Analysis
-
max time kernel
900s -
max time network
899s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
17-01-2025 00:48
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
Bnet1996!
Extracted
quasar
1.3.0.0
Office04
192.168.1.11:4782
QSR_MUTEX_f39lWqYnYtP5YngtM5
-
encryption_key
c5q7P5jsfrwN6nB5c3mG
-
install_name
SystemUpdate.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
WindowsUpdate
-
subdirectory
SubDir
Signatures
-
description flow ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe 129 ip-api.com Process not Found 137 icanhazip.com Process not Found -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x0028000000046277-191.dat family_quasar behavioral1/memory/1008-216-0x0000000000EF0000-0x0000000000F4E000-memory.dmp family_quasar -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3384 powershell.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4069049685-955655941-4058287599-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4069049685-955655941-4058287599-1000\Control Panel\International\Geo\Nation doxsys.exe Key value queried \REGISTRY\USER\S-1-5-21-4069049685-955655941-4058287599-1000\Control Panel\International\Geo\Nation Dox Tool V3 Cracked.exe Key value queried \REGISTRY\USER\S-1-5-21-4069049685-955655941-4058287599-1000\Control Panel\International\Geo\Nation Dox Tool V3 Cracked.exe Key value queried \REGISTRY\USER\S-1-5-21-4069049685-955655941-4058287599-1000\Control Panel\International\Geo\Nation Launcher.exe Key value queried \REGISTRY\USER\S-1-5-21-4069049685-955655941-4058287599-1000\Control Panel\International\Geo\Nation doxsys.exe Key value queried \REGISTRY\USER\S-1-5-21-4069049685-955655941-4058287599-1000\Control Panel\International\Geo\Nation Dox Tool V3 Cracked.exe Key value queried \REGISTRY\USER\S-1-5-21-4069049685-955655941-4058287599-1000\Control Panel\International\Geo\Nation Windows Services.exe Key value queried \REGISTRY\USER\S-1-5-21-4069049685-955655941-4058287599-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4069049685-955655941-4058287599-1000\Control Panel\International\Geo\Nation DOX.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Startup.lnk Launcher.exe -
Executes dropped EXE 18 IoCs
pid Process 4712 Dox Tool V3 Cracked.exe 1568 Launcher.exe 2136 doxsys.exe 4460 svchost.exe 1968 Dox Tool V3 Cracked.exe 1008 WindowsUpdate.exe 2868 DOX.exe 2256 Windows Services.exe 4432 HQUHlwGxWA.exe 60 Secure System Shell.exe 1420 Runtime Explorer.exe 5144 SystemUpdate.exe 5464 svchost.exe 5584 HQUHlwGxWA.exe 5380 doxsys.exe 2420 svchost.exe 5456 Dox Tool V3 Cracked.exe 5672 WindowsUpdate.exe -
Loads dropped DLL 2 IoCs
pid Process 1568 Launcher.exe 1568 Launcher.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4069049685-955655941-4058287599-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Runtime Explorer = "C:\\Windows\\IMF\\\\Windows Services.exe" Launcher.exe Set value (str) \REGISTRY\USER\S-1-5-21-4069049685-955655941-4058287599-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows 10 Update = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\Virus Total\desktop.ini 7zG.exe File opened for modification C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\Virus Total\desktop.ini 7zG.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 137 icanhazip.com 129 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SubDir SystemUpdate.exe File created C:\Windows\SysWOW64\SubDir\SystemUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\SubDir\SystemUpdate.exe WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\SubDir\SystemUpdate.exe SystemUpdate.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\IMF\LICENCE.zip Launcher.exe File opened for modification C:\Windows\IMF\Runtime Explorer.exe Launcher.exe File opened for modification C:\Windows\IMF\Secure System Shell.exe Launcher.exe File created C:\Windows\IMF\Windows Services.exe.tmp Launcher.exe File opened for modification C:\Windows\IMF\Windows Services.exe Launcher.exe File created C:\Windows\IMF\Runtime Explorer.exe.tmp Launcher.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\IMF\LICENCE.dat Launcher.exe File created C:\Windows\IMF\Secure System Shell.exe.tmp Launcher.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language doxsys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language doxsys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runtime Explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DOX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dox Tool V3 Cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dox Tool V3 Cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dox Tool V3 Cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SystemUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Secure System Shell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133815485338048546" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4069049685-955655941-4058287599-1000_Classes\Local Settings DOX.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5920 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2384 schtasks.exe 5352 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3084 chrome.exe 3084 chrome.exe 1568 Launcher.exe 1568 Launcher.exe 3384 powershell.exe 3384 powershell.exe 3384 powershell.exe 2256 Windows Services.exe 2256 Windows Services.exe 2256 Windows Services.exe 2256 Windows Services.exe 2256 Windows Services.exe 60 Secure System Shell.exe 60 Secure System Shell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5144 SystemUpdate.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeRestorePrivilege 3620 7zG.exe Token: 35 3620 7zG.exe Token: SeSecurityPrivilege 3620 7zG.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeSecurityPrivilege 3620 7zG.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe Token: SeShutdownPrivilege 3084 chrome.exe Token: SeCreatePagefilePrivilege 3084 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3620 7zG.exe 3084 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe 3084 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1420 Runtime Explorer.exe 5144 SystemUpdate.exe 5464 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3084 wrote to memory of 4500 3084 chrome.exe 80 PID 3084 wrote to memory of 4500 3084 chrome.exe 80 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 5112 3084 chrome.exe 81 PID 3084 wrote to memory of 1920 3084 chrome.exe 82 PID 3084 wrote to memory of 1920 3084 chrome.exe 82 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 PID 3084 wrote to memory of 2004 3084 chrome.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.upload.ee/files/13638229/Dox_Tool_V3_Cracked.rar.html1⤵
- Quasar RAT
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff857b0cc40,0x7ff857b0cc4c,0x7ff857b0cc582⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=1888 /prefetch:22⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=2152 /prefetch:32⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2296,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=2464 /prefetch:82⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4496,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4520,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4808,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3208,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4968,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4492,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5908,i,6989451023439468306,79939819179145421,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4024
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1564
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\" -ad -an -ai#7zMap21338:100:7zEvent46021⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3620
-
C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\Dox Tool V3 Cracked.exe"C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\Dox Tool V3 Cracked.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4712 -
C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\Launcher.exe"C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\Launcher.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1568 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath C:\Windows\IMF\3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Windows\IMF\Windows Services.exe"C:\Windows\IMF\Windows Services.exe" {Arguments If Needed}3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2256 -
C:\Windows\IMF\Secure System Shell.exe"C:\Windows\IMF\Secure System Shell.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Windows\IMF\Runtime Explorer.exe"C:\Windows\IMF\Runtime Explorer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1420
-
-
-
-
C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\doxsys.exe"C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\doxsys.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\HQUHlwGxWA.exe"C:\Users\Admin\AppData\Local\Temp\HQUHlwGxWA.exe"4⤵
- Executes dropped EXE
PID:4432
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe" C:\Users\Admin\AppData\Local\Temp\svchost.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:5464 -
C:\Users\Admin\AppData\Local\Temp\HQUHlwGxWA.exe"C:\Users\Admin\AppData\Local\Temp\HQUHlwGxWA.exe"5⤵
- Executes dropped EXE
PID:5584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Dox Tool V3 Cracked.exe"C:\Users\Admin\AppData\Local\Temp\Dox Tool V3 Cracked.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1008 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe" /rl HIGHEST /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2384
-
-
C:\Windows\SysWOW64\SubDir\SystemUpdate.exe"C:\Windows\SysWOW64\SubDir\SystemUpdate.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5144 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Windows\SysWOW64\SubDir\SystemUpdate.exe" /rl HIGHEST /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DOX.exe"C:\Users\Admin\AppData\Local\Temp\DOX.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2868 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\dox.txt5⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:5920
-
-
-
-
-
C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\doxsys.exe"C:\Users\Admin\Downloads\Dox_Tool_V3_Cracked\Dox Tool V3 Cracked\data\doxsys.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5380 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\Dox Tool V3 Cracked.exe"C:\Users\Admin\AppData\Local\Temp\Dox Tool V3 Cracked.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5456 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5672
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 15443⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:5628
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD5855fa03476e9fe5ea759531fcc818b86
SHA170d8d944eb7b4985790a309d03db69dffee2d9d2
SHA25678dd21f99a544922cf97b66b4a492b2fd26c09f6913346bb1e5229f110e31263
SHA512a43f7a7f51d4fb235b99134aa13fbc66adcb73c01adbc336268d5e6d89b09b3b80d6c94c168caa8682998c37fb52707d7a5b73ffb214a3712894447143724249
-
Filesize
6KB
MD561482d2ebc8060a23aae81ef1482e118
SHA15b03afdd139f5e654d959dc5afc34733f02412c2
SHA2567abd3f12992e35583f866cf78e9736da8cc912fdf4c1d0da2b2b83e629761a30
SHA512ff8dea83190ea38847cdd13114d2cf1f493180693b57085d710dba4c3051dcca9ab16c90d5361af112678f61ea8d2bbe2ad9192ab4b33e607b2798c2bc1737a6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\fa9acc9b-c959-4f2e-adca-d59ff213a0eb.tmp
Filesize1KB
MD558c6b352a9249df00100a4213a072d73
SHA1a85c7cc5515ba2fcf5a8d9031fddedac45c93376
SHA25671db97db06b29f72c1266e646f7ba0aac2e77c9565d3c9c8175f6265aad53726
SHA51239349e98839bb44718160bf2d24d3026267219d4e07ff0657640e9c4c84c7c0e7c0dd0d0ee18b16bb14a110b7689db29e3d496fa5f364ca6756910a53f932365
-
Filesize
9KB
MD5d117cf99d81bb1564bccf96a4932b30c
SHA1b464cbbd190ba3d7bf4a018f86d4bbfae6f8201c
SHA256f2cf75f2571e72c8965dbd8a06036822b1892220308b800247bf49eaee6b73fb
SHA512f6efe72276b1c14dd758069d1dcaf981adbbc62cd3965dece0c306e42cc28fc79f6c0bd222d572abd1a42f7814effb2fa1ddd60fcdfc495532c0b15feba4cc3e
-
Filesize
9KB
MD5f04a196de36d449f202285a9ba2cdeb9
SHA144f3826940ad0c7e2012044b976f004d1b74d5ef
SHA256c3c69906d81d25c12f71990e66e21fac1b28ddedcd7c4924439a4f0fe317b910
SHA51264aba63aff149e525cc5e8f61500a4adec36b143ddad8a8eb8005abda4e35b3391165cb764d2491382ee7852e2c337563b6ae25c23a0c32700a652656cc45a19
-
Filesize
9KB
MD53231c29dcc59036b2bbe425808e620c8
SHA15187f935659c624b040646189c845bb52c506235
SHA2565ceeb6cc7222c09ec27e8ce6a2da87e9b91ef2c80083bf581a2abd809ba9cabc
SHA512259e7b48f5116efbc018c7063b422df293c3694c86fbb9e8405857c159f198d9017118717a9676773655465cfd4eedf91d90f2027a47696ca1e00a0430039b13
-
Filesize
9KB
MD5b0e85b93e89a978e42a5f07d5b3da775
SHA12417ab6f5ec716403497a3684cbbd67931be66e3
SHA256e84e40bb321f9fe2564e4a0731d5c9b4d9504c83678e05b63396abf0aad2ae8c
SHA512b76a89dd65851721b2a047302baf27b8f2094cdfe9c4719536ff0db543f2587c4e21a2b9957ac0e680c1e2e6ff6ee0292333d9aa9ae71f612174e799bfd3326d
-
Filesize
9KB
MD5006dcdb31b5f7d96e111c16f0fcd9cb6
SHA1e0d4876da28bbe6503f509f1fd449f889b8c71ae
SHA25644d5fd7ebb45643db8511e60f84d5b0e5d4c4059c450a6885d0e09a88bdb9e39
SHA5121b03e0c385b076621e9529a51cc6c4a3c54db1ea8b1d7a322685d6aea6e63403ddd16aa464438bd0b75f9c25a0655d87bf05847ae417599a90a7bb28d280ec17
-
Filesize
9KB
MD5eb7678889db8ad8ea77e029d8911e8d8
SHA1be21a9b7b18fdcef8416df9f59bc1282a04d1278
SHA2563aaa12891f4a12bc8ac07c0b6da881e2a30bd50e68b11db4e27d5bb710c6ffe8
SHA512657b61f1bf2c4e3398e3b739ffb2283cda0ba70c3c8035da511a5d82219efefe4f7b99ea6c0497a880888debe2888c5fd277db664676d007a45d40e723f8e1ae
-
Filesize
233KB
MD54f5aff78885db1af13da53eb76afa5cd
SHA1b1ec96e52f41ccabcfb26de7f176480405183555
SHA2566a069a034aa43462e8b3c94213df732049d7b254a6ae15b3e51b0d29af67d08a
SHA512cd3274c18e04a7666e9fe9abfd34f9ec362f3655c8ed5f18f12134c0bb9dfd0b7f9607c98d62d1cb18d9e34855b44949148032ff8c30e7ebbb0aa227c9ebd1c4
-
Filesize
233KB
MD5304277ba912485cc40e5c554f67b78f5
SHA1711a9732ddd48cd8b18d749501cdf6dfd6c73bf7
SHA256af93955c5d30e534e673787349df28cb5b79d9acf94e75a37818008aa1d0eed2
SHA512380fb67ed83117f37efc3583712678bf960356c1565f8fc0a251c6fa5d49d5279e9e28f99c4c0346e03dc7025ccc0b1303e203d5cbb1542f94e29313d1c838e0
-
Filesize
233KB
MD537094c91956b793d0c7f9c60c76610c2
SHA11c5e33914748113104ef5a4dc748b2a130a38125
SHA256fe4bb1ccc8df4a08b09816dc052106bb959a3c8ba6300bb7ee510ebb4cba55d6
SHA512868b2ab981a426fef735a646b73e308195189669fa5e2f025400c454fd912ebc4bfda138bca0ed3b81bb0fde88fb20e9058a0fa6116d7833fd705492421314b1
-
Filesize
264KB
MD548afb4e8d5dae01585e6ee2dc962043c
SHA1719ef99fdcd0da62e8f8613a822ac49db6ad827f
SHA2565db945e209c6a54310e1f304c508c3927a30fcbf1278b99dbf6f5f16c890f7ec
SHA51217c355d73c16d95d4ae92b46fbafe74755f6363c1b2597a04908fe1d21444e6a60964319b781d0f38066453d893295dd655a7efbd1e2ce9ea42b744242747808
-
Filesize
224B
MD561611046087f6dc9bd4709873e8f09eb
SHA1d7ee8c54b4255ce2b7198bda0370321a83ecdae6
SHA2568c1501db875933607b61adcc2810f00b86583055ba95ceb21db86b71f08be18a
SHA512a5d631cb9443109cf9c58aa65d640b34be7e8f59e84fbe94a2fbb9cbc41eeaab8c920ef6d76c2e3abc421f86d1075dce2630a8a19a0b941ca6b21a4b061e1bad
-
Filesize
1KB
MD57a81a494bd4a69be28fc8144363f6c2a
SHA15077f61cd60e014f13291327cc576e48edcdc5cd
SHA2561b51ec5575abde0dd24eb950ebb7a338488596d8ea5e993062fd54ad33ac554e
SHA512dc75e9c8e06c0727b5427c9d63eb8b08ceb9827793b7943da2b346a745cc4963218a2885866094f9e25c4909a6307c1e74a70296c78ca9a781867567445d8774
-
Filesize
154KB
MD5670f75850165e3c3ef0df41e1565ff58
SHA1784ae13c951ac390d7dea0071c97aded6800b708
SHA256fb128eba50fac8bc22faac39de602c306809cb37167b950bd194eb0bd9832812
SHA512c0355235fbce7829dbcd3fac26ec5663b09c880826a014599127f330ddd3c16a95a0ab973fa75ddbb4ce0f8756ab2494739b04d1fda0bb799d577e493c9ca9b9
-
Filesize
688KB
MD519d55f26a6237985cb72c59c08d4828f
SHA18bc51ad39e35f9be7d46e9e90e754e07d9c88b80
SHA256317f9d304aea7c5a4b3516f5379a63e2a4fec91578f3c3f69507c8167798062e
SHA5127a9de012783f9323264fb59739b76195acedd846ea15382d67e5ab19325269a37647865aaa44da9a97fb8eacdf365c1b6c55c0920c46a6cdca6a7c73b09e19d1
-
Filesize
20KB
MD50d282d4eb8db6d5152b4e5fd3e2064b5
SHA172cec747647d5d0f6ef2e5ddb34f1db68fc183e5
SHA2568663bef0304a937fe47af465c03b8930a5db2dad39bf4dd1cc6baa64cc272061
SHA51216b2551711afa27baf9aa95d37c2d1b0689c32930ca5a4c7fabe66ea05513f460c58b36fdb96efb26963f10cdc518934dd3f5b623d424a2f299cc47d150f1e72
-
Filesize
20KB
MD594306f6cf69f7e7c0b4f10ea499f73dd
SHA13228b4c2ca9109aa86f2810afc3d528947501c92
SHA256ed937977d846c19ea5a721c8f720dafc4c697c2b136c17d66d7b6a4200090a7e
SHA512d6c19775a96dedbd40be96d5b3aa3fb0db3d52749e0d54667b38a2f677c94b630ab543457708a1c123776ec473e9f40f18eb4080703ee9adf08110c417dea136
-
Filesize
348KB
MD5a59f7fb8ac2dc166432a86eb8e2179ff
SHA19c8b24bda935e397e1c0cb33752331fe1f773b45
SHA25682d315a2102a1bbd8c1533ea70f93982d2ad0fbbad3d48e9a4265c45353ceacc
SHA512ff05149ca95d982ee44c820d8bc03e48d6230a7085291f0653398a410a16610038fbc336ec843db7020458fbe982762439990b348de050248758450b3ea263be
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5d3c805ba98e3e0b8a447ee15895f889a
SHA1e2b7e8bf64cf0671faf231478228e0afb995c0f1
SHA256bebe88e7ac9f376739fa986ec35158ebd21451761c3e6374f4371d142ffbb054
SHA512612dff02e9131c1c69b51e3503f6b5491de549a630b0297c7a3a34dbc3c35f8d0c859dff1b9c51344c7569bf5de84c35d62835c4713873ae0c3b8708eb6d7a52
-
Filesize
76KB
MD5a57d275fcac1be0b9aad189223a313df
SHA10762b222741fa30751dce16e7dae2bcd191adaea
SHA2561c6d4e2a60849385c9b4cfbb1fc92032cb503497099208f62d7908e52b9b487b
SHA51241d90ec2548654b86bba21d178bae55b538bc7acf7811b9615095e4719e52075096053427ff85428a51047f405e8d1e6a633b999655e296c9ac396fb2bba36a8
-
Filesize
1.6MB
MD53644f99ddf506a39da30126c9a0abb6a
SHA1f04f0277ff79aeea0d5cd0f28e8245f50a2c7d65
SHA2569c09ded5ae06efdb1d52f183d70f6a3fc821618bcd60d6f4a9f0c46d20bf589a
SHA5122c750caa10db3d32aee69b229e6c4060df15dd4d688b4e52fca2f1214e466356f920f40eb5d5dc27b292a0dc68b58db0b9454e738f7725d4996b64db644bcbe4
-
Filesize
207KB
MD56c206cadf297a02c0af977c65637a166
SHA17d382b1e6cefd120f9d87f894e14088e18d01c73
SHA256f4f78f44719af71a363bd50107840f53f8eebf3190505c10bac2cf7be3c29e59
SHA5122672ae02fb6b768861f469556f9818fd84866d62122f243309b5f2d13c4c907b6555e968bfb4b10cd48188fe3b2182b15ee7f425ddd14835b483d0dfe721b515
-
Filesize
480KB
MD5f6933bf7cee0fd6c80cdf207ff15a523
SHA1039eeb1169e1defe387c7d4ca4021bce9d11786d
SHA25617bb0c9be45289a2be56a5f5a68ec9891d7792b886e0054bc86d57fe84d01c89
SHA51288675512daa41e17ce4daf6ca764ccb17cd9633a7c2b7545875089cae60f6918909a947f3b1692d16ec5fa209e18e84bc0ff3594f72c3e677a6cca9f3a70b8d6
-
Filesize
68KB
MD5f5aadc03147d77ab7a70fe6264834ed8
SHA1cba9736640d95ee657df2399933358c8ff32c18b
SHA2567e3279436507b8a3df5b42f2abe80a18d79612f3f02393b149a473ec4df4ea1f
SHA51284aa83da4b875a65e81339392602e59b6fe261ad84a710e92cab41877b7c0dc808226bb46d4f1e1a1588539408ac9f548df7ee6e2754d9e70f5b648285692322
-
Filesize
53KB
MD5c6d4c881112022eb30725978ecd7c6ec
SHA1ba4f96dc374195d873b3eebdb28b633d9a1c5bf5
SHA2560d87b9b141a592711c52e7409ec64de3ab296cddc890be761d9af57cea381b32
SHA5123bece10b65dfda69b6defbf50d067a59d1cd1db403547fdf28a4cbc87c4985a4636acfcff8300bd77fb91f2693084634d940a91517c33b5425258835ab990981
-
Filesize
1.0MB
MD58f36caf603f3f2b192c5fd06a8e3c699
SHA144f387152ee1fb02a83ed0be5e942fd4a733e235
SHA2560ca828c630091173cafd2663393888849459fbc9581d1fd062567d0afdf79a38
SHA5129df012c7420a4f6224907a8ac1e3293985b30c9ff829ecc9cdeea56fdcaa1c46d8e131fdd9b525e6af092065a29401c11f24390ba30969e9f3ab7e60e094dcba
-
Filesize
128KB
MD54576eb05633bafdd3064313307a2ee6c
SHA173fce9ab20bb8b640d11f384f1375fe24271d842
SHA25651e3ec5fd9d485eaa7582326eedb2fc16e43f9b3ca1c83d64cc80a73aeaff17c
SHA512ec6109e71a991d84788395d51e1cc4e2212859e4ab293f2f7b96b4a9d439609b90ba6c73ee47b5a59d4dc1027a2946232157c2c6cfa4613abcaa8d3279716cc4
-
Filesize
45KB
MD57d0c7359e5b2daa5665d01afdc98cc00
SHA1c3cc830c8ffd0f53f28d89dcd9f3426be87085cb
SHA256f1abd5ab03189e82971513e6ca04bd372fcf234d670079888f01cf4addd49809
SHA512a8f82b11b045d8dd744506f4f56f3382b33a03684a6aebc91a02ea901c101b91cb43b7d0213f72f39cbb22f616ecd5de8b9e6c99fb5669f26a3ea6bcb63c8407
-
Filesize
46KB
MD5ad0ce1302147fbdfecaec58480eb9cf9
SHA1874efbc76e5f91bc1425a43ea19400340f98d42b
SHA2562c339b52b82e73b4698a0110cdfe310c00c5c69078e9e1bd6fa1308652bf82a3
SHA512adccd5520e01b673c2fc5c451305fe31b1a3e74891aece558f75fefc50218adf1fb81bb8c7f19969929d3fecb0fdb2cb5b564400d51e0a5a1ad8d5bc2d4eed53