57bc24789b33646c34e57aa013b8b258aa4b5e56ecd9a9b794f32db8eb20523635cdac2c481bececfd740d58124143a264577517e646c8795
-
Filesize
10KB
MD5ce058e84e02d173055139fe694398368
SHA1dc43f813994fc402c4e35d2e850aae8898dea780
SHA2564e4e7d2fa59e6198acfbc8c638fde9718a977a6273478e9ae04369d9e39d92a6
SHA5123a88e90e654dd229ab2bee0cd28dfc29462873173afbd55860bbd544a0f43a7ad2ff685142cd3d8d5bb0b61ba4c283d9f3aa75a3f30b09c77c155930c7ee8777
-
Filesize
11KB
MD55075d6317812a2748e7b265bbbf492fa
SHA128e812775dd1540a35bed542472c2960a7ce74b3
SHA2568f770ebbb29a0542862f5318f114b378adaf4be9aa694981ede2cdee34ad5392
SHA512116d5b4f2e4dc4594392dde99329dcfc8bf7392997521f3e5e39ac1919ef1b080f5503d115621a4ef98174452f160282d4b48fe6223af72303014c1b07a8732d
-
Filesize
9KB
MD54ec599468168f2a489c68dc018f9d44b
SHA1181e0365a12ce3ba3caed442b14c362834b72359
SHA25669ed481e34d834562256b85f1871901f2e4a8f917c841c2c63e847dc65f7a5b5
SHA5127436b1cf27231fbaee26388f87d2f17d525d2953c39552898f0a21e55ea1ef4a3bb64d7f1dfa4a9ccbfa3f63c784da1d084e67c7b2bcaee9821a471dc83407db
-
Filesize
9KB
MD53103e904edfb3b17ac3f6099cea3d44d
SHA13809bb6fea5680a8e30f0c38f62f02d98fc2a0c4
SHA256f840a379b98155ed6b255a7f3ecd597ea89a870297a31f4900c9f09dc5b65772
SHA512e2b98a5b7c8d891fe113c9985128366e56302ffa17d90a5553e74950736fb875d7e7481b8ad264eadda55096de93eba501c4d49e80b99efca16e1530edc9e9ad
-
Filesize
9KB
MD58d37673e4568fcb779e2e7510938099c
SHA1743acc8530c360ba47973abaa2de1e4be7231409
SHA2567a9488bf75067f0d3db566ba9410f84fa46671e2ec722fed7c1e2867e03260fb
SHA51216cb185ecae71255a32ddddd72815f6f92ecf61f1a86b8474e4376326a3dc7b799daeb0da6004da5ee3df5230c1e1910e1ef4493f8909820b4617a773712b70b
-
Filesize
9KB
MD5658c14d075c6eb8c852b3561e5625a97
SHA1988a2d98f1da565a0ca2da42242188a7952ef920
SHA256fc8eb4f340c65cbbfc36b9bfb41e139559795fd645e2a3ee2eba2bd39d172b72
SHA512ff3ac1390e7f598139ed966bd65317b4c7169c932f1707fa3e1c370e231e3dd87991f09b007a76533778972e5c819519f39a7fd332d7007142e4569fc445c992
-
Filesize
228KB
MD51f7b4eff3078d07be9dd76d85702b4d2
SHA114ec0b4ba93fb9bd604959b8c098f58deaf4a543
SHA2560e9c5b544131aed553500d71effb12f1aa580c8b274dccb0f303cac7fc339a85
SHA512458e9731ff26df19a7c5747b1378abf8744a48de7ec6f14bbe5008e32522821f3db1eac3ffcdd0a5e5d903d83e8a90837626cff98e5ac0375ce845f37fabdd83
-
Filesize
228KB
MD54564001122659a30826a74bba2ee2f0a
SHA1fc59b22aead2feb126f804cbed09baa1d6cc9079
SHA256cbec1347f037b47e54823c0358f10be77e96e956bfc2116230f8eb07b3baed50
SHA51219ae019d3de3003e27683690c70e83626075eeaebd3c95f6515fafa3dd21246f0a064112f7263c2a1b58af2ed7093370b002c55f4c0196bcf875b061cc5140f5
-
Filesize
228KB
MD59178ed36f7587f33fd5c633e86584287
SHA1a23c9b5b90116da9ccbbb5ffc31ddc19fe926411
SHA2564be4d0e28834670ec63a2d4d57f254d0407acde86b3118a39a38c6d1c8016879
SHA51229c991176a876f886b4b1880718779d2b78f434e5bdfcc2d88cfe9b7269d3ec071adaefcf7240d753a53899022578699f597da1e7404600be71b25c4d548f446
-
Filesize
224KB
MD5c9b438ffc02db20419d4666ba02e0596
SHA14f4809b3625c22b19ad4af1f327e0e6d1b07218e
SHA256cd3e387711bb0e4d9fc8045bde0e178fb5d33a4faa3190d207515de6684973bc
SHA512e22e691fa81d152e1a4fbccd7246d3f899c0405e9b6d15a3e071464c0115020e60468f69d2724980805e7f40a0f1b3a191adeb1cb04166d944bfe98dd85e7931
-
C:\Users\Admin\Downloads\REMISIÓN CONTROL DE GARANTÍAS JUDICATURA COLOMBIA REF 00239599445.tar:Zone.Identifier
Filesize26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98