Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
12/11/2024, 14:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win10ltsc2021-20241023-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Extracted
C:\Users\Admin\Downloads\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SD6F49.tmp WannaCry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SD6F60.tmp WannaCry.exe -
Executes dropped EXE 6 IoCs
pid Process 5996 WannaCry.exe 4148 !WannaDecryptor!.exe 2304 !WannaDecryptor!.exe 5688 !WannaDecryptor!.exe 2016 !WannaDecryptor!.exe 3880 !WannaDecryptor!.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Update Task Scheduler = "\"C:\\Users\\Admin\\Downloads\\WannaCry.exe\" /r" WannaCry.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 74 raw.githubusercontent.com 75 raw.githubusercontent.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-584106483-899802418-1877852863-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\!WannaCryptor!.bmp" !WannaDecryptor!.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\49bc184e-98f5-4e69-ae7a-35f14b342914.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20241112141941.pma setup.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WannaCry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 4 IoCs
pid Process 3064 taskkill.exe 5816 taskkill.exe 5436 taskkill.exe 1892 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 116 msedge.exe 116 msedge.exe 2924 msedge.exe 2924 msedge.exe 4636 identity_helper.exe 4636 identity_helper.exe 5816 msedge.exe 5816 msedge.exe 5944 WMIC.exe 5944 WMIC.exe 5944 WMIC.exe 5944 WMIC.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 5816 taskkill.exe Token: SeDebugPrivilege 1892 taskkill.exe Token: SeDebugPrivilege 5436 taskkill.exe Token: SeDebugPrivilege 3064 taskkill.exe Token: SeIncreaseQuotaPrivilege 5944 WMIC.exe Token: SeSecurityPrivilege 5944 WMIC.exe Token: SeTakeOwnershipPrivilege 5944 WMIC.exe Token: SeLoadDriverPrivilege 5944 WMIC.exe Token: SeSystemProfilePrivilege 5944 WMIC.exe Token: SeSystemtimePrivilege 5944 WMIC.exe Token: SeProfSingleProcessPrivilege 5944 WMIC.exe Token: SeIncBasePriorityPrivilege 5944 WMIC.exe Token: SeCreatePagefilePrivilege 5944 WMIC.exe Token: SeBackupPrivilege 5944 WMIC.exe Token: SeRestorePrivilege 5944 WMIC.exe Token: SeShutdownPrivilege 5944 WMIC.exe Token: SeDebugPrivilege 5944 WMIC.exe Token: SeSystemEnvironmentPrivilege 5944 WMIC.exe Token: SeRemoteShutdownPrivilege 5944 WMIC.exe Token: SeUndockPrivilege 5944 WMIC.exe Token: SeManageVolumePrivilege 5944 WMIC.exe Token: 33 5944 WMIC.exe Token: 34 5944 WMIC.exe Token: 35 5944 WMIC.exe Token: 36 5944 WMIC.exe Token: SeIncreaseQuotaPrivilege 5944 WMIC.exe Token: SeSecurityPrivilege 5944 WMIC.exe Token: SeTakeOwnershipPrivilege 5944 WMIC.exe Token: SeLoadDriverPrivilege 5944 WMIC.exe Token: SeSystemProfilePrivilege 5944 WMIC.exe Token: SeSystemtimePrivilege 5944 WMIC.exe Token: SeProfSingleProcessPrivilege 5944 WMIC.exe Token: SeIncBasePriorityPrivilege 5944 WMIC.exe Token: SeCreatePagefilePrivilege 5944 WMIC.exe Token: SeBackupPrivilege 5944 WMIC.exe Token: SeRestorePrivilege 5944 WMIC.exe Token: SeShutdownPrivilege 5944 WMIC.exe Token: SeDebugPrivilege 5944 WMIC.exe Token: SeSystemEnvironmentPrivilege 5944 WMIC.exe Token: SeRemoteShutdownPrivilege 5944 WMIC.exe Token: SeUndockPrivilege 5944 WMIC.exe Token: SeManageVolumePrivilege 5944 WMIC.exe Token: 33 5944 WMIC.exe Token: 34 5944 WMIC.exe Token: 35 5944 WMIC.exe Token: 36 5944 WMIC.exe Token: SeBackupPrivilege 3744 vssvc.exe Token: SeRestorePrivilege 3744 vssvc.exe Token: SeAuditPrivilege 3744 vssvc.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2016 !WannaDecryptor!.exe 1652 NOTEPAD.EXE -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4148 !WannaDecryptor!.exe 4148 !WannaDecryptor!.exe 2304 !WannaDecryptor!.exe 2304 !WannaDecryptor!.exe 5688 !WannaDecryptor!.exe 5688 !WannaDecryptor!.exe 2016 !WannaDecryptor!.exe 2016 !WannaDecryptor!.exe 3880 !WannaDecryptor!.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2924 wrote to memory of 4848 2924 msedge.exe 81 PID 2924 wrote to memory of 4848 2924 msedge.exe 81 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 352 2924 msedge.exe 82 PID 2924 wrote to memory of 116 2924 msedge.exe 83 PID 2924 wrote to memory of 116 2924 msedge.exe 83 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 PID 2924 wrote to memory of 952 2924 msedge.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ff9f4ab46f8,0x7ff9f4ab4708,0x7ff9f4ab47182⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:932 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x26c,0x270,0x274,0x248,0x278,0x7ff77e345460,0x7ff77e345470,0x7ff77e3454803⤵PID:60
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6008 /prefetch:82⤵PID:5528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6324 /prefetch:12⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6420 /prefetch:82⤵PID:5832
-
-
C:\Users\Admin\Downloads\WannaCry.exe"C:\Users\Admin\Downloads\WannaCry.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 189191731421217.bat3⤵
- System Location Discovery: System Language Discovery
PID:328 -
C:\Windows\SysWOW64\cscript.execscript //nologo c.vbs4⤵
- System Location Discovery: System Language Discovery
PID:5240
-
-
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe f3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MSExchange*3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5816
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Microsoft.Exchange.*3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlserver.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlwriter.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe c3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2304
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /b !WannaDecryptor!.exe v3⤵
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe v4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5688 -
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet5⤵
- System Location Discovery: System Language Discovery
PID:5964 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5944
-
-
-
-
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2016
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,8223917932150926378,10553149547430350513,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:904
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe"C:\Users\Admin\Downloads\!WannaDecryptor!.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3880
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\!Please Read Me!.txt1⤵
- Suspicious use of FindShellTrayWindow
PID:1652
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:5248
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:3460
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ccff51f965f8f4176e4ad112c34c86a7
SHA1eab249ca0f58ed7a8afbca30bdae123136463cd8
SHA2563eb00cf1bd645d308d0385a95a30737679be58dcc5433bc66216aac762d9da33
SHA5128c68f146152045c2a78c9e52198b8180b261edf61a8c28364728eafb1cba1df0fa29906e5ede69b3c1e0b67cfcbeb7fde65b8d2edbc397c9a4b99ecfe8dea2dd
-
Filesize
152B
MD5c29339188732b78d10f11d3fb23063cb
SHA12db38f26fbc92417888251d9e31be37c9380136f
SHA2560a61fa9e17b9ae7812cdeda5e890b22b14e53fa14a90db334f721252a9c874c2
SHA51277f1f5f78e73f4fc01151e7e2a553dc4ed9bf35dd3a9565501f698be373640f153c6d7fc83450b9d2f29aeaa72387dd627d56f287a46635c2da07c60bc3d6e2c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD557e89f97e28dff4e78e33a0b29762d55
SHA14fe043b55c8a91a2b5adff891be43bb4a69851b1
SHA256c4cd57e1e5a236bdc9be0587ebc7dc4ac5f3f76f1baacd24517a52f1f2642402
SHA512b647255928a24f227605e5e8e085eb942d45ae57a0fe437b56ef121f64cd845486b0ac9e7f3892bbee5ae7353d83e95d4f40d1b5e5254d9cd4abee9ef981b01e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5f78df87bb7fd2e6b4f4ac063b43115e0
SHA1f918e34d47e3a81c8c6cdd2041250a27b18f6ab0
SHA2562f06be05dc4283ac6893010c9dc556777169cbd300a50803a908ab081927a21e
SHA512dbf34536586717dd837b8643d123714ddd3da70c973b362eca8d94eea83f48a8b308c42b7dded1c09aa49a6c0684f8ee14d3b142f48e4aa8147237323b7615e7
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
579B
MD5c8f297c81963ae5d0233e8eb7b9674f4
SHA12a5439622a7e1465dc5225cad7e79d2c6e05070b
SHA256d2b0ec6b8ccb6bbcccfb071565890ac3706acd2a141597159f8aba7942ccedf8
SHA51262f973541648b4c1d5162cbf3f1c318a8123f9c7e038e8514b84c12d20d376bda7f79ee1ca28a4f140dc3e2ff00fd31e94835f196cbe1d133bf728eeffabbc5f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe58cc34.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
6KB
MD5e82d461bd08023374702adba0416d1ef
SHA15714b0cead580fec8a8de835461d3caff973379a
SHA2561581e7ff03ff9e0c345c7484a77e3047aad4da8b2c3febe2ff4ea1cea9024009
SHA5124b724495d889a9c0b7f7afd80220a3f39051c0bc07351a7f106ad5117d772ccc59bf83c2585af793b05bd159e2a918f6fbea0308d4e0cf1b56e282a7718ae778
-
Filesize
5KB
MD5f134c25f8017ac2fbc5d11ce1557463b
SHA165b69c0a03042a15bf01e2397d6950c8aeb9cdd5
SHA2563e9118f258c0e1e638957023a325b06487683d016c5f7e0c72741db4e6d5c151
SHA512c212e2358ad9874b3508d17d4384f25b7ffc1b0c249b614e66d2d9e399e7489ec9e81fa86a12d0289163a3d61190c0e5578fb43dc676e60986470f53dc880c2f
-
Filesize
5KB
MD59ae7461039af583ebf7fdf414eb7c54f
SHA12bf5ccbc746bb491c1cc701fee810b61f77ac737
SHA256125cddf8b810189ca8e322d1615d95e8e3a2bd21ff26da54813689cd53745cfa
SHA512babc4e2c8fc919af38dbdd1f845811e28928178f13325a19caf47fe5f333dbc8f45815832c8466c70009a86047a264a388d3e544571f9c8b5b72b5b360160ea2
-
Filesize
5KB
MD5f071728db597b020389150c7c31af260
SHA1a78062dfb7782c390f060f369eddc98e0b02911b
SHA256b490cfcefaeb0da6c154cb3b3e87f3809251f2235daefd663e68fbaeaffcf58b
SHA512d2060bd305b33d125570b5cc09eb6a4da31bdea3225e4d3d399f3ccca7f9c1c752358a8fe3c13ffbefba9c39b6d5c68d43cbc45840df2388393f08e532ada8e6
-
Filesize
24KB
MD586aa28ffd286b08415aa197216684874
SHA1d99924976c73e3220108817ad6bc1d8b1795ca2d
SHA256a6dc4bc6ade3039e57b538f2620b91602199f1908b23c4a2beb3fd3aa721579d
SHA512a51fbd1af778d32f2f95a9a863a59f42a7eb804dbb8ce85459297959eea21fbfe9625d74c3f91ad65016031d4b3e26eeb748c1c59e09ac68778fc670d408d0fa
-
Filesize
24KB
MD526978f38b0bce48572b90b762b7d937c
SHA18b8b88012fab1d37fca79575a5db81674b424867
SHA256b38f05e2e63a1f87026aed06f5b85354570c6f91d28947466f0555276bab6afa
SHA512501e0de5f46bfaac901cde5c39a321edc411426fd91c83427f36710fa56d20b5f6ab8f2219d963f7ab495c2df7def879652381db3876b7e2a7080921cce78379
-
Filesize
1KB
MD525959cd54340dd4d4f670636e14d3ad0
SHA1fb3be9abf7100b07464526fdf71ad514de6de4b0
SHA25615039f60693b58786aa8dc1f4de1fdc5ace638821da7ea448c6a575e22bc8b66
SHA512393e38dcb3c91dca8a66fdc75d9ac49308b01e1e498cda258842ea8ca4498533b18da924301e3fb413c658cd0154f5940c03ccea839275b7161fa56384c0ed26
-
Filesize
874B
MD553733c4628447f1227f4c55991c9d9d6
SHA1f9961f789c756dc39916d0b148c69e62650958c4
SHA256896255f49732ca2ffc7e8943fb3efdaef53e87be0eb893c80250cbf93fc60b77
SHA512c701a2f2dc660779f920389bc666524d55ec3b94ba3a9f778fcba58722b8ec666fc78b0b8c9989f1b787fec702d2b933003fa2d1d985bc7bf8f4e72125cd5308
-
Filesize
1KB
MD512b9de2450ef7a79425758cd14352ee6
SHA14704323d95ef71cbee632de3ef498d23e0e5ab79
SHA256da1ba2c70644e84c023e66b5a813851a74637693a25cfc4b496bf6cdc4d922da
SHA512092afc7075291e2cc705bd269022b5387e1dd797232d243e8085156589d84b4695927367bb4e9eed41e2839e6ef7812109b45363d0634bcb2a196ae98105dd6c
-
Filesize
874B
MD5671bfb7a92421e0c18195786f7c8ec8c
SHA1ad3ba45fe55126734c06effcd6f56211aabc55f4
SHA2560c1667bbfd56d34896c6b77022906da30f8dde4f1eb30a2cc3be9544b159b10a
SHA5124517e4abc585e130218c3455b7ee5641cffca59aa7d08675b6a3920ffb78f128c2b267b483e4792b011959be8fcf1b957686e273c4d3717b7617e02cb7c7f4d9
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16KB
MD59e02552124890dc7e040ce55841d75a4
SHA1f4179e9e3c00378fa4ad61c94527602c70aa0ad9
SHA2567b6e4ce73ddd8b5e7a7c4a94374ac2815d0048a5296879d7659a92ee0b425c77
SHA5123e10237b1bff73f3bb031f108b8de18f1b3c3396d63dfee8eb2401ce650392b9417143a9ef5234831d8386fc12e232b583dd45eada3f2828b3a0a818123dd5cd
-
Filesize
4KB
MD5d9f84c8cf73422f2ca07d7e7462b9534
SHA1cff6e092bf5bf1f3f47b7074847e204042a881ae
SHA2565bf7b14dde109f722782628bbcf3011a23cd2416e7621a62b49ee0333cdec6c2
SHA5121ea893c62d64304c35b9086e2c7e760716ea5ce220bafb76632670fcd2f97eca5c6693ff98004a861b190060c47c9d97ac92b41e3b1da1a4e8f89d9638548c38
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD59b329c71d927ee2391f229e4e05b0c0c
SHA111197a32e35420d86f233f9cc511d3e69b9fb8ea
SHA256f8ef4652532648d051c718adce8b12c9cde9e57d3a8e0abcf6d3ee63e629655b
SHA512860f3aed8089121d47f8a7221f75dcf30e8953fe4763f4154733f606ac647bd842efcf0037a8073ee162fcb22a4565caa4d8ffce1a57aba028a64f07b1930501
-
Filesize
10KB
MD57bf207d4dcc149d936ca83946633021e
SHA173d7f703706db0e64b93c1de8f70880516c2838d
SHA256bdd454102a94fe65466f5d27499607288638da9c6ccbf48551701794f18f59ae
SHA512113c139ed7ee6576ba1cc03785969cdbbc4584e360bad5ee203032d2fb9623026ed6151ce920744dbc3abf95cd949dad1fcf863f62457f7a3de0f174e18ecffb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD54c8b49022b730cde7b9d1ba00c0423e7
SHA18ac8968fa125c128f58712027d5f3cdc80abd460
SHA256908893bb9c9057e6a73b3634eddaa903853593e83998755cf2138d0d76ea85fc
SHA51278b0795f305418771ed68982e6a250d11510f299249d79f2ddb042cae5f9a53a7233dd60466f306a78f41099aadb2a3c4af9619b7c3e8d948b8cab048ea17c40
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD584286d7505790b4ff3d0568aa2912950
SHA1f1c6a05b253824eeafdcf9cb8dc744ca61519383
SHA2560b771d930e4f161502a17e9b3c6e7ac5f0877aa751c834603a375d76575c7e9e
SHA512de5cf0196587c263ea381093d18bb135dbc3e31ba79e6704ff6bb33a654b95b7cbf7fc9e3f77a1e3b773c0342b58365aaf70c071d698359509f2596b3ad4fa76
-
Filesize
797B
MD5afa18cf4aa2660392111763fb93a8c3d
SHA1c219a3654a5f41ce535a09f2a188a464c3f5baf5
SHA256227082c719fd4394c1f2311a0877d8a302c5b092bcc49f853a5cf3d2945f42b0
SHA5124161f250d59b7d4d4a6c4f16639d66d21b2a9606de956d22ec00bedb006643fedbbb8e4cde9f6c0c977285918648314883ca91f3442d1125593bf2605f2d5c6b
-
Filesize
236KB
MD5cf1416074cd7791ab80a18f9e7e219d9
SHA1276d2ec82c518d887a8a3608e51c56fa28716ded
SHA25678e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df
SHA5120bb0843a90edacaf1407e6a7273a9fbb896701635e4d9467392b7350ad25a1bec0c1ceef36737b4af5e5841936f4891436eded0533aa3d74c9a54efa42f024c5
-
Filesize
590B
MD56fd201a5911d6675e2208d783de6279c
SHA17c9b180c6e40866f117ff12d1a478b82e2212bf4
SHA256d32c246c471e4a819ff257f5ef28bd5b9cce9221f6d7e8298f5499d9c5911be6
SHA5122aea07d0c09740608c7e18ca530149c6115426421c540ec3eb3510cd7ba52889852dd82a3adaf04e20fb663810296287416d0f29810f2f8c9c378f89824a1337
-
Filesize
1KB
MD59c46cc95381882273dfa2b0e0440d6aa
SHA1d0b30f8461b994d3d84c8fcd120df532babdf661
SHA2563821c5a9241ab9df1359a5857ac3457d8385ce2cfb76dc04b8bcb98e47082da8
SHA512fe6d144cf5dabfbfb0bd511c5d59b59b9eb4c792b4dd72c5306eba1a179e1ec41a92a46c663a71755068c4575fa07a111d822cc628b413f08ac7c561d655923c
-
Filesize
136B
MD5ee0a5ef31145f930640c2562754ac94c
SHA1f9d7dfaae84f9fa16559452f2afe087d6e8364af
SHA2560c0f2162c09a1c2bd74236540fc2cd54d94ff7e626f97f9027e77868ebe58aea
SHA51288ee99e9a77a3b6b9b63d11aa0f905fc760f3dfa66f517f1890484628b84a4b082e988e05acafe1e3d08749b65809a2b52f75902ae464cfb825d2beac7c50b38
-
Filesize
136B
MD5e63f49753c9eed3696720f17be9b9639
SHA1c330d7d42c5f0b6a7cbb13c4c7b9dcff72e1d68a
SHA2561f2805b42111abe67f280995bf52dbdb83a205b9ed1cb9b05fb6b6eeeae59a1c
SHA51200a4d0c063d9d4674e5262cf8a67939e6f7e9f79b224433a28f271ce471beaba14108c95eba5e2afd55b76df3ab6afd8b3f41ee827e3c1db1942072976c40f5e
-
Filesize
136B
MD52808ee92ecd739f1c30b8a2d596c2e41
SHA1c9c395261d618f75a9a31e5e01e550bd80cd1bcd
SHA256fcb40b1b08a0f425948f0fc54d221f1a7c44dcc2c1391e6d008070487b2c901e
SHA512f8f5288f5c0fe9d9cd8927983ca14339e0744d86db26da1ebfbf9ba42190a8f9655888aeaeff3de15bde939ac22ea5dc961413861c9a33e24e46ae8db2dfe8ff
-
Filesize
136B
MD5f36d18605bb497763727851cebd94102
SHA143ec98e493750634b91bcd73ff131e3163afedba
SHA256ad80863cf36da90421512f27b1a3117569ea81239a73c71c50959aff1e03f6c3
SHA512ba5b54899a91e72be301cfcb306f9be6c9abc69075fd2dc7abed563f544079558a4a4d6d159e88910522d694e179abd52b0253abedd7c94b645907b95a5c4606
-
Filesize
318B
MD5a261428b490a45438c0d55781a9c6e75
SHA1e9eefce11cefcbb7e5168bfb8de8a3c3ac45c41e
SHA2564288d655b7de7537d7ea13fdeb1ba19760bcaf04384cd68619d9e5edb5e31f44
SHA512304887938520ffcc6966da83596ccc8688b7eace9572982c224f3fb9c59e6fb2dcaa021a19d2aae47346e954c0d0d8145c723b7143dece11ac7261dc41ba3d40
-
Filesize
224KB
MD55c7fb0927db37372da25f270708103a2
SHA1120ed9279d85cbfa56e5b7779ffa7162074f7a29
SHA256be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844
SHA512a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206
-
Filesize
201B
MD502b937ceef5da308c5689fcdb3fb12e9
SHA1fa5490ea513c1b0ee01038c18cb641a51f459507
SHA2565d57b86aeb52be824875008a6444daf919717408ec45aff4640b5e64610666f1
SHA512843eeae13ac5fdc216b14e40534543c283ecb2b6c31503aba2d25ddd215df19105892e43cf618848742de9c13687d21e8c834eff3f2b69a26df2509a6f992653
-
Filesize
628B
MD5be4bc4dca34108ccf3026d2e5ceb660f
SHA1868c6c5c70c45c3c561144e86da0bfdbc95c1f87
SHA256c494622c494be2d33997f548187c27781afb0953741df915f446caacae762a65
SHA51265b4172c6958ab148c2150320c5f1a4565a0904656277594498321d16d3091988ebcb8a6dbdb7b1800ba126a27842a1ce7be810c0ac912cfcc74bfd0f004b896
-
Filesize
42KB
MD5980b08bac152aff3f9b0136b616affa5
SHA12a9c9601ea038f790cc29379c79407356a3d25a3
SHA256402046ada270528c9ac38bbfa0152836fe30fb8e12192354e53b8397421430d9
SHA512100cda1f795781042b012498afd783fd6ff03b0068dbd07b2c2e163cd95e6c6e00755ce16b02b017693c9febc149ed02df9df9b607e2b9cca4b07e5bd420f496