Resubmissions
03-02-2025 15:32
250203-symvdswrdq 1003-02-2025 14:58
250203-sclp7stqhw 703-02-2025 13:24
250203-qnnmtstpgm 803-02-2025 13:20
250203-qk4vmsskax 703-02-2025 12:30
250203-ppwt6asqcn 1002-02-2025 19:42
250202-yeqd3axrdr 802-02-2025 19:41
250202-yej72sxrdk 302-02-2025 15:25
250202-stqeqazkbj 702-02-2025 15:25
250202-stl3aszkap 10Analysis
-
max time kernel
1250s -
max time network
1253s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-02-2025 13:11
Static task
static1
Errors
General
-
Target
test.txt
-
Size
18B
-
MD5
5b3f97d48c8751bd031b7ea53545bdb6
-
SHA1
88be3374c62f23406ec83bb11279f8423bd3f88d
-
SHA256
d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b
-
SHA512
ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6
Malware Config
Extracted
quasar
1.4.1
Remote Control
10.127.0.81:4782
3d3d19ab-0951-4925-8c6f-5a5936283911
-
encryption_key
1E446D242DFD1A0574963B03CE598C31EAFB3750
-
install_name
WindowSvcManager.exe
-
log_directory
ServiceManagerLogs
-
reconnect_delay
3000
-
startup_key
WindowsSvcManager
-
subdirectory
WindowsSvcManager
Signatures
-
Quasar family
-
Quasar payload 4 IoCs
resource yara_rule behavioral1/memory/428-623-0x000001B0CDCC0000-0x000001B0CDDF8000-memory.dmp family_quasar behavioral1/memory/428-624-0x000001B0CFA20000-0x000001B0CFA36000-memory.dmp family_quasar behavioral1/files/0x000800000002572e-1494.dat family_quasar behavioral1/memory/3236-1500-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 3236 Client-built.exe 1756 WindowSvcManager.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 camo.githubusercontent.com 2 raw.githubusercontent.com -
flow pid Process 122 3484 chrome.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\taskschd.msc mmc.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Taskmgr.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1888 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133828891011658053" chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "147" LogonUI.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Quasar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Downloads" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Quasar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" Quasar.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Quasar.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Quasar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Quasar.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\Shell Quasar.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" Quasar.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Quasar.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\2\0 = 780031000000000047595c5f1100557365727300640009000400efbec5522d60415a6a692e0000006c0500000000010000000000000000003a00000000007bf2870055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\3 chrome.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell Quasar.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\SniffedFolderType = "Generic" Quasar.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0400000001000000000000000300000002000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = 0100000000000000ffffffff Quasar.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Quasar.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\2\0\0\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\Shell Quasar.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\1\MRUListEx = ffffffff Quasar.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg Quasar.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 chrome.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 chrome.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\2\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\2\0\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" chrome.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\SniffedFolderType = "Generic" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\1 Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\3 = 14002e80922b16d365937a46956b92703aca08af0000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByDirection = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Quasar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings WindowSvcManager.exe Set value (int) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 03000000010000000000000002000000ffffffff Quasar.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Quasar.v1.4.1.zip:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\RE1Mu3b.png:Zone.Identifier chrome.exe -
Opens file in notepad (likely ransom note) 5 IoCs
pid Process 4732 NOTEPAD.EXE 4504 NOTEPAD.EXE 1376 NOTEPAD.EXE 3544 NOTEPAD.EXE 2276 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2204 schtasks.exe 4444 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4624 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3740 chrome.exe 3740 chrome.exe 1128 chrome.exe 1128 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 5108 chrome.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 8 IoCs
pid Process 4624 explorer.exe 2776 chrome.exe 3384 chrome.exe 428 Quasar.exe 2732 mmc.exe 1756 WindowSvcManager.exe 3312 Quasar.exe 396 Quasar.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 30 IoCs
pid Process 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 3896 msedge.exe 3896 msedge.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3740 chrome.exe Token: SeCreatePagefilePrivilege 3740 chrome.exe Token: SeShutdownPrivilege 3740 chrome.exe Token: SeCreatePagefilePrivilege 3740 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 428 Quasar.exe 1128 chrome.exe 1128 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 428 Quasar.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe 396 Taskmgr.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 4624 explorer.exe 4624 explorer.exe 2776 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 428 Quasar.exe 428 Quasar.exe 428 Quasar.exe 1756 WindowSvcManager.exe 2732 mmc.exe 2732 mmc.exe 428 Quasar.exe 428 Quasar.exe 428 Quasar.exe 428 Quasar.exe 396 Quasar.exe 396 Quasar.exe 396 Quasar.exe 396 Quasar.exe 396 Quasar.exe 396 Quasar.exe 396 Quasar.exe 396 Quasar.exe 396 Quasar.exe 2812 PickerHost.exe 4596 PickerHost.exe 2132 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4504 4972 cmd.exe 79 PID 4972 wrote to memory of 4504 4972 cmd.exe 79 PID 3740 wrote to memory of 4760 3740 chrome.exe 83 PID 3740 wrote to memory of 4760 3740 chrome.exe 83 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 396 3740 chrome.exe 84 PID 3740 wrote to memory of 3164 3740 chrome.exe 85 PID 3740 wrote to memory of 3164 3740 chrome.exe 85 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 PID 3740 wrote to memory of 2588 3740 chrome.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\test.txt1⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\test.txt2⤵
- Opens file in notepad (likely ransom note)
PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fc75cc40,0x7ff9fc75cc4c,0x7ff9fc75cc582⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1856,i,2841080293961917415,6537215519081687791,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1852 /prefetch:22⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1720,i,2841080293961917415,6537215519081687791,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1896 /prefetch:32⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,2841080293961917415,6537215519081687791,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2200 /prefetch:82⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,2841080293961917415,6537215519081687791,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,2841080293961917415,6537215519081687791,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3568,i,2841080293961917415,6537215519081687791,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2584
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:1640
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1128 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fc75cc40,0x7ff9fc75cc4c,0x7ff9fc75cc582⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1760 /prefetch:22⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2076 /prefetch:32⤵
- Detected potential entity reuse from brand MICROSOFT.
PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2196,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:82⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3068,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3092 /prefetch:12⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3080,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4484,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4472 /prefetch:12⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4804,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5016,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5200,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3212,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5168,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3308 /prefetch:82⤵
- NTFS ADS
PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3712,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3260,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3764,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3136,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3200,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5352,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5712,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=3768,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5340,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=6248,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=6324,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=6404,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=6116,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=6672,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=6232,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5272,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5900 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6668,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5984 /prefetch:82⤵
- NTFS ADS
PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6060,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5936 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=5964,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=6264,i,1228332244129531129,13007385125258670382,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3788 /prefetch:12⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1764
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4916
-
C:\Windows\System32\DataExchangeHost.exeC:\Windows\System32\DataExchangeHost.exe -Embedding1⤵PID:1304
-
C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe"C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:428 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" /select, "C:\Users\Admin\Desktop\Quasar v1.4.1\quasar.p12"2⤵PID:3684
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4624
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵PID:2344
-
C:\Windows\system32\ipconfig.exeipconfig2⤵
- Gathers network information
PID:1888
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵PID:4468
-
C:\Users\Admin\Desktop\Client-built.exe"C:\Users\Admin\Desktop\Client-built.exe"1⤵
- Executes dropped EXE
PID:3236 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WindowsSvcManager" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WindowsSvcManager\WindowSvcManager.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2204
-
-
C:\Users\Admin\AppData\Roaming\WindowsSvcManager\WindowSvcManager.exe"C:\Users\Admin\AppData\Roaming\WindowsSvcManager\WindowSvcManager.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1756 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WindowsSvcManager" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WindowsSvcManager\WindowSvcManager.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4444
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ratted.txt3⤵
- Opens file in notepad (likely ransom note)
PID:2276
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /K CHCP 4373⤵PID:4688
-
C:\Windows\system32\chcp.comCHCP 4374⤵PID:4068
-
-
C:\Windows\system32\msg.exemsg * "ratted"4⤵PID:3792
-
-
C:\Windows\system32\shutdown.exeshutdown /s /f /t 60 /c ratted4⤵PID:4508
-
-
C:\Windows\system32\shutdown.exeshutdown /a /c lol4⤵PID:3152
-
-
C:\Windows\system32\shutdown.exeshutdown /a4⤵PID:2868
-
-
C:\Windows\system32\shutdown.exeshutdown /a4⤵PID:4696
-
-
C:\Windows\system32\shutdown.exeshutdown /s /f /t 5 /c quasar4⤵PID:2908
-
-
-
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"1⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
PID:396
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\taskschd.msc"1⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2732
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ratted.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1376
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ratted.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3544
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\79ef6aff45744d1e935743086373a9fe /t 3916 /p 4281⤵PID:3936
-
C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe"C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:3312
-
C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe"C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\Quasar v1.4.1\Clients\Admin@GMTYKXRU_872C1E3\Logs\2025-02-01.html1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:3896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9ea003cb8,0x7ff9ea003cc8,0x7ff9ea003cd82⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,365869279022398033,3456978494271451805,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1888 /prefetch:22⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1864,365869279022398033,3456978494271451805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1864,365869279022398033,3456978494271451805,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2556 /prefetch:82⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,365869279022398033,3456978494271451805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,365869279022398033,3456978494271451805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1864,365869279022398033,3456978494271451805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,365869279022398033,3456978494271451805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵PID:3608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1836
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\new.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4732
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:2744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff9fc75cc40,0x7ff9fc75cc4c,0x7ff9fc75cc582⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1788,i,16098206278899753431,12485126438836131401,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=1784 /prefetch:22⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2108,i,16098206278899753431,12485126438836131401,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=2116 /prefetch:32⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,16098206278899753431,12485126438836131401,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=2208 /prefetch:82⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,16098206278899753431,12485126438836131401,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3212,i,16098206278899753431,12485126438836131401,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3588,i,16098206278899753431,12485126438836131401,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=4484 /prefetch:12⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4344,i,16098206278899753431,12485126438836131401,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=4360 /prefetch:12⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4696,i,16098206278899753431,12485126438836131401,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4944,i,16098206278899753431,12485126438836131401,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=4960 /prefetch:82⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5156,i,16098206278899753431,12485126438836131401,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4948
-
C:\Windows\System32\PickerHost.exeC:\Windows\System32\PickerHost.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2812
-
C:\Windows\System32\PickerHost.exeC:\Windows\System32\PickerHost.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4596
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39b0855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
40B
MD5e91ee655fc370fc76cae70be75eb4da7
SHA1b1c2a36a252373b78768ff0b8c7c414975f8230d
SHA2562119db0210675f0217218459520534d0442fb93f8d2ad66ba4b20c8d2a430ac2
SHA5126295ce62fc97be1ee529b0c4dde9d8b806e7972d89378d527740c3865bae85e089883634ad2c3a72b0f0c63f0a0758645733e9e8d9092fb87bd7cc3e95d6c7f1
-
Filesize
649B
MD530806028105b5dec35763be5ecfd9769
SHA1478c2f65d7cc1ed6521b6e0bf8b8118a151e9b38
SHA2566ae8fa673c9a0dadab12ff360bea4997c5c1d06750a0a24a3fa313aadb298737
SHA51207b1125f1ff0b9b95a4b2d5a41586e658c6ad89f0be632eebe3901392885a56c33501ee145e25d0f53964e4871b028d86ab985638ae1f402784b813f7d6d13a2
-
Filesize
44KB
MD55beaac4e415a2494054bdd65d6adb0f5
SHA1fb7a0a7f1d1d5fa33184fb4c8c4c2da221b3a235
SHA25664fae392ae2e98dfa9fbf06a73cfc3abc81893602409f82096cc79e9c7284d23
SHA512907b7ef4142205b5ba5ede5ae70e4c4dfedf9c0f79a5930b44fdf24f9e5e7f4314e3a16e54fdfcf04914eaa219c81539226d05d02f2a0f601573d5f564f92858
-
Filesize
264KB
MD5835324ffd3961bcbdd6a48057d19be47
SHA1eb0babfeb78f5a9634c3006285cb63904f3f400b
SHA256cbf52b878ebdf5aa99c8eb21a36bc0ad5e8c2bc77f9944be22b542cd13312b56
SHA5125e64070ed61df91c41a54f6680ec4f4020473bf3187066b3409ad0afcad9eac81c8528ba22b0a366da307dc14a0bf3a090218aba25185682729dd158c8e50f64
-
Filesize
4.0MB
MD56cda0184d0bb4e82f2e8c7a18ac0fd42
SHA14b57b61bf87c792b4e0da5df0f5c9d6c69e09c18
SHA256f623097eee59b39dd3a50bb6f059dd9716fbec02f4eb31aa88ea26361f284cf9
SHA51255b3d51fba2905e25f583a7ce4469e36b368c47fa3f809632027de61d233c5e94560eae2d5b5a7a2573d717bc52a74d365c74aa3f250f08745e8fd44e1070456
-
Filesize
302B
MD5142d9ab3fd00e11a34f19ef607435e1c
SHA1b92248b0c82e44c09c8eaf879e0e5c8e7c8f9ef6
SHA2563254deacfbd4ba3e172d4a9f825b299a7cedaf710d8fa428a1e9800846d351fb
SHA51244c4ea35da9ea3fe1d1e70d51158bf36997e8608ce0290b4371bff1814d1dc961ee1dcdb0468da7d3808185338bf258f50c7f7eec921f2199b7db4557737377f
-
Filesize
3KB
MD5f16347bbccdae80e74ad7f461c483f54
SHA147e1fe755f7c6d1ccb541a9c749682957f2d4e10
SHA256596d9419924de8bd9ec871cc9011b435af37a2288467610f95a92347b8ba957e
SHA512d5d9236c0252657b14b4631646aa9232000bf840de23dafe18179e96f254a930e442280645da2f8691363be1b91be2a603fc24c68675d68dbba3bdb699a19b5b
-
Filesize
4KB
MD5738d240caa78932f6e72c421dc5a20be
SHA12965cb9797235cf23f8514df05e1619a903cde9b
SHA256d401d482bd656a01e90b1f4d810c36adc5e0e47ac747389e6375bdbc95f8626d
SHA512990fa197f46cd539a781f078d0f6e5f983896447adc87c5b557c14f19ba393206ec126f93fadd1e0f48c3a4828f5c59a5292b0ef6d3348a5d974a4d45b6f3017
-
Filesize
3KB
MD5a20d7d206a873addc200a9ea1211c7c7
SHA1a9da7df684bd2dd37a3d124e97d674b520bf74d5
SHA256bcd93a09beea1cb24738973a7065ddd5732730db59f6e1a635e6e65fbed94928
SHA512fb5eb1fc8891df8e4db04f7b40655b0e6ad9506f1e9f454896903a57c142be942795facbaf799e1b13f88b385aa31fbd3059bfd4e3281b98892b29c2adc463be
-
Filesize
4KB
MD5812ae343c16488d835495ad1236a1fb7
SHA12ad2061c45049b2c314506ad37b1609be70b97c6
SHA256c028442472a13510878fd5a368a85419d576fd467a375d1aaedb697743d1c579
SHA512be27508d799e82a121c2c669e28d84e5d63e08af2ae1f6a0422b8a09f08c4525a476b31108c1480719eca65a048758aab745361d1a3fb1483183bb8c179b846a
-
Filesize
4KB
MD53e3bfdaa01114e1ad70d2c8be011ac8d
SHA1a3770a3f0503f0e6e0c866cf54b248cc71796b6e
SHA256191125d833c80de3820c3aab69969e0c3ff2e1c48da9884bafda0505ba4562d8
SHA512f8e1ad84712cda9d68199efffd08c221ae818f69d3ebbaa13e8d511bea8b47e1c73b2a408e51ec64c53806510a99b0a0db5859fdc44c5c9274d6d7e7192a4c61
-
Filesize
4KB
MD5c3bf734dfc86339c09f0eafd9b34d397
SHA13b87fe0dbc060c7067265b2339b3765525e291e4
SHA2567108aadea060eb414160d1d7f1cf376d96903ef66c5aaf787ae6a6199747d798
SHA512f92b84dddfe26ffe64e62413b9b6a1b8a9490cd643b8d030354137c38e23e00e5bec546c69bc4263341ef5dd67df222215cd0d7555fc271e126b20d86f2b2101
-
Filesize
320B
MD5d2f743f21a2c25d672ca0a8079d1338f
SHA1b24b268b86f0b926f60eda57e61d7525fd20f7bf
SHA25633fa050cb4a1ca3c3d9f0c3912e9902fa345eb0e69960fe4c71d41ca85415b9b
SHA51279ea7cf73edbf34ea7e30b4cdbf2523b1571415cef465d8f674290357122c2ebda00a84a11d499c2451ca03d8a909d9e73c692a87a348d6e66990ddc30cb2c7b
-
Filesize
44KB
MD51becb44925bfcde792abcd3c444879f3
SHA1df4302249c13c2d090760353bb98561463b10430
SHA2563f19dfa41157ba12e11c54eb04d4e52a1e1cfc1c11bd8b27abbf0701c9fc8fcf
SHA5127e99da29ee6fc581e02d4511dda7a801704ef0d2ad101d51ba30607e8572ceb473b8e3db5db344f6ce4b311e8af13d4c77d86d69a517b4f2ad64a0c0cd09758d
-
Filesize
264KB
MD5edfe70e361414d8da867d769d8f121b1
SHA1df7d3f4ec441dde1690c560110c51eed2c073299
SHA2562e0bd17841592c82cac2cf02385aa6668feaca9875711d4b4480dd953fe54728
SHA51211cdf14959638ca24ad6a1d0d604e69b4a86623998ba168ee9d733200e3933b2822fbdf722a9c4ee728e91d1f9791ad40142bb7e4dd73b8bec4209ab04e7056b
-
Filesize
1.0MB
MD5088e5e0205b3842a8e793736580a6fdb
SHA194a3a3ae8c721016ea2c2073a9bb2d624d3ce571
SHA25693e556a58e075881e1430739ae9fefddcc4e4983ca61afed92fbb95a45d41994
SHA512da119eec31a26d13c6d7c8c4763c2a682da707abd7ed29afdebddbd41e42e44d32f19b68ca67637b6dff9237d1ac6f1a49d75556bd32f4ecd2056e70d34df218
-
Filesize
4.0MB
MD5cfa172a650b84b3abdbcc47097ea7b57
SHA15b45943b506c37225942826c102fcca6bb743847
SHA25674581baa80a130006b3dd5628aa4845b20089bb80a5c5710c459e2708c95b038
SHA512fd8626ec91e0b48a17bfe1bbf51ff8419717f631109ea2ca39b908dbc06d7628b4ff5d861bee7bc2070685c59a63c9c3759db1cb589299a0cf430a7d3b5dabfe
-
Filesize
329B
MD54fd99888b9f84acd722dfadee3427087
SHA10f6026954ee9e906edfa30738bb42ea5cd0264da
SHA2569ca5b75c5cef448dcaa01b91a0387a312a483baf7ef5cccdafe727f8bcd88fa2
SHA512884dd70c13a6ad36edd9eb83c7bb0aa94942270d70f0d87de8e3495a47eab45133246fdfe12b25f1d487605afd10782bc39eafbb264166a141393ccf7dff9e9d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\270c5915-27fa-4d2d-9cb1-3403023fbe08.tmp
Filesize3KB
MD5fd069dfe5ef6a9df927e70f19d7570e2
SHA1beb1c03fccb4a0b0ad3a3118784841b7a9bf35f3
SHA2562b0c7d96d8558533d4248c75b964d9fc9b9b66c0a104e1aa01373089225cea98
SHA51283a48281f6b491e3af84590599b525700d4a95eddab7e4a5ef3fd81d4c2eae56299f432975967c5c5863f4a65424647c597226eb5a649305e5201e5cf55b3e6f
-
Filesize
7KB
MD5845db215766d59dae2e6a3cce0aefc15
SHA197e52215f0c81c303bcf9dec1ba5ddc3b73df3b6
SHA25607a0c11854e1ea0cd33442f01c54d3464b03aabafab7c2ffc0c2f92751c19b5d
SHA51269cbca6b7c6ddd831d98712ea0ffaa6e8a1e33859997c783240afa6cbe4bd9cf1ac806d9ca5338dda2a41686a6cc9d901a238bcbf3416efa0e627614d5fec3d1
-
Filesize
2KB
MD56649a9cd31cc9fa2d3bfa5226b55e4ae
SHA105e88d714f75ce232fccb1b675f49aabcc951b5d
SHA256a847fe929fd8974120a7095e3a0c99f3321147417cfdf017db1740fa8f83f444
SHA51283f3b11129ddfc76c92984ab8aff6225fdb9d556895bb2a42c134deab7b360b8fd1c15b2e8dcfcacdd520e07b41a1170b53106231f1e00fcf4f64f8d32c31221
-
Filesize
1KB
MD539193dcf523b908d55820ab5d98727c0
SHA1302a9ae55146c0293f304a1d4c1be971543f7264
SHA256e4b5a7e8042bc0c2da461c851bd751f25c0945b772b61e9ed1f5fe9c16ddf845
SHA5123c18cbec6f25eb7eb6c099834853bdd093bbd77cbc33597caf29aeb3f89b1546dcc20b0f5f4ae4491a47c8f9b186368fc941cbd118979376361d07f3170a2d60
-
Filesize
3KB
MD5bc7fadceabaa666b521cae67c29c141c
SHA1fb07043e9053e3f21235b2c30524f7f84254bb96
SHA25695f1c0711b6e0819da9f89b05ed843e0f33bbee6844bd6da00ac286fc8db4347
SHA512443380d10234b9f6dbcebaf88f57615a5152afad94c265a6510e7a60b9f1009ed3a7c803e54c633c2433a527678d7ab83247f7a73bffee8c117ecde02d15d508
-
Filesize
9KB
MD53c6a25e16544d4e6c61a2c50c4e65806
SHA1fc6134e8999dd9fdc721ddb1d72eecf1e49d6c29
SHA2560a605251710dfea615dd3bf0a149da3a6d4eb468d34d5b76fd7a3c9d9922e2aa
SHA5122df2e875b8f4387971ae3298138697592f20a585e070c850c7e3882f335d61214cb4a9f86c2a278c27ed0e7c4880c14090151bc201f55a9d27aebcac6558ece3
-
Filesize
36KB
MD594f618c216fc2982d01ec5e0f8ed35a4
SHA11ef3f025bf7e7e53694544721dfb5b419c9a0ef4
SHA256e5eb9e6590f3554ca129bb8c6780c944bbff2d2f94669968f99f429fbae69fb7
SHA512730fc0196a6f9773774c4e9ae789551fa1da7a49e1c27c9b1d12c75431a7f6cf316ba5d6ef93c72e45deca2b2b8b46b080fd553f109ece345e2dbada0722be1d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
3KB
MD574dd6172066d8992b8e983fdd4037966
SHA146fe7cb0a31e0b9f1066b1a7752d64b5adc917f3
SHA256845e91efa89117bb78301436488300e013a0c9bbb3b7c227d8eb46d3823d41b5
SHA512b32bd5290858ebd8768d17177543e4f1fd2d2665a460a6cccface282f9db236619cbae26ab9d21ab562a06b5c6b4dcfaeed6856f88fa9fbd31de735256522137
-
Filesize
1KB
MD5043d94a0295588815d8d2813f667c08f
SHA1c20fb6fa1889502f4fec9362c094ab01a09a5738
SHA256bbfe98117f6e7ad1919afad52a4f4c1bc06c1d2b2e6e1943a05a5cd98ee828a6
SHA512aea7ad82f3b9484c42f01d3676ea2e445aed64c8962dd5e6c16a5cecace275729697a2c4a7705403f9cd7f222fca384f683a518d193e24574375e787ee87453c
-
Filesize
1KB
MD5c202938ca5bd2aa83a74770ee46d1d2b
SHA1bed9ca93b78be29b827a13d81006c896e1e26095
SHA256d887a46d1c1db715033d2ea19789f65195b4080213ee0e0de1c27d3c038a0711
SHA512bec65df50839fbcba990936b5b07b3a5bb8c9e5e4ddcc5556b090a4fde22d95ebfb7734220459ea76af3344a743cd88f4e085fc23f80e0649f48691d021e2ca6
-
Filesize
1KB
MD56af6b51ea92fec2af8dd4c3d70bc0a2f
SHA1a440bc9ae0d80479e9d5e7549e1034d517c0aa33
SHA2565b138d0ffa82762331ce57fa641d658f11659ee52360f0f79105e38721b80924
SHA512eb67f093fe49cbb150fb3aa730ea7fdabb9da708136148eb57a685c916cf49b5ff7814e563f4277a8e09f711d7f7b19c5cea37ddc8f1f195d3fe45a545494836
-
Filesize
1KB
MD590d37f547f0544e8a650cd3aa83e2657
SHA128cbfd904746d724da791214243674b2b23a28bc
SHA256f0533a7cc3da492c4fe5dc976337094681af6800151d3126400a20e7f54e6518
SHA512d9470c085bfafdc1eef1d978f00f154ff85ab11f6e0805f53e3d51d9f902bec67436a755d8cf4d853e39de5db4c27bd47dad21a363a7853325295cd7116b41fc
-
Filesize
3KB
MD5bbcfcb8cce3ba7caba5606b0b37f2546
SHA1552dc0970a74a625960b464b6474410d86b32305
SHA2566620c38cd0c58298afbbe8e6325f1cb7d3cc2191e158f7353c13b0e663e2b084
SHA51250ed7b12c8843392f29bf8d8833fe98fe72bf65a547370ec62705590f7db4c7af82afb71a2e0d363c77cc4b6db4b6a549bb494196570a977e540ceac67e2b51c
-
Filesize
3KB
MD59d41bec092c796bbcf2fd2b890070649
SHA13410742d154f4972aea690051faccf0862b525a0
SHA2561119020b6650f610737e048923237281649a8559928fbb113100faacc43b5314
SHA512f27b0965ad00358ad9718b08c11e7757f3d407d4204c1314bdfa26cbcbc5f581a58f3d50efec2f9e99f2438f20ffb7bcf2584fe3a0d03ae1fbfe52e71933130d
-
Filesize
2KB
MD5ac9417869add27ccbc1681ea97a236b9
SHA16397b3c719188253386a880e4c2f8bec7dd20de0
SHA2568fbcf3031bcf873dced1c07f8c3f8b22f3568d95bdae1583e383772b42b1ae1d
SHA512967be47fee7578e95cbf9a499750e799a0eee7b805e9e80c81fc45d58b0e4b89d64ad17cb0778ab18db84a4a1db58a77eadb5cc0c6f14903ded7ed890a466ee7
-
Filesize
3KB
MD5c5fe2afd995d675e16b231e992264d2c
SHA1dbad618e0eb0cba2c50ddfbf1c1fdf7d075085a7
SHA256a3f0fb98e5171794b08fadc2cc69335c1dbefc1993573a9e34d19d9fc89b42dd
SHA512d3e67631e348b574f804d02d637cd41a61e49d99572c794906c8c590cefd3d74d9b2db94a8c591e9425bbbb580e4fffb0b3d0ad7cc567b4c4c5b7a6f26f21c7a
-
Filesize
356B
MD5f3b6f7263a6eaa572113a106c8e66edc
SHA15bf9fea9387872dcde8970d17fe3ca717d744024
SHA25649c1b012133dda1cd9247600c337b206edd9eb6b0822cd3ff2b8bb3ef770680a
SHA5123b648a67f45d50ad2cd4ef3c834a45046507d74a3987a10f0b0cce63c2ba342c38b05ebe53ee195dc83480c5fc053598865066e62b1864bcedcae740b3980c96
-
Filesize
10KB
MD5cbf93581f252638c0e846f7a758ad2ec
SHA1db2b5d0f448e64a06dbe09b14d016f27392ef826
SHA256d80a786b8f044aed925e554dd8e57d6679a12641b90e0e37a7f448ea7cf3dfc5
SHA51225f7e6f4ed00efa1970d9949dd3f47c90c8d3c6f309ef4d744aa8809486dd7adc7a902999642cf067cbf485bb28e28bce00e72b4fd91243d44f24d9702087eaf
-
Filesize
10KB
MD57020b269de989b79ba5eda7b2bbc7036
SHA1c69046f8df5a79736289c161bacdf692bc0a659a
SHA25632f8d101ab138a8755fa886bac76c07c45660ed30649c792c0cd56fe6cb7a052
SHA51288e1cebad2bacfc131c61544a81b1454847958b2a38e2559a22cd683e655e0403c9750102e26626d7ee2e3d349033a5cd6b99da850ee16f5571e04fbfc75caf9
-
Filesize
10KB
MD54b1b9955a2c5afef6c29320be6d2d9c1
SHA1d32c6f3175a75719e96f11e82e228bebef43e035
SHA2565de59aedecfa9361ccc54d12233f8999d956351cbba43a516099c7ee318d9ccd
SHA512d3dd40fa293b62f74616a2332c5173b23634bea6a22a30395ae3116eacd979534c086b36853f926b148ccb5de4c6c6469c252082d0ef6f91379bb56b18995172
-
Filesize
11KB
MD56a2a545db619825b5b29f0c1631551f3
SHA19a6a018f1776302fd51d8895ffeeeb201058f007
SHA2567cae272dda908b067fc17824e3eac1f49f62cd3c4c45619330610114f458d0b3
SHA512882280f424841432f5c24b6b38fbeb2a5b53d59f9c1725a300403b1eee3822afb8e1613058fd8766fe459508f9a70f9c0016f051a0cfd657081c1e26ade00269
-
Filesize
10KB
MD57f4b29659d195909fd0c4b0f49394b93
SHA1f4523550af1eb537e69f4a217ebf1894af27a3af
SHA256cffa22037e57fbe5521dd06112ab86537f1c9b1dac10ff4bc9056f043eee97d1
SHA512e72d9ca6289a531575bc24e4b9e16548ff75fbd843d3cd939b3bc86fa3fd1ab8000c49c88c781f464795fb76f2e17d43b9b34ab36b82443d5b7f8167a6d723ae
-
Filesize
10KB
MD5e475d7a4a6ba90663c4b800b21100801
SHA1e3d8f8ca2dbacacb451e85757df7a83ba79c0c55
SHA25689ae03142a8ce880170acee64dff594dd20749811d36773dad49209243e78744
SHA512da75851ed52ddeb24d7cb8ad2595ffb162db3e0281e55428e5dfb5335921508fd281fc7a3a4d2a61b6eb884608e5b91783cc50c5974c7bc8e8db76c0c966ff8d
-
Filesize
11KB
MD547f6fce93ce1b089aace15a906b67159
SHA100ab755f8497205afa031df48aa5e5e5417c1ff1
SHA256d80960845b2427fda82c620ba0c5b7de87d94bcefb44884a5fb75c704f8638de
SHA5128d612d4c9193fda086f66d5ff25d5a829226cc959667f5f267dc759f7f9364475b12b04aabaca1efd463b4b7a5c88eba5bf5a9ae914ec1baeaa0c350554c5d24
-
Filesize
10KB
MD59dd039dbbacc969f8f502f2bd86c503e
SHA18a981d9ad586b09ad6fc337f6b8ecf7c5d909b72
SHA256fff9970c706127092d06096f9b95884f69b6ca28118d92d37c11ca7c87ebfc9e
SHA512d8b696af9a3e6739ef8fd919609b9ac8e8711d692344856cc9ce9ab2fffab85aaaf3b0e3a8d3e05296dcc6c89bf8a28e428d5154455641c7b4eca209dcf5174d
-
Filesize
10KB
MD5925ffac2ba5c424118f70e41c2bfcf91
SHA1344fac55151b71212cc951665583248ef67a5c81
SHA2566dc4ae306de586dd9b09935e12062e91c4dd63f28ea5170e8c56c68ab78b8b45
SHA512c032db3fe6f8a8aa458739ba61c802615cf09c944aef4f7de21760d9a8a1708a21804bd5c492e2d035d05a937e54a9c0ff6de04b3507d25887bff981d32cfee6
-
Filesize
10KB
MD5de4b06e1f1d1d2105e111deac8243cc1
SHA1c52181853aae9e947381d24f3b8c782a6480ad66
SHA256f3b4d59b196f6c6474c53a29f49269e6879b38b3f36fcc9fdf4415b23b566bea
SHA5128166bf1f44aec2cc2443b2ba75bc6d8a61009f9b11eaee56d06b04315bdedc9493afc655e490e0949e340f80f23c06fea84b1bbfb4c7775d6f20a68a9185c8f0
-
Filesize
10KB
MD58dd5ab53ec25c908b54b93464d250d06
SHA1d0fd95e831eea173fe478fd8dd76e4581bb767f6
SHA256c6c4be84d8c4e0fc2bd83cf77ced221ded69970fade4982f824a7f1364dfd037
SHA512b609adf206ad20079e49bfbad101982469c008c8e881cf79dff2a3123e4d5462408f89a92febe3243c75a6ce6a59ffa2096036184e721bf51786f28d6dc5c4cf
-
Filesize
11KB
MD54120c5a0aebf084423cf02c326b855f2
SHA10aaf41e4b6c74de1519e3585c7c288abe62c69aa
SHA2569ce89adc447e73c345bc3f5ad2c93c450b5a6b669a300051899b7e499a6e28e8
SHA5126d43da362611443c4a20e9d6e9f01b1496b90b459f87d931583ecb11085fa173dfa814566e05fa4ba4fcdd0a7de0d36e1b0b5a55eaa235a892186dc01b905858
-
Filesize
11KB
MD54af56aa25d30a800a4f0c981f8ab8c94
SHA1705fa5ecbe8a6805c01f98f377177cf27fa7f181
SHA256da8811c21e6406892c4a0295d343100db406224b00572fc630e319b5d62aaca4
SHA512f423f05f65b06f60555c08cd1173ed1c272961e098bc410203b51985bdd2d49e4373e337ca833304d7cbff80ef6193b5b7f6f01cc1d34c89e583f18e55323bb3
-
Filesize
12KB
MD54e98b78d6971b5aad8a23fddba75348c
SHA17cb7c7d99a5342eb5a98328e110e4c07e9cdfa59
SHA256c09276b2075a550e4e752b0f1cf515adfbf4c13c0ee8e047eefa5d7c917bffa5
SHA512bf76eb6458675b96a2b67e6a99843197e7ce792822035e7bbd2e1e49e77effbd723937795b115c14aafdb23f3129ada586b77b659da69ad5fbc909d4b43d3901
-
Filesize
12KB
MD549f80f24c67b6cba1086be7ba1b8d61e
SHA1be2f3723be22f4f8f390967206cf0c1cbded353f
SHA256fef9f9b2ae9f6501cdbd1f1e389c42879e0490bd9e47a8948afd1b94a55d02a0
SHA5127f1270af0f776abd61a786194e29f37d01818621a2ec48e14d9765e0cbc2a477df2e8297f713346b75c988e343f407b9e870f9f55a701af6ef8891d3d6e40d0d
-
Filesize
9KB
MD558b7a66c3becd4f21b2b5ecb1c85292c
SHA10d65d7d353c40d880c4353cd558a352d830c77dc
SHA25654cb946ae2286b14fc5bd7b8c0eff3f9d5b7d2a533fe4d38f21525c00ba9e710
SHA512e3be3958aa443ac60c71be9d32f7716fefc83b3eb49e22a16e25800d724ec963e77d13aaae5a60b3da5f0b7ec3aec560d666dc914dc0db1003f2eb91039b8ab3
-
Filesize
10KB
MD5df5f1a076ae19d6fd6a275dffc6cd361
SHA17021af501229810734e337efc4c5d596c9218ec1
SHA256e71a06de2a4dee79d363d0926e4616904df420602f37095c541da5ed4798eb0b
SHA512958594b569bcd2e2337d15a3f6b84c37e0fdcd9d2354a5873442747c6a0d9ad8ae98e16ba86df963d69a15aa5be41449826535e5e17e79cbfa21fb278b1e3d9c
-
Filesize
10KB
MD5bed8774462719b362ebe3f8390e5a858
SHA197def704e806757c9028367404e2a11a8bb8596e
SHA256b02148a66142dd2ef80dbdb761cceda16c18f154878dea61caf6895dbd7fded0
SHA512ad4c711279384a22eca0e31248c367a701e11c46473bdeaa367394f8b74521c3fa8fddd6110f5494099103dfde596a0e8d112a7c215d90898048c817440c8e9b
-
Filesize
10KB
MD54634949f917085645ca7b317c6b271ff
SHA13d194e463ee1b2760f9f0eca475b031006ed9d7d
SHA25694df105d0f289983476e443da717764c71a521758389cb6149cc0d1a95f343f8
SHA512b8af3e756c31d49c498bffe67196f397df790c40ffd8d0b112632216cc2784828368fcc61bd9c91464a96494bf46b2347b68c0ad2f6a7fcd5999489bb7ba7de0
-
Filesize
12KB
MD584ce721f7da0bba6191122a5c5b8fd9c
SHA1e29cdaf2220bb9f7c38fddb1f853be96163f661f
SHA25636c8b63e03af0d535d32bd07d945ff26f9b5a99eed8d068bdb0a615250332c20
SHA51216352b1e25ed27688f41387ff934a589dc4eec880f7507dd29939141ce9e05ac5cf666167eb0758a5d179bb17ad9225b1cec6fb06f3ec60afaee3f52b8184370
-
Filesize
11KB
MD5edd5dabbb9f2cc8bd5609eba1c4f967f
SHA1e1d718bd12d71e5aab5aa24d7fbb52258242dffb
SHA2568a9075f9690058f4876db10e6112a04a02bc033f7563d88f35e4f9d96cd204bc
SHA512dcba0e024c31be9e62387476964d142689b8cb01749ef9866f435f272d770af87804cec61ff3b71fd5b4f410af4f3ce86744f1bc7bb5f87ff1c2b7ac109bbe33
-
Filesize
10KB
MD5ba9061a8122bb878b042dde07c385dd7
SHA15992e1696c65824ae15f1a7f1a8e629a19241ee9
SHA256a9d107b5978b6f2cda69ca594adba7da5c1b07334f68310df2a676118bcb5742
SHA51285d00bba97fe3728df2dc52e185f78149ab756247598046be0a368aa2b114828bc3018bc33a2eeff163ee71df72d218065b9853f5ef4ebd541cf632140b9230e
-
Filesize
12KB
MD5105d33e7d77ced811fd5f3d65edd6392
SHA1a76733d86c246ef5a51f033516f1cf2f13662598
SHA25658629f2db56bab722e4ac972d9715027579f7c3de51a3905e17de58b7b45ae3d
SHA512b16626acb803208659914b9f1b02b748e3c607caa5391e40e5c0504cf84162c0730c03974ba772d9181780e80b868e5b293d2b70b594e87e6ee3057973570374
-
Filesize
12KB
MD5521c93b3467b6d31a673f188b1e579c2
SHA179b11087469c66d16e89723007fce33273fc330c
SHA2566537caf82858d3c4cde0ef4c32db10456a935ebf9ef1c7b51a4652ef33ccf00d
SHA5128f0fe5c31a6f1552037a5f1e004252fc030a33e9b82856e7feff740e64c64c3da895c9e114a37084e2e221954a463374abc12a2f4c7b820e25ef3a9bfe4cf04f
-
Filesize
10KB
MD5ae083c5025b28e61c10277e6f4f49ac4
SHA176a3819dafd8ce25e3f798a4de3258fb83bfcec1
SHA256448e345f8af0f77f961ca88229c960473dbef7b1b681a56387ebb8605cf1b774
SHA512708bf15f216b71134f7dfc1548eb36c6a4e9c2efa975573b525b3a02662386dd483ee9282bcc0fea2441e60d28805550839fc5b626f35e476f0af8633f87d645
-
Filesize
11KB
MD507c5835bffebce75e3ce13b30f074a04
SHA1a15b5ab60c97d7e9766b434c446ac5a83f7d963b
SHA256e6fd21c8d8a66371ac37781bc843b320bb47744bd0fc98d8fec1a11d2631b0b6
SHA512da629e5704e5477bc40083e64a7f57e5ae89ae63a9feda315cbce1abca52a101c402a455aa3be8904802f1523f39af5d6d92fce5f7d1c8ca9adde3be4227502e
-
Filesize
10KB
MD5c987cd52adae31c641468d7af3542bae
SHA1c0b198ce0f5839aa7afef891b53ad98f4ab4c07a
SHA256b1476b050a32e40b96552f5eed2d49c21df160306b25582414998f4d78e4f420
SHA512826cd20186dd10b526669152d3fc817043656fe90edefe34f7e9be8c058e624020f6b6f2e3bece36364703235e3d0cae9715db72e6b45e2db0f9eb60019522a0
-
Filesize
11KB
MD576dd6090fbc4d8492180caee663cd4e9
SHA1e064f2ec768d2fa68eaf490da64d422dc753aa51
SHA2561f73a8c1b79ce213ecf5f80d618b9d3168a0e23783e4243d87ef5048ae07d768
SHA5129e10fb58b690519fecf5ecb619a3c2e905f490f937573ba9ef1e90126880b52be8716c634900eacab2c9096d3b3b9932d17d48df3fa529cd8a5719343ef40f6f
-
Filesize
10KB
MD5844af5ec4ed433566dffe5150cc33019
SHA13dfea3909db9ff13ea41b7d32b7b34c7364f1647
SHA256d35c47f26fc8c2937efe5fd17062c4c722d1936cc19644e1b6d6c99b4c168b85
SHA512abdfe45d1825914859df22fc92e4a493f9d43ffa340ad868c241193a3625d716447fc0893c8854532e25d1f8aaf0735f7f5c918e244dc3daefa7ee084e585eb1
-
Filesize
10KB
MD5ffc3cf15727fbb7a023cc7b0ee8e23f7
SHA12851eefa4b7c9e85026afb893134dd7a5bc0f24e
SHA25644b9f1e84fa808c43297b4964a01ddf9c87cd78ad2633a3c295b863e92940d2a
SHA5127ad14e626c4fb0347a47f3f9baa98dc133e699c1fc020e4746a0b1287ca3fdcdf355b78d7fafb3e8ee1f7053434be5a1a14b591ac38415fabfb1b10290fc68d3
-
Filesize
8KB
MD5c96a19cdb3ec291b643be730490ebcaa
SHA1473b77d85351616558197386f09e7d69488614fc
SHA256ed2306a5176ee43f16b9148a9ab451302aaa4fcbc1ce9ff65d16e3635fcbb655
SHA512b4bc21d2f167090b173cd11553909d18f3594f11b92c6f4feb3af02e307fd77530ee99690a6250052434468af80589bd4556bd7c43cb42ba356c7db80adc4797
-
Filesize
10KB
MD55b4442f32d1fff2bc8bd32ff2314341c
SHA107b4b52ba74a313071345883f4f737f286049ee6
SHA256fe634b23ed3172b7f2ad675da023ac29a6366dbc503a262783a092956dc77017
SHA512a8542ba1ce752710d0c7145d803cfb149ef84c2f0e8c9aa06493a2ed9167556ccaf9b35e6a1e633461295617b110c5fcb6bde72a4cb1c0f059fb51760ffb5b34
-
Filesize
10KB
MD5e9a276b30b5ed4d939124325aa726959
SHA1847f3d12987b508ae291ba5be8c967ccbce8bd50
SHA256e44961609e31132e14cc9b256ae3be8016edbf5b997868ec0beb5e71c257851c
SHA512aa6b09d9af347e5d8614561487ca3ca9cacfa8d292b7dbbc22d3caf6a840c3cff8fdc7013db969b591bc4ec269d2efa637042111f0b708cdc14cb5d8721d0788
-
Filesize
15KB
MD5bad32e312f062c3702ff3c8412a087df
SHA1684527f07d4ecf9a52167c6897b140a19de53f15
SHA25696f56791992a895002207d2d33d78ddd54c59cb5c219a9322589da85cf7e0c03
SHA512f65acc7b75f2f867e6106aac3a8f165b58079fefee879451e9ff4516635a9462f9550562215d1348c1388907beabce92ab9f86f31278955043481a6932a78aa1
-
Filesize
333B
MD54ec25b700692e53838a8585ff2bec263
SHA152932a9c37392457e12359c55e9d748f0e4adccd
SHA25627f0ead98eb67559ae5ce25bf587a2d42d909ffa865441b8449d32621d9b9afd
SHA512a8df75b5203ae62a5aa0cbd67006e35f7be7126164fe91fda053658c7ec572f14398a7b1326d90f3b53d8ab4a1678416b09286242ea490a81b2b916c9d7170dd
-
Filesize
327B
MD5a66efaa590a0d16b1874a35836ba0a4b
SHA1bb750c61e162420271f89a90f2b58f43587680e1
SHA256b9ab1ed7609e2254b7d4fb655b57b21b2be601646c4ff0b207c411e8bdd9e654
SHA5122b1ea0c798b69b360ab1546d14fccf7d5f9cb224b31bc8430cdb956c8cc570a086e4cfa10e6a843292deb862f4161dfc9b9abbc44afe397ff0ec9563646ff7a5
-
Filesize
317B
MD565da9fe6b79cfe42335ae1743943c733
SHA176706b8762f359fce1480a3127e0d674226a114d
SHA256297f5bfe2dbf35e1f88b37bfa2cff907a9248ab01a53d865ea1b23903a61189a
SHA5120e5de2f089cbdad6259f56835703763bf59ff27468c1593fdb6e9a65c79929e586cef8908a28c5ce58bcde5708016cba08ad82d7c54b871e6f0dc9228cbdb040
-
Filesize
2KB
MD500522e3b4de93e42511a2a817b5da35e
SHA1f4744e0574b2f8639c858d39e3a1112388a81c7b
SHA256b938cc97f85af7b5ec9bffc447c252fa0a62df0d149f2a67632ec6434b9eaf1c
SHA512f019d4219c76257266c05150eefe9a7ee58c64b63a1c6da9f91ccedf9ddefd8922dc9627459db5dd8c6b99236363acb06458def79d8f1a56d640aaca3eb22026
-
Filesize
348B
MD5c7e31c18aafe051d2ec2324ec3197733
SHA1f63e6b8024af4243d227beb3840f906b15bd29fa
SHA256aeb272e96a0a77985165e951295150fd8e82185902a071c803e47647e03c54bb
SHA512b2ea44be94a38df22245ee48c312f29dccb6c5dd420d9c105a362ac9c378fb2bb3c93af366a2411380926422311f43ec434e2e343223d086f1567d92feed2c24
-
Filesize
324B
MD5135a998d9a34261977f4eaec0b677f43
SHA1c6dbb3630a44155285e08ca322e42ef2d5ddce71
SHA256f6b84dc615bba38e48b8ad76e76fb3a959f15deb6268bb127a8aa266a02e934c
SHA5123478acd49e673aa624b576d32bcb3f3509cf818844d50c177da46be63dc26885b4dba0a6ba3e7f25c52d47662c8e916e7dadb6fdbaa6cc88725460a2755aa89f
-
Filesize
40KB
MD5782cf96a76afab9bbfea507099ea0b79
SHA19d623f0b801f8f22f67a16547f67e871415e1eb2
SHA256eb22f9854dba819ec554f18da993458d2b50b974dae3a0e8cb0af3636c0138a6
SHA512fb07129fb405dc28d37d208619d4fb6431dbca6534d38c15aef92e8dd2b3ff7205a668a0b45b4708f25249d86fb64324f733a17b9dff2d785151a33950f9c9eb
-
Filesize
8KB
MD5b4ab6c50a7ce5444edaba2fbc8ea3d04
SHA17c972fed4941c2edeb556922c523c05b8b4e1b7c
SHA25649ebcab023535c0180b1dae98be8fc6afda7abee520a7ede6b249de87126795e
SHA512dba27d0a262a875425def64191fbf8789bd817911695930724c4c35d1d3820b34358008eb72ca82d3d45cc4aee94362738587623252f104134ddb4e1563ba9eb
-
Filesize
14KB
MD512b0372eb2185b222da9d941c9f8ffa3
SHA1e53e6a0a026a94d94e440d4bab6dac6ddbbd2208
SHA2568bb66de0a2161a4b91e4e301f07949af828fb77a42e1050e2a876aa0529f212e
SHA512cfd19627a566184312112b0f3d81009205fabd6580580babe74c69c11ee43d6d1274a1a32bbb683696ddd47ebe06ff228912f613c254275abc70819a6f78516f
-
Filesize
320B
MD571ea41d866b35521118bdc21a60e596b
SHA10092ec1ff9483ed08989e6a78620bb11dbcc63e0
SHA2565d7b01ac94c0babc31cbda547d6e5a7922a9598c67c9035c055414264298754b
SHA512bc4556019e966b5b4fd2d0cbd816a417e2195cd5229effb11821725cf6ac552957cbda57bac420225d41b60cf8ab7c2963637bb85f32deaf21d51ed4e4cff2a6
-
Filesize
1KB
MD587e150ac07b8c2151e038afacfce0d3c
SHA15033fd042296cf1c3e6e40a39ba34355858cbe82
SHA256da491fafbf84f8b2e7552459a8da2f392effda03ff28442efb6418691017d87b
SHA512406ff08e06776a0a217b868aaa0ed53b931a20cb75ac5286189ec9ce066f8e46092f9e6f906aff6184b6975f267d57c55f919396dee632bf88f131a66439d28e
-
Filesize
338B
MD574558855c73950ab4e96e290cfa493fd
SHA12924dbcc3b8abe4ff086b41533f1363e957dd327
SHA256e93d4cae0e1c7680247ba90cea381169c10a89d81c7079eae7987b59629fbbe6
SHA512d97d053825cce02afeb22e226474ef1b147c48bd25ace6d77e4d62d2f5dad45ada0a234f622268e6475e7ff73064514d9a3dc7816950f6b76321546094bdb0f3
-
Filesize
44KB
MD56d3314afc93cd6bcfede40a72dc7a5e4
SHA181e7d24df86164ca51785b8fa8f00750b723ca8e
SHA256191e70e934877fbb344f12a598f3d20c476d03195a71ef394f30dc875242938d
SHA5128b0e51839001360addd75feec41148938d9719fbdc4bb23e5dd861302d71d01e9923a4124977932bb4fc038505c6fb9181ca93cc15c1a391d38c2592e162f5b0
-
Filesize
264KB
MD546f07ca34625b59d4ee5addc9c57c25e
SHA1d977f37d2e336cb35b16ed120554cf09c5ed59ed
SHA25617b2afd9ec8378cee4b14d1bd783407e4c1b1650a07a73fe9942c055d73b41d2
SHA512d860680ccc87a9e3cba74af26a3a06d61d7e5ea2db62268cf0970feeb799cd0952bdfc2b1ef0109c5df72081e3ae937373b0045bb194ce2375998fd2df0008a5
-
Filesize
4.0MB
MD5f3c625a7c76fbfc118dd0cb301146aff
SHA139acd39075431ee05b1ff5ef99c4e7c4b2efd0d8
SHA25640a4bf2df427b81fd74d0ec6a88ccd81c96eca5835315ce996870020a59ce672
SHA5126282abdfac4d38fb6d16aa821d5e24471939b2593b267fb270d53862ebcda3a42eec969a3833c3bb0097316673b9a4a049789804eafbced7ec477f0147f145c7
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
228KB
MD5d8fea65fcb62e2611eeca63a655476f6
SHA1cdeca8a6599dc0baf99594f88c701ac625adb020
SHA25624c5837f24148a1af315684f77524eb7a30e31a0bb35bf65b3410ce5a7978674
SHA512ef271af8b9ad2460c68b5483a17e127af48f20fd55f316c842834ce74b86c97dbc91826b0adc6132abb71bed23a3e1b6d393993f9c347e8908230b24b862f5a3
-
Filesize
236KB
MD544aa9287d9f940acdb0ae862daabc2c6
SHA1a7a4e5295e61328f87895bc3b1509e4bfbe19360
SHA25690707c00b2360ef5a817c4dde2ec888f80b5cbc7f5388a7db296dfe097370bf5
SHA512e9e7719af4d948cfa8fe74e59c1655af3d332599940c653e5ec5967c230c6c6f33fbfd5706cd0e36479cb3f57b79b6955a07aaf1405626a90059b903190cd191
-
Filesize
236KB
MD5ef8dd03f8905a46085d52be953fdb8a5
SHA1e77c7819c8095141361fe333b471d41316218033
SHA256d550b2003c932708244ca11f2056e28e88ef4b61f6a27cd7c3b9c2a0faa6813d
SHA512185abdccaa547e789939ba701934e11ef213816081d88b9559d3744022a7a817fb8346ac7c9348ee2d8b1c67f75e04d55bddd81fe371374cdb50a6d51761f9d4
-
Filesize
124KB
MD55c755d80ccd7e562afe710758aa7430a
SHA16c4906c8528df40db4dd3954351e6c694539952a
SHA2560b6a120b4240c96ab44f31495cf0669d5ce31d0da99bf0c5cb8499686cab4223
SHA5120595b1a7c954517e3b59d6653e9fd5aea55cbcc3f9be2fccdb144f2a4f2416ca6f34c42d2d0b9542926c5d2ba21ed6904777b52b4f1c1b8c45f579b7224b8324
-
Filesize
236KB
MD536bdd97245d8a8f8b3a932adabda9a59
SHA12c320cd1ceb5c01c121b7bb6a7cf8f6b503ea0ff
SHA2569da3f22463da7a670692e2f6dce0df420b82426d887a56aadc0c341501e2eb6a
SHA512a987306cf6bc0eb7b28e423d6b6b58b75157247e275ddcb64443f5fb470d26d90aa9621656b9c179dcaadeacec73c03378a7d048ff67f5a8bdf5faeb15a464ee
-
Filesize
236KB
MD5a0068c00081a2d34a0f8fe9274e8fcfe
SHA1672d4846e34cd74f4fb79f27a653407a2a7a7378
SHA25691393b6a042f2695c62a417880d98a5cad2abaffd52692c8fb3d9fe8406d0df0
SHA51277ffe18acc5e9ec7d1fc43d57615b81dc6780b1d4beabaa9858189ccf2a1060934dc0134e58631770a1e087d405843df5ca3fccd01d88f034153eb6c4c08d0df
-
Filesize
236KB
MD5344ed8507098508dd0da2a9c90d9d4db
SHA1d86a0e491c64ca1e0d6d87ead6a04d625b7ff5cb
SHA2564c17aa4fe9e4e2b6cd1bd781f631f0139c6e594405e46ff82bb5ff2559133cde
SHA5125334a727f7e587367b33fc18fa0d79092e8f563d9d21bbfad7756dedf21e2eae6da8217d9bc36cb745d3159898a2856b232a2818b4c602fdbe3c6ff4aa212cdf
-
Filesize
124KB
MD5fdb421411399dd3179f0af7755a02929
SHA189be0ff2b337969f9e7a8f04415bf8ec964d5142
SHA25612b461b11484a64de8353fa22aa14d7d4f34c1ce19aea62c747b3eb5c84b679f
SHA5129c80aff1686c6e24f38f888f60235d9a082d8295365a82645a048f389f4c5a328b4ab75a538ead406d573c22ae7bfc5fb1a812e3e624671b935cd20d0eae6840
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
85B
MD5bc6142469cd7dadf107be9ad87ea4753
SHA172a9aa05003fab742b0e4dc4c5d9eda6b9f7565c
SHA256b26da4f8c7e283aa74386da0229d66af14a37986b8ca828e054fc932f68dd557
SHA51247d1a67a16f5dc6d50556c5296e65918f0a2fcad0e8cee5795b100fe8cd89eaf5e1fd67691e8a57af3677883a5d8f104723b1901d11845b286474c8ac56f6182
-
Filesize
152B
MD5f1d2c7fd2ca29bb77a5da2d1847fbb92
SHA1840de2cf36c22ba10ac96f90890b6a12a56526c6
SHA25658d0f80310f4a84f687c5ce0adaa982eb42fe4480510399fa2ae975d40bb8bc5
SHA512ede1fafea2404f16948fe0b5ea5161ccee3ee6e40c55ff98c337eac981a6776b9c73dc030a5c59e4347aec91259f497539206e71949c33adcecbf2c846709e14
-
Filesize
152B
MD54c1a24fa898d2a98b540b20272c8e47b
SHA13218bff9ce95b52842fa1b8bd00be073177141ef
SHA256bbcc378fcbf64580e7a48b4e7ca9be57fa0a1f2e747f488325685bdb18d73a95
SHA512e61f196e7f1c9a5fe249abe9b11eea770fb2f4babc61f60b12c71f43e6fe9354cf14869daf46abc2c2655bce180252acd43c10562a2dcd31fa7d90d33253820e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9219f3a6-7723-4290-88d1-2faa13c0b949.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
5KB
MD5b22f48712cf8f1ddc25238a5bf8b2405
SHA11a6050ec2d5826523562fc7b2ed5be3889bb79fd
SHA2566773e6f9e40dd3813baefc0d355ebb9ce38829b2086d0f1d59ad1a34d5bc8a04
SHA5123e876cacaade451101ea649fc131a8ffc139937f4e84878fded92f1b601fea159307c3fcafeb252bcdd863ecce572a87cea5e96f962e78d310e531d951a0fb9a
-
Filesize
5KB
MD518230f63f327432d41e8b09a28f25d29
SHA125d9bab62d86e94a288a6da0a44e2f3304720f8a
SHA25648c6e40738ceff30980b7e5002a0f2e0a7949824b0c8a9bbdaac14913bc3d6cb
SHA512d5d322ec6493da4fc675e96532750690d0e94fa0d4e8e63d7a76f484b8c23516288ab8032a08aade66e0758d2daee0c73e9a69c1204b3b67632b00a50a9534fd
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5bfbc0debc327c6f2c068eca1c9be591a
SHA17033f3e08bb706427c81c0dd960fed1656e4117f
SHA256e1c3acc2165e9c6d77916c480fdd44bad71a1cb50aa3fa5cf44e4a5c482da3ec
SHA512b1175d2815012d7145b21e67b0f1759f90b540e958d2d21f6573bf0d036f90f50be3c71f8a0ab6e1bf35689edeed0e7c41d0494a1ada75eceb2aff67e42e1e07
-
Filesize
24B
MD52dd3f3c33e7100ec0d4dbbca9774b044
SHA1b254d47f2b9769f13b033cae2b0571d68d42e5eb
SHA2565a00cc998e0d0285b729964afd20618cbaecfa7791fecdb843b535491a83ae21
SHA512c719d8c54a3a749a41b8fc430405db7fcde829c150f27c89015793ca06018ad9d6833f20ab7e0cfda99e16322b52a19c080e8c618f996fc8923488819e6e14bb
-
Filesize
1024KB
MD57fbd39e288d0ef4ff64f8ea586b26452
SHA19760e5bf7dbab566e3f110373f0246de50cb04e2
SHA2564ae04acfcbadfaeee08bce9be9d97a0c9a739f971c14cc035036d661d2dbe595
SHA5123a9a38abc24ad2f97322f74cb49b2104910cd4cfe2a62af0b1619cf950114f932c3ac42a47298c4dc8790a4d82e4672f2888fad02e6e91cdb68df75bba9e59ae
-
Filesize
1024KB
MD56dfcb6e1fafd34a81acfd0c07f06a465
SHA139ed9cdbeae1a9baad34979aa2b1271a707809b8
SHA256dc5536e492409b445c2f861c4d9a9a5758993b07f39b12c6378a3a930f122585
SHA512a63ec25cb01654863f5fc7aa2ecf6173d4c23d38f9fe202d691244eeee06d66f10def104a9e7c21944e1fc96af014710800ae0efd60d42059cef3dbefa609ddb
-
Filesize
24B
MD5635e15cb045ff4cf0e6a31c827225767
SHA1f1eaaa628678441481309261fabc9d155c0dd6cb
SHA25667219e5ad98a31e8fa8593323cd2024c1ca54d65985d895e8830ae356c7bdf1d
SHA51281172ae72153b24391c19556982a316e16e638f5322b11569d76b28e154250d0d2f31e83e9e832180e34add0d63b24d36dd8a0cee80e8b46d96639bff811fa58
-
Filesize
24B
MD5f6b463be7b50f3cc5d911b76002a6b36
SHA1c94920d1e0207b0f53d623a96f48d635314924d2
SHA25616e4d1b41517b48ce562349e3895013c6d6a0df4fcffc2da752498e33c4d9078
SHA5124d155dfedd3d44edfbbe7ac84d3e81141d4bb665399c2a5cf01605c24bd12e6faf87bb5b666ea392e1b246005dfabde2208ed515cd612d34bac7f965fd6cc57e
-
Filesize
24B
MD52d84ad5cfdf57bd4e3656bcfd9a864ea
SHA1b7b82e72891e16d837a54f94960f9b3c83dc5552
SHA256d241584a3fd4a91976fafd5ec427e88f6e60998954dec39e388af88316af3552
SHA5120d9bc1ee51a4fb91b24e37f85afbf88376c88345483d686c6cff84066544287c98534aa701d7d4d52e53f10a3bea73ee8bc38d18425fde6d66352f8b76c0cbb5
-
Filesize
1024KB
MD5d9575fbb4e10a8f30ecfca088ebba2e5
SHA110d87c5bc88407a2c1d907475ce168285aa0480d
SHA25697b56863489ea8f68be9e4ad49f8eeb15689e8cb2932d2fef46d8daeffdaf9fd
SHA512ccd263e6b0932f7a2a39e9e47d6584e3aea40342e9b751cfb096eb2b85f3a39df4c0d5476c1fa6f526461b1e459fab58100c782d5159f362a8e714e49054437b
-
Filesize
1024KB
MD5c49d1890d0bf5b9da7806820e98a3b16
SHA1f0c2459fe593a822d557c8ac816b34b20bf09b54
SHA256902c21f4d5903bc3c67f2fa54364dfeb36a33a97d0310848afb6c437326c1b8d
SHA512db1f84151e1ae3c6d3cdca10d20e043191caf14f38e61c15c669a636b2c99d6e6bb95db0b91839b16450a1221ade086cea4b170ed4b94fa153334ece5bdd8e60
-
Filesize
24B
MD5ae6fbded57f9f7d048b95468ddee47ca
SHA1c4473ea845be2fb5d28a61efd72f19d74d5fc82e
SHA256d3c9d1ff7b54b653c6a1125cac49f52070338a2dd271817bba8853e99c0f33a9
SHA512f119d5ad9162f0f5d376e03a9ea15e30658780e18dd86e81812dda8ddf59addd1daa0706b2f5486df8f17429c2c60aa05d4f041a2082fd2ec6ea8cc9469fade3
-
Filesize
24B
MD5d192f7c343602d02e3e020807707006e
SHA182259c6cb5b1f31cc2079a083bc93c726bfc4fbf
SHA256bb4d233c90bdbee6ef83e40bff1149ea884efa790b3bef496164df6f90297c48
SHA512aec90cf52646b5b0ef00ceb2a8d739befe456d08551c031e8dec6e1f549a6535c1870adb62eec0a292787ae6a7876388dd1b2c884cba8cc6e2d7993790102f43
-
Filesize
24B
MD52a8875d2af46255db8324aad9687d0b7
SHA17a066fa7b69fb5450c26a1718b79ad27a9021ca9
SHA25654097cccae0cfce5608466ba5a5ca2a3dfeac536964eec532540f3b837f5a7c7
SHA5122c39f05a4dffd30800bb7fbb3ff2018cf4cc96398460b7492f05ce6afd59079fd6e3eb7c4f8384a35a954a22b4934c162a38534ad76cfb2fd772bcf10e211f7c
-
Filesize
24B
MD5f732bf1006b6529cffba2b9f50c4b07f
SHA1d3e8d4af812bbc4f4013c53c4ffab992d1d714e3
SHA25677739084a27cb320f208ac1927d3d9c3cac42748dbdf6229684ef18352d95067
SHA512064d56217aeb2980a3bfaa1e252404613624d600c3a08b5cf0adcb259596a1c60ee903fdc2650972785e5ae9b7b51890ded01ec4da7b4de94ebda08aeaf662df
-
Filesize
24B
MD5fc94fe7bd3975e75cefad79f5908f7b3
SHA178e7da8d08e8898e956521d3b1babbf6524e1dca
SHA256ee1ed3b49720b22d5fda63d3c46d62a96ca8838c76ab2d2f580b1e7745521aa5
SHA5124ceaf9021b30734f4ce8b4d4a057539472e68c0add199cf9c3d1c1c95320da3884caf46943fc9f7281607ab7fa6476027860ebed8bbaa9c44b3f4056b5e074d3
-
Filesize
7KB
MD524fb27e6d47e9e5d5d774daba34e81c4
SHA1104dd51ebb7253c86698f48a7237f35782d659f2
SHA2563b2cd346ab2aa26ace554fdc0b73c413d9bcbab0eeaebb150badb22eadd7692e
SHA512daebd83ce1efcab0bb75981408f6a069886500f5015535bab3c216a6e82219b45a986756c9844a53144263e815b88f7eb8fabf386756f00d2f6fefe1ca6f4e3f
-
Filesize
7KB
MD50b6f940b888e6f9ea56494b1e1e252dc
SHA1ae3faebcc0496a9dc618b84be7a73029e2c2a09a
SHA256269def7e2e3411003287cc266fdb161c10fc93b133af641a4ced44ea6e94eb49
SHA512a31a1765bcf60eeabb6cc6b91ff20d1d8c987662ee8a0f312a155c3af3351db8ed9f33a1be2f8bfc068187e7699224b06bf41598d687b21eb03ac1483c19765d
-
Filesize
24B
MD5379523b9f5d5b954e719b664846dbf8f
SHA1930823ec80b85edd22baf555cad21cdf48f066aa
SHA2563c9002caedf0c007134a7e632c72588945a4892b6d7ad3977224a6a5a7457bf4
SHA512eca44de86bbc3309fa6eab400154d123dcd97dc1db79554ce58ce2426854197e2365f5eee42bac6e6e9455561b206f592e159ef82faf229212864894e6021e98
-
Filesize
24B
MD55f243bf7cc0a348b6d31460a91173e71
SHA15696b34625f027ec01765fc2be49efcfd882bf8e
SHA2561b1aed169f2acfae4cf230701bda91229cb582ff2ce29a413c5b8fe3b890d289
SHA5129e08dfbbf20668b86df696a0d5969e04e6ee4a67e997ff392099bc7ff184b1b8965502215744be7fe423668b69099242bba54df3f0bfe4e70acdc7cad8195b02
-
Filesize
24B
MD5db7c049e5e4e336d76d5a744c28c54c8
SHA1a4db9c8586b9e4fa24416eb0d00f06a9ebd16b02
SHA256e8830e7ac4088cf3dd464caec33a0035d966a7de5ae4efc3580d59a41916ff7b
SHA512b614037fb1c7d19d704bf15f355672114d25080223e7ee4424ad2cb7b89782219e7877b373bbc7fa44f3ad8df8a27eef4e8ccc765d44ec02a61e3b7fae88ae69
-
Filesize
3.1MB
MD54f4f159dfabc2fb33d34eafe05b29d4e
SHA1dd85370dee46c81de1299b85192341b5e883b234
SHA25684251c8997e528aebb178f3a2ef6bcda9972e25a3523b12b04edc9b1a4e24245
SHA512595ded1eda9f903be6f48653be879aec9988d909eb2f0a710a7643ca2de46fbd2c3b5ab8d0de36985ab1a080bcfaf4f73900649713ab07025576091e96ded01a
-
Filesize
493KB
MD5faa85714ae5e4a0b19c9ce74ec01cd6b
SHA1ae0f6aaec3d8e95e7de7a6ca945e72bd640d88ec
SHA256304d5322db40a3187a800e89c5c60b5502164cc4c752adacec2760509b61bb37
SHA51232c9a23a9036706556e5a75b84136d023f8dac90cea11fce98deac6dce4d5ac5b5329be96266705f136061cce6d6d2d4ca835bf56565605d969c04d6cabc7d16
-
Filesize
454KB
MD5e892c99bb989b16bfd226466f865e0df
SHA16a04c695c72cb39771955c5daeca2e7ce6f0ee76
SHA25683693b4862d3eabe63fb92904c476a01571d0bea8660ddf8ca9f14f5ad40c0ed
SHA5120799550790447f816244fd915797780cfbbdd025c36df4a559e89e3bc21a5c975cc84c5b22c1e72dbe186966f85cdcbb3d9f68a95cb5ee21480d234f8c8f5224
-
Filesize
590KB
MD5da4fc6d87b4535ec73caff6033ca5e97
SHA1dc935ae337fb1032bc6374311fad152d795c4d18
SHA25695a2c503250558793c062c0ec71a96471a6bbfe3d8396c52b793355a8eea92a8
SHA5128747b8a4b325449c5359df293cdaa27c3554818ae588f59560911782a244dc86b6ff793e3966dce3bb585b499901124a37daaa0ad428d1b586637ed45258c29a
-
Filesize
751B
MD504d6c476c21c4851abe2510f4a38eb70
SHA1dd6e3e4d0febeb1ee82a8eebb4d70e77b465662b
SHA256168153c6e76b853da76ad8241c360e22d205c69fd675322e6a48179e3dc8892f
SHA512fc15e311cfd533a31617b7d938597bf6ec7a1fdb0335e1790cf010f9c8a70251cdbaa37235ca265b3ab0cbd52aa455b3f1a09c8318c106f0026d20785e2e0e43
-
Filesize
528B
MD5ef401b877a966d13421cf2530245058d
SHA14f2edfd5827dd35c856606088378efbab22c2891
SHA256c2eef102589272e4646924dc5ab4ec1b8894ee3d8c067039e588cd6c24b7675d
SHA512256fb8265bf3f29f473635f2c1e343f3f133c7b3fa3dcc72b1fca1966f7ab6460fe2917ef1feaad145031e92aa3d0a59dd58e432ced42fd9bc4ac04849ff6a25
-
Filesize
1KB
MD5d0c7481ba38fcc0099e2bc6e9811a466
SHA1565a8d4f0bb1de9603a40aeec55641317e1a549f
SHA256a3322cfc02c5d0f7dc07324840a28ec79a46fade1436fe35ca5e2b32aacfe19b
SHA512bc8ab8a482ce22097e71a5d2bbc4d0b675b06625d5352ddc510ac0d96022d3c1e473f327b63669d8698db5c9a9dd5921751b65f57dfda035c86b2b8f5bff3a30
-
Filesize
4KB
MD53ab4c6e882572be55a6d369b87a5e1b2
SHA11a21e6d17f47e17c626adf15c9ba47492dffcb51
SHA256432dcd0341de96b27ad27b12fce7c1570edb233ead0818340a50f9489c764d5f
SHA512ada722e469085ec9bbda293470c906ceba546d86b6fce732d9c9850ae6e3602b376ba92d980b22ea7d3f7976ad95d699c44b7c74c581149bc8099438de2aaae2
-
Filesize
371B
MD5482b40c0d7aa8a3d1bbf44e34b4d2ca5
SHA1d6d24c92b01a2d8a1e9cd5a15669443091f1c7a7
SHA25640adac53b3488585f0bd0dfc919d7d145184d4b78ee7641d721bfdf141571c31
SHA51264774f6c520ba1b99c353d79747e78d07dce9220ba9d4a0d81d8abd6d593ef32941b73d7795e1666b0777571bca194d9ac7b6b4394c1b2bde32387ea4ee2f813
-
Filesize
435KB
MD5cd1114a4af9a93659f28e32c1496269b
SHA1ecbdf6350b26ee50d8d5ed5eda01cf6ad7775494
SHA25646277470b38f3d675b11c6d6a27d2ede6a1ea7ca5d6562ba660947760276e39c
SHA5129ee3fb54e473b05877e53a853c8517d251062f933576882464796b3a2cae909b7bcad370a158afb176f83923ea153432e394ca72e1305965855d63c723c7cc5f
-
Filesize
358KB
MD5204485a9fc07a1a9b404c2c1223b5f10
SHA1e3fab837f938e314cba80c9261779a74e97ed32f
SHA256dd8e52e3408deb327527b98bfa0c1174b6826f8ce3ff9153ae0bf17d4520b914
SHA512d15694c6fdc00e414a8c6a2b529465ec5234bc18385e3c08ea53f6804be8b2c6834f325398b623211d608cf87817044d6dfc30e0843e382f915283f09d4ac271
-
Filesize
532KB
MD56da09d7632ae84d4aba5abc91c33d70b
SHA128eb31258c6f892c7b74ca5ce381538c23608056
SHA2565cb2706a35f665439b36f9af2a2e3f3e124477f17832b52a71c232a4560054d3
SHA5127140d784695cb5ac7f365a85fa88c69ee5c3c9f421d8fc0306af50e46a1f4de7fcea9e54693f2404ee6e2856a948db4ffe3cf77cc3e3bfc7545d53b9a6fcd400
-
Filesize
319KB
MD5c11d491dd6e51bdc42722332e0b284a5
SHA151a0a58be1a201ca0f75c18e582dfc81e75fbee3
SHA2566e102f9b265886683b089894d0e9e4ec966b1eb9d0e8202e0b8b4349e4e52277
SHA512a465e8522749d45775bcd8d490e7b719c9eddb68444dbb3196c904bc84d444d5642cf785b63ddfe11eee88a16ee6a21e62596ec80c2473f28df92f5ce129b37a
-
Filesize
377KB
MD5833664c162672c61f70b7e1cda93306a
SHA1849e2d671dd720c984813128c3ad159956c40960
SHA2565c104d3472ac57d42a6a59ff1732fd11d70fc43325a847c0a01ca1e60920b75f
SHA512ca08b6bf242e065c592be3be5f35ceb84fc3d4243ddad563aca76ed659bd98039e0f77a364d97aac28fc4db419af64c10bb556577ea2d3e1050f62110c656618
-
Filesize
280KB
MD515ed67d124151f4044867c8a60f42609
SHA190254965acd198138c747dce2d972165e1a74b8d
SHA2563d46e07052f5803595342bda774c5c722c5fe254d744c5380c306f0ff3b33494
SHA512869ac2fb906fdab85ac8f19ca27af0948b41218926b869a0ae8e01addc9ff4620c3bd2f47e191e4b6b26c12b8b12f3b02d4b991555ab5805e504aa4c230078ae
-
Filesize
416KB
MD5b476e582fc02cbc76baf5fc1fb930e56
SHA109680f00dfa577dd2ef359fd85627836a5c2004c
SHA256daab5a38bc0fa2bb906ef9c7b4f378d13386c1dcd00c197ca7479581ca67e24d
SHA512d67e4c771f5a9834e9209726f2c4aea710c314a7bf351c91ba388b1bd23b37b78b3429663502fcee1526c10eb9972dfc62fd7a9090c6245483c6cba51e996beb
-
Filesize
3.3MB
MD513aa4bf4f5ed1ac503c69470b1ede5c1
SHA1c0b7dadff8ac37f6d9fd00ae7f375e12812bfc00
SHA2564cdeb2eae1cec1ab07077142313c524e9cf360cdec63497538c4405c2d8ded62
SHA512767b03e4e0c2a97cb0282b523bcad734f0c6d226cd1e856f6861e6ae83401d0d30946ad219c8c5de3c90028a0141d3dc0111c85e0a0952156cf09e189709fa7d
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98