Analysis
-
max time kernel
99s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-02-2024 20:46
Static task
static1
Behavioral task
behavioral1
Sample
CheatEngine75.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CheatEngine75.exe
Resource
win10v2004-20240221-en
General
-
Target
CheatEngine75.exe
-
Size
28.5MB
-
MD5
8cef61e2080c38400698bc3265fd7f95
-
SHA1
a174b7dd8bd1eacfa6a9accd878c16bdc8aa1936
-
SHA256
cb73a9806e39e7c694cd79bbdb0fd3c836ec82810f6ded1852aa1ac9c7b3012c
-
SHA512
81781fdb49a3b949725ff508a96eef01599ff90c2fd42f104dda311cfb37dfb90d4aa38d0d4694634c3a469fbdac4c7421a5aee99067536848bbc50bda4658cb
-
SSDEEP
786432:0TCxuEnwFho+zM77UDZiZCd08jFZJAI5E70TZFH:02EXFhV0KAcNjxAItj
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2952 icacls.exe 828 icacls.exe -
Checks for any installed AV software in registry 1 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV\Dir CheatEngine75.tmp Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\SOFTWARE\AVG\AV\Dir CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avira\Browser\Installed CheatEngine75.tmp Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\SOFTWARE\Avira\Browser\Installed CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast CheatEngine75.tmp Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\SOFTWARE\AVAST Software\Avast CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV\Dir CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\Browser\Installed CheatEngine75.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Cheat Engine 7.5\include\sec_api\is-OVCIT.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\winapi\is-AVKDA.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\winapi\is-KU3OO.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\is-4D017.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\badassets\is-LF02T.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\sec_api\is-0ITAT.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\sys\is-HA2PU.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\dlls\32\is-E612O.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\luaclient-x86_64.dll CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\ced3d9hook.dll CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\speedhack-i386.dll CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-8LQ1D.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-G5R3E.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\is-KDAI2.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\dlls\is-A711P.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\example-c\is-MSF5N.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\win32\symsrv.dll CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\DotNetDataCollector64.exe CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-LPBL7.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-DQ7LO.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\is-7IAOP.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-K2BGI.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-U3NDL.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-BBQA7.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\sec_api\is-7M490.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\is-120V0.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\dlls\is-F9L6P.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\dlls\src\Mono\MonoDataCollector\is-NVBTN.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\luaclient-i386.dll CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\d3dhook.dll CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\winapi\is-VL381.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-45GDB.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-0F7OJ.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-GIDSM.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-L5HIA.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\c# template\CEPluginLibrary\SDK\is-13H3C.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\c# template\CEPluginLibrary\bin\Release\is-D5EE1.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\clibs32\is-DITSM.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\ceshare\is-3CNNG.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\dlls\src\Mono\is-2QGVK.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\is-INNKK.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-SV145.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-FEAS9.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-2C59S.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-0RJCS.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\is-J5ARP.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\sys\is-9GV3S.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\languages\is-0PH3Q.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\badassets\is-9KR5N.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-F30DJ.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-I6OB6.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-10OD3.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-7CHC4.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\win32\is-PD08F.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-7NTO7.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-5VTMA.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\languages\is-6D2K4.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\is-3S1QN.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\ceshare\forms\is-K471R.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-N10FT.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\c# template\CEPluginLibrary\is-CJV7C.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\ced3d11hook64.dll CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-OCRMV.tmp CheatEngine75.tmp -
Executes dropped EXE 9 IoCs
pid Process 1072 CheatEngine75.tmp 1976 saBSI.exe 1512 CheatEngine75.exe 1456 CheatEngine75.tmp 2872 _setup64.tmp 1684 Kernelmoduleunloader.exe 280 windowsrepair.exe 1604 Cheat Engine.exe 456 cheatengine-x86_64-SSE4-AVX2.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 556 sc.exe 1688 sc.exe -
Loads dropped DLL 29 IoCs
pid Process 2308 CheatEngine75.exe 1072 CheatEngine75.tmp 1072 CheatEngine75.tmp 1976 saBSI.exe 1976 saBSI.exe 1976 saBSI.exe 1072 CheatEngine75.tmp 1512 CheatEngine75.exe 1456 CheatEngine75.tmp 1456 CheatEngine75.tmp 1456 CheatEngine75.tmp 1456 CheatEngine75.tmp 1456 CheatEngine75.tmp 1456 CheatEngine75.tmp 1456 CheatEngine75.tmp 1456 CheatEngine75.tmp 1456 CheatEngine75.tmp 1456 CheatEngine75.tmp 1456 CheatEngine75.tmp 1604 Cheat Engine.exe 456 cheatengine-x86_64-SSE4-AVX2.exe 456 cheatengine-x86_64-SSE4-AVX2.exe 1988 WerFault.exe 1988 WerFault.exe 1988 WerFault.exe 1988 WerFault.exe 456 cheatengine-x86_64-SSE4-AVX2.exe 1988 WerFault.exe 456 cheatengine-x86_64-SSE4-AVX2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1988 1072 WerFault.exe 28 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CheatEngine75.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ CheatEngine75.tmp -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.CETRAINER\ = "CheatEngine" CheatEngine75.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.CT\ = "CheatEngine" CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine CheatEngine75.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\ = "Cheat Engine" CheatEngine75.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\DefaultIcon\ = "C:\\Program Files\\Cheat Engine 7.5\\Cheat Engine.exe,0" CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CETRAINER CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\DefaultIcon CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\shell\open\command CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\shell CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\shell\open CheatEngine75.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\shell\open\command\ = "\"C:\\Program Files\\Cheat Engine 7.5\\Cheat Engine.exe\" \"%1\"" CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CT CheatEngine75.tmp -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 CheatEngine75.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 CheatEngine75.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 CheatEngine75.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 CheatEngine75.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 CheatEngine75.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A CheatEngine75.tmp -
Runs net.exe
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1072 CheatEngine75.tmp 1072 CheatEngine75.tmp 1072 CheatEngine75.tmp 1072 CheatEngine75.tmp 1072 CheatEngine75.tmp 1072 CheatEngine75.tmp 1072 CheatEngine75.tmp 1976 saBSI.exe 1976 saBSI.exe 1976 saBSI.exe 1976 saBSI.exe 1976 saBSI.exe 1456 CheatEngine75.tmp 1456 CheatEngine75.tmp -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1072 CheatEngine75.tmp 1456 CheatEngine75.tmp 456 cheatengine-x86_64-SSE4-AVX2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1072 2308 CheatEngine75.exe 28 PID 2308 wrote to memory of 1072 2308 CheatEngine75.exe 28 PID 2308 wrote to memory of 1072 2308 CheatEngine75.exe 28 PID 2308 wrote to memory of 1072 2308 CheatEngine75.exe 28 PID 2308 wrote to memory of 1072 2308 CheatEngine75.exe 28 PID 2308 wrote to memory of 1072 2308 CheatEngine75.exe 28 PID 2308 wrote to memory of 1072 2308 CheatEngine75.exe 28 PID 1072 wrote to memory of 1976 1072 CheatEngine75.tmp 31 PID 1072 wrote to memory of 1976 1072 CheatEngine75.tmp 31 PID 1072 wrote to memory of 1976 1072 CheatEngine75.tmp 31 PID 1072 wrote to memory of 1976 1072 CheatEngine75.tmp 31 PID 1072 wrote to memory of 1976 1072 CheatEngine75.tmp 31 PID 1072 wrote to memory of 1976 1072 CheatEngine75.tmp 31 PID 1072 wrote to memory of 1976 1072 CheatEngine75.tmp 31 PID 1072 wrote to memory of 1512 1072 CheatEngine75.tmp 32 PID 1072 wrote to memory of 1512 1072 CheatEngine75.tmp 32 PID 1072 wrote to memory of 1512 1072 CheatEngine75.tmp 32 PID 1072 wrote to memory of 1512 1072 CheatEngine75.tmp 32 PID 1072 wrote to memory of 1512 1072 CheatEngine75.tmp 32 PID 1072 wrote to memory of 1512 1072 CheatEngine75.tmp 32 PID 1072 wrote to memory of 1512 1072 CheatEngine75.tmp 32 PID 1512 wrote to memory of 1456 1512 CheatEngine75.exe 33 PID 1512 wrote to memory of 1456 1512 CheatEngine75.exe 33 PID 1512 wrote to memory of 1456 1512 CheatEngine75.exe 33 PID 1512 wrote to memory of 1456 1512 CheatEngine75.exe 33 PID 1512 wrote to memory of 1456 1512 CheatEngine75.exe 33 PID 1512 wrote to memory of 1456 1512 CheatEngine75.exe 33 PID 1512 wrote to memory of 1456 1512 CheatEngine75.exe 33 PID 1456 wrote to memory of 1200 1456 CheatEngine75.tmp 34 PID 1456 wrote to memory of 1200 1456 CheatEngine75.tmp 34 PID 1456 wrote to memory of 1200 1456 CheatEngine75.tmp 34 PID 1456 wrote to memory of 1200 1456 CheatEngine75.tmp 34 PID 1200 wrote to memory of 2224 1200 net.exe 36 PID 1200 wrote to memory of 2224 1200 net.exe 36 PID 1200 wrote to memory of 2224 1200 net.exe 36 PID 1456 wrote to memory of 1924 1456 CheatEngine75.tmp 37 PID 1456 wrote to memory of 1924 1456 CheatEngine75.tmp 37 PID 1456 wrote to memory of 1924 1456 CheatEngine75.tmp 37 PID 1456 wrote to memory of 1924 1456 CheatEngine75.tmp 37 PID 1924 wrote to memory of 2176 1924 net.exe 39 PID 1924 wrote to memory of 2176 1924 net.exe 39 PID 1924 wrote to memory of 2176 1924 net.exe 39 PID 1456 wrote to memory of 556 1456 CheatEngine75.tmp 40 PID 1456 wrote to memory of 556 1456 CheatEngine75.tmp 40 PID 1456 wrote to memory of 556 1456 CheatEngine75.tmp 40 PID 1456 wrote to memory of 556 1456 CheatEngine75.tmp 40 PID 1456 wrote to memory of 1688 1456 CheatEngine75.tmp 42 PID 1456 wrote to memory of 1688 1456 CheatEngine75.tmp 42 PID 1456 wrote to memory of 1688 1456 CheatEngine75.tmp 42 PID 1456 wrote to memory of 1688 1456 CheatEngine75.tmp 42 PID 1456 wrote to memory of 2872 1456 CheatEngine75.tmp 44 PID 1456 wrote to memory of 2872 1456 CheatEngine75.tmp 44 PID 1456 wrote to memory of 2872 1456 CheatEngine75.tmp 44 PID 1456 wrote to memory of 2872 1456 CheatEngine75.tmp 44 PID 1456 wrote to memory of 2952 1456 CheatEngine75.tmp 46 PID 1456 wrote to memory of 2952 1456 CheatEngine75.tmp 46 PID 1456 wrote to memory of 2952 1456 CheatEngine75.tmp 46 PID 1456 wrote to memory of 2952 1456 CheatEngine75.tmp 46 PID 1456 wrote to memory of 1684 1456 CheatEngine75.tmp 48 PID 1456 wrote to memory of 1684 1456 CheatEngine75.tmp 48 PID 1456 wrote to memory of 1684 1456 CheatEngine75.tmp 48 PID 1456 wrote to memory of 1684 1456 CheatEngine75.tmp 48 PID 1456 wrote to memory of 280 1456 CheatEngine75.tmp 50 PID 1456 wrote to memory of 280 1456 CheatEngine75.tmp 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\is-I014O.tmp\CheatEngine75.tmp"C:\Users\Admin\AppData\Local\Temp\is-I014O.tmp\CheatEngine75.tmp" /SL5="$70120,29019897,780800,C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"2⤵
- Checks for any installed AV software in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\is-4P0QB.tmp\prod0_extract\saBSI.exe"C:\Users\Admin\AppData\Local\Temp\is-4P0QB.tmp\prod0_extract\saBSI.exe" /affid 91082 PaidDistribution=true CountryCode=GB3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\is-4P0QB.tmp\CheatEngine75.exe"C:\Users\Admin\AppData\Local\Temp\is-4P0QB.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\is-N6SVU.tmp\CheatEngine75.tmp"C:\Users\Admin\AppData\Local\Temp\is-N6SVU.tmp\CheatEngine75.tmp" /SL5="$201C4,26511452,832512,C:\Users\Admin\AppData\Local\Temp\is-4P0QB.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST4⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\system32\net.exe"net" stop BadlionAntic5⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BadlionAntic6⤵PID:2224
-
-
-
C:\Windows\system32\net.exe"net" stop BadlionAnticheat5⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BadlionAnticheat6⤵PID:2176
-
-
-
C:\Windows\system32\sc.exe"sc" delete BadlionAntic5⤵
- Launches sc.exe
PID:556
-
-
C:\Windows\system32\sc.exe"sc" delete BadlionAnticheat5⤵
- Launches sc.exe
PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\is-N3E4P.tmp\_isetup\_setup64.tmphelper 105 0x2045⤵
- Executes dropped EXE
PID:2872
-
-
C:\Windows\system32\icacls.exe"icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)5⤵
- Modifies file permissions
PID:2952
-
-
C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe"C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe" /SETUP5⤵
- Executes dropped EXE
PID:1684
-
-
C:\Program Files\Cheat Engine 7.5\windowsrepair.exe"C:\Program Files\Cheat Engine 7.5\windowsrepair.exe" /s5⤵
- Executes dropped EXE
PID:280
-
-
C:\Windows\system32\icacls.exe"icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)5⤵
- Modifies file permissions
PID:828
-
-
-
-
C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe"C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604 -
C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe"C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 4843⤵
- Loads dropped DLL
- Program crash
PID:1988
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD59af96706762298cf72df2a74213494c9
SHA14b5fd2f168380919524ecce77aa1be330fdef57a
SHA25665fa2ccb3ac5400dd92dda5f640445a6e195da7c827107260f67624d3eb95e7d
SHA51229a0619093c4c0ecf602c861ec819ef16550c0607df93067eaef4259a84fd7d40eb88cd5548c0b3b265f3ce5237b585f508fdd543fa281737be17c0551163bd4
-
Filesize
328KB
MD519d52868c3e0b609dbeb68ef81f381a9
SHA1ce365bd4cf627a3849d7277bafbf2f5f56f496dc
SHA256b96469b310ba59d1db320a337b3a8104db232a4344a47a8e5ae72f16cc7b1ff4
SHA5125fbd53d761695de1dd6f0afd0964b33863764c89692345cab013c0b1b6332c24dcf766028f305cc87d864d17229d7a52bf19a299ca136a799053c368f21c8926
-
Filesize
468KB
MD5daa81711ad1f1b1f8d96dc926d502484
SHA17130b241e23bede2b1f812d95fdb4ed5eecadbfd
SHA2568422be70e0ec59c962b35acf8ad80671bcc8330c9256e6e1ec5c07691388cd66
SHA5129eaa8e04ad7359a30d5e2f9256f94c1643d4c3f3c0dff24d6cd9e31a6f88cb3b470dd98f01f8b0f57bb947adc3d45c35749ed4877c7cbbbcc181145f0c361065
-
Filesize
5KB
MD55cff22e5655d267b559261c37a423871
SHA1b60ae22dfd7843dd1522663a3f46b3e505744b0f
SHA256a8d8227b8e97a713e0f1f5db5286b3db786b7148c1c8eb3d4bbfe683dc940db9
SHA512e00f5b4a7fa1989382df800d168871530917fcd99efcfe4418ef1b7e8473caea015f0b252cac6a982be93b5d873f4e9acdb460c8e03ae1c6eea9c37f84105e50
-
Filesize
128KB
MD543dac1f3ca6b48263029b348111e3255
SHA19e399fddc2a256292a07b5c3a16b1c8bdd8da5c1
SHA256148f12445f11a50efbd23509139bf06a47d453e8514733b5a15868d10cc6e066
SHA5126e77a429923b503fc08895995eb8817e36145169c2937dacc2da92b846f45101846e98191aeb4f0f2f13fff05d0836aa658f505a04208188278718166c5e3032
-
Filesize
140KB
MD50daf9f07847cceb0f0760bf5d770b8c1
SHA1992cc461f67acea58a866a78b6eefb0cbcc3aaa1
SHA256a2ac2ba27b0ed9acc3f0ea1bef9909a59169bc2eb16c979ef8e736a784bf2fa4
SHA512b4dda28721de88a372af39d4dfba6e612ce06cc443d6a6d636334865a9f8ca555591fb36d9829b54bc0fb27f486d4f216d50f68e1c2df067439fe8ebbf203b6a
-
Filesize
137KB
MD542e2bf4210f8126e3d655218bd2af2e4
SHA178efcb9138eb0c800451cf2bcc10e92a3adf5b72
SHA2561e30126badfffb231a605c6764dd98895208779ef440ea20015ab560263dd288
SHA512c985988d0832ce26337f774b160ac369f2957c306a1d82fbbffe87d9062ae5f3af3c1209768cd574182669cd4495dba26b6f1388814c0724a7812218b0b8dc74
-
Filesize
146KB
MD50eaac872aadc457c87ee995bbf45a9c1
SHA15e9e9b98f40424ad5397fc73c13b882d75499d27
SHA2566f505cc5973687bbda1c2d9ac8a635d333f57c12067c54da7453d9448ab40b8f
SHA512164d1e6ef537d44ac4c0fd90d3c708843a74ac2e08fa2b3f0fdd4a180401210847e0f7bb8ec3056f5dc1d5a54d3239c59fb37914ce7742a4c0eb81578657d24b
-
Filesize
124KB
MD55f1a333671bf167730ed5f70c2c18008
SHA1c8233bbc6178ba646252c6566789b82a3296cab5
SHA256fd2a2b4fe4504c56347c35f24d566cc0510e81706175395d0a2ba26a013c4daf
SHA5126986d93e680b3776eb5700143fc35d60ca9dbbdf83498f8731c673f9fd77c8699a24a4849db2a273aa991b8289e4d6c3142bbde77e11f2faf603df43e8fea105
-
Filesize
136KB
MD561ba5199c4e601fa6340e46bef0dff2d
SHA17c1a51d6d75b001ba1acde2acb0919b939b392c3
SHA2568783f06f7b123e16042bb0af91ff196b698d3cd2aa930e3ea97cfc553d9fc0f4
SHA5128ce180a622a5788bb66c5f3a4abfde62c858e86962f29091e9c157753088ddc826c67c51ff26567bfe2b75737897f14e6bb17ec89f52b525f6577097f1647d31
-
Filesize
3.2MB
MD55f847c6fb4222bdfd09f70fa184c3e11
SHA1c2ac8eb1c8cf55c21fa6a71c970a8cce90c1e0be
SHA256675efd26760d0fce9b2c2edaf4308ed626269dee7009702218c2124e3aadb9c5
SHA51200f930bf779105627a023b51e9d95a2b59c6b48385b455ebd7dbc8360ac44fc9783a93a74ca00899dbabfa4258014206130dfcc6a188afbeb24b47724a380fca
-
Filesize
119KB
MD52a2ebe526ace7eea5d58e416783d9087
SHA15dabe0f7586f351addc8afc5585ee9f70c99e6c4
SHA256e2a7df4c380667431f4443d5e5fc43964b76c8fcb9cf4c7db921c4140b225b42
SHA51294ed0038068abddd108f880df23422e21f9808ce04a0d14299aacc5d573521f52626c0c2752b314cda976f64de52c4d5bcac0158b37d43afb9bc345f31fdbbc0
-
Filesize
131KB
MD52af7afe35ab4825e58f43434f5ae9a0f
SHA1b67c51cad09b236ae859a77d0807669283d6342f
SHA2567d82694094c1bbc586e554fa87a4b1ed6ebc9eb14902fd429824dcd501339722
SHA51223b7c6db0cb9c918ad9f28fa0e4e683c7e2495e89a136b75b7e1be6380591da61b6fb4f7248191f28fd3d80c4a391744a96434b4ab96b9531b5ebb0ec970b9d0
-
Filesize
283B
MD5af5ed8f4fe5370516403ae39200f5a4f
SHA19299e9998a0605182683a58a5a6ab01a9b9bc037
SHA2564aa4f0b75548d45c81d8e876e2db1c74bddfd64091f102706d729b50a7af53a5
SHA512f070049a2fae3223861424e7fe79cbae6601c9bee6a56fadde4485ad3c597dc1f3687e720177ab28564a1faab52b6679e9315f74327d02aa1fb31e7b8233a80f
-
Filesize
157KB
MD5df443813546abcef7f33dd9fc0c6070a
SHA1635d2d453d48382824e44dd1e59d5c54d735ee2c
SHA256d14911c838620251f7f64c190b04bb8f4e762318cc763d993c9179376228d8ca
SHA5129f9bea9112d9db9bcecfc8e4800b7e8032efb240cbbddaf26c133b4ce12d27b47dc4e90bc339c561714bc972f6e809b2ec9c9e1facc6c223fbac66b089a14c25
-
Filesize
182KB
MD54a3b7c52ef32d936e3167efc1e920ae6
SHA1d5d8daa7a272547419132ddb6e666f7559dbac04
SHA25626ede848dba071eb76c0c0ef8e9d8ad1c53dfab47ca9137abc9d683032f06ebb
SHA51236d7f8a0a749de049a830cc8c8f0d3962d8dce57b445f5f3c771a86dd11aaa10da5f36f95e55d3dc90900e4dbddd0dcc21052c53aa11f939db691362c42e5312
-
Filesize
197KB
MD59f50134c8be9af59f371f607a6daa0b6
SHA16584b98172cbc4916a7e5ca8d5788493f85f24a7
SHA256dd07117ed80546f23d37f8023e992de560a1f55a76d1eb6dfd9d55baa5e3dad6
SHA5125ccafa2b0e2d20034168ee9a79e8efff64f12f5247f6772815ef4cb9ee56f245a06b088247222c5a3789ae2dcefadbc2c15df4ff5196028857f92b9992b094e0
-
Filesize
260KB
MD5dd71848b5bbd150e22e84238cf985af0
SHA135c7aa128d47710cfdb15bb6809a20dbd0f916d8
SHA256253d18d0d835f482e6abbaf716855580eb8fe789292c937301e4d60ead29531d
SHA5120cbf35c9d7b09fb57d8a9079eab726a3891393f12aee8b43e01d1d979509e755b74c0fb677f8f2dfab6b2e34a141f65d0cfbfe57bda0bf7482841ad31ace7790
-
Filesize
2KB
MD5650c02fc9f949d14d62e32dd7a894f5e
SHA1fa5399b01aadd9f1a4a5632f8632711c186ec0de
SHA256c4d23db8effb359b4aa4d1e1e480486fe3a4586ce8243397a94250627ba4f8cc
SHA512f2caaf604c271283fc7af3aa9674b9d647c4ac53dffca031dbf1220d3ed2e867943f5409a95f41c61d716879bed7c888735f43a068f1cc1452b4196d611cb76d
-
Filesize
200KB
MD56e00495955d4efaac2e1602eb47033ee
SHA195c2998d35adcf2814ec7c056bfbe0a0eb6a100c
SHA2565e24a5fe17ec001cab7118328a4bff0f2577bd057206c6c886c3b7fb98e0d6d9
SHA5122004d1def322b6dd7b129fe4fa7bbe5d42ab280b2e9e81de806f54313a7ed7231f71b62b6138ac767288fee796092f3397e5390e858e06e55a69b0d00f18b866
-
Filesize
256KB
MD519b2050b660a4f9fcb71c93853f2e79c
SHA15ffa886fa019fcd20008e8820a0939c09a62407a
SHA2565421b570fbc1165d7794c08279e311672dc4f42cb7ae1cbddcd7eea0b1136fff
SHA512a93e47387ab0d327b71c3045b3964c7586d0e03dddb2e692f6671fb99659e829591d5f23ce7a95683d82d239ba7d11fb5a123834629a53de5ce5dba6aa714a9a
-
Filesize
444KB
MD5e8dfc0d2d41483c7725e4ebb7e32d324
SHA1b2890c91efba390b68e481cd2ee311136b740ede
SHA2561172f2d7b1fb34408c8ffc248e3e719922843ea07bd5b409be3405d1c300b3f7
SHA512539a1bd18d4753d69756b9b7e6603dd6e7a3f354ca002dece206f7e2f1e2792704f3d80f38b37c0c41f16a1fd9de32cc4dd5873959d762c5aa13388715ee7803
-
Filesize
324KB
MD5e9b5905d495a88adbc12c811785e72ec
SHA1ca0546646986aab770c7cf2e723c736777802880
SHA2563eb9cd27035d4193e32e271778643f3acb2ba73341d87fd8bb18d99af3dffdea
SHA5124124180b118149c25f8ea8dbbb2912b4bd56b43f695bf0ff9c6ccc95ade388f1be7d440a791d49e4d5c9c350ea113cf65f839a3c47d705533716acc53dd038f8
-
Filesize
413KB
MD58d487547f1664995e8c47ec2ca6d71fe
SHA1d29255653ae831f298a54c6fa142fb64e984e802
SHA256f50baf9dc3cd6b925758077ec85708db2712999b9027cc632f57d1e6c588df21
SHA51279c230cfe8907df9da92607a2c1ace0523a36c3a13296cb0265329208edc453e293d7fbedbd5410decf81d20a7fe361fdebddadbc1dc63c96130b0bedf5b1d8a
-
Filesize
201KB
MD5de625af5cf4822db08035cc897f0b9f2
SHA14440b060c1fa070eb5d61ea9aadda11e4120d325
SHA2563cdb85ee83ef12802efdfc9314e863d4696be70530b31e7958c185fc4d6a9b38
SHA51219b22f43441e8bc72507be850a8154321c20b7351669d15af726145c0d34805c7df58f9dc64a29272a4811268308e503e9840f06e51ccdcb33afd61258339099
-
Filesize
264KB
MD5f9c562b838a3c0620fb6ee46b20b554c
SHA15095f54be57622730698b5c92c61b124dfb3b944
SHA256e08b035d0a894d8bea64e67b1ed0bce27567d417eaaa133e8b231f8a939e581d
SHA512a20bc9a442c698c264fef82aa743d9f3873227d7d55cb908e282fa1f5dcff6b40c5b9ca7802576ef2f5a753fd1c534e9be69464b29af8efec8b019814b875296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5637d0ad57d5305105d1a1cd7ea115297
SHA14b098a4e1baafbb9d8e0ee95c1814b4690bb1feb
SHA256227aa59a2f40703d0355042af28c0b0e417512378e6861ccab788b814db9bd70
SHA5120ec4e018110f178f484b0cff095c33a3004981a6ef714b48acf348fdb74422fabe3a3110afeffe4e5c015022ed1c58243228fe3622a52b3412a15239a4fc30dc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
114KB
MD55ef5291810c454a35f76d976105f37cc
SHA18ce0cc65ae1786cef1c545d40d081eda13239fa6
SHA25603e69e8c87732c625df2f628ac63bd145268f9dea9c5f3dd3670b1cf349a995c
SHA5123bec461bb3cbbbdb3c05171fcc5ab7e648b2b60d7b811261662f14d35c3836148b14cda1a3f2be127c89cc732de8cf1644d2e55e049eeeb2da8e397c58cc919e
-
Filesize
618KB
MD5b38612e112602d7e9a2a6bf562c8d08a
SHA1c623a84855ac272dbaf20223cd81fb85437ab22c
SHA2561903b43004e323018fa624838d3e39cd076b03738d6e8651f12371ec1ed17c31
SHA5121b4819bd935abaca513599cca2892a9db3175d5fd1968c0a2acb7198aa57f76c98c8267397e889cd1c6cbe5614443fb82a7a73138dcf783322b899d17545c313
-
Filesize
3.3MB
MD579ccd264b0da1f51976fc4dde5f2e062
SHA1f1370ec9c6b34df9fcb990ba07c1463c18db3645
SHA256d2160dbd716906d37f1ed6cf620be004a57e3680300cdf6417f4763b3297dda3
SHA512a5efb642d3f545aa1089a145792000d314c4201fb07b462d3f3a3d0e7f3370807d13508edba3ca2462824e17c2f2bf88a8a225a5d73e469ba98f6f82de2d1a84
-
Filesize
47KB
MD54cfff8dc30d353cd3d215fd3a5dbac24
SHA10f4f73f0dddc75f3506e026ef53c45c6fafbc87e
SHA2560c430e56d69435d8ab31cbb5916a73a47d11ef65b37d289ee7d11130adf25856
SHA5129d616f19c2496be6e89b855c41befc0235e3ce949d2b2ae7719c823f10be7fe0809bddfd93e28735b36271083dd802ae349b3ab7b60179b269d4a18c6cef4139
-
Filesize
246KB
MD51df360d73bf8108041d31d9875888436
SHA1c866e8855d62f56a411641ece0552e54cbd0f2fb
SHA256c1b1d7b4806955fe39a8bc6ce5574ab6ac5b93ad640cecfebe0961360c496d43
SHA5123991b89927d89effca30cc584d5907998c217cf00ca441f2525ef8627ffff2032d104536f8b6ab79b83f4e32a7aab993f45d3930d5943cbfb5e449c5832abe14
-
Filesize
499KB
MD5cd9c77bc5840af008799985f397fe1c3
SHA19b526687a23b737cc9468570fa17378109e94071
SHA25626d7704b540df18e2bccd224df677061ffb9f03cab5b3c191055a84bf43a9085
SHA512de82bd3cbfb66a2ea0cc79e19407b569355ac43bf37eecf15c9ec0693df31ee480ee0be8e7e11cc3136c2df9e7ef775bf9918fe478967eee14304343042a7872
-
Filesize
1.1MB
MD5bb7cf61c4e671ff05649bda83b85fa3d
SHA1db3fdeaf7132448d2a31a5899832a20973677f19
SHA2569d04462e854ef49bcd6059767248a635912ce0f593521a7cc8af938e6a027534
SHA51263798024e1e22975d1be1e8bff828040d046d63df29f07d6161c868526d5f08451e44b5fa60bfb0c22cf7880abc03aaedafa2c5c844c3aeff640e6fac9586aab
-
Filesize
576KB
MD540f3470c2295a8176e8a45ff4b5bff93
SHA1a3fbcf43b4db706561272d0b5c392ebd88c3ea14
SHA256206cd10db84b7a40ff2e607301c5192829d2ecbd3136c1574ec6c9b6d1fb3a76
SHA51274d52b0c8c865eb2871605a0717c63dafe1a03699be5be723126f2ac41b08db191cc176a6c276bb4d17f61fd7f299e138c4b82f097b809cfe8b278f46b1ef321
-
Filesize
3.1MB
MD59aa2acd4c96f8ba03bb6c3ea806d806f
SHA19752f38cc51314bfd6d9acb9fb773e90f8ea0e15
SHA2561b81562fdaeaa1bc22cbaa15c92bab90a12080519916cfa30c843796021153bb
SHA512b0a00082c1e37efbfc2058887db60dabf6e9606713045f53db450f16ebae0296abfd73a025ffa6a8f2dcb730c69dd407f7889037182ce46c68367f54f4b1dc8d
-
Filesize
389KB
MD5f921416197c2ae407d53ba5712c3930a
SHA16a7daa7372e93c48758b9752c8a5a673b525632b
SHA256e31b233ddf070798cc0381cc6285f6f79ea0c17b99737f7547618dcfd36cdc0e
SHA5120139efb76c2107d0497be9910836d7c19329e4399aa8d46bbe17ae63d56ab73004c51b650ce38d79681c22c2d1b77078a7d7185431882baf3e7bef473ac95dce
-
Filesize
3.2MB
MD51c1630b241d5a6be07bfba2b3ea97a25
SHA17203255d1a6021874d41a48fcd5719fd7034f34c
SHA256526cddd0d843f5984ac6cb98d28f22b090682c3a8704122b644ec8ae2c9a10e5
SHA512bddedb575febf8c8103cfbb1981fd1d5f20d2e0f1d6f4252a98930d587420a69750ddc1be46932cdf979b8633054321f462557d88349459e111be43139beff4a
-
Filesize
2.8MB
MD5f78b1e1534d6e5e0a1d144e83e9808c6
SHA1dccba0b8aa2bd93fe49cac0c384b7ee48901a66e
SHA2566ee4e3619f276765a8ff523e087dee33b9f788288e373300f8234f45120684ff
SHA51291f9b2e48058f136a889e89cacab447130c78a7e38c397f0d562a0dc18496cb549a0d5e52b6bee5e7b994fb89c4e4c643b81f74babf505e777af3cbc0c77fba2
-
Filesize
3.9MB
MD57d7fccba4f4011787ab33f4040877ed1
SHA12917e8807081990dfdc32ca8f46d88bb9af5f76a
SHA256e19cf5987a200123e3aadd1b554c981a872e71a4d356749df676dec3c336cf35
SHA51272efb86548bbb3ef69b294a5445ad71d29148ea123389b3fabac7267bb2f12b18d80544065f15ee89f79025512857b4469f476f660ffde35868b2811bfb0bce8
-
Filesize
3.4MB
MD53c18ebbe0483d2726710923b123cfa4d
SHA13c96bd173214cb4e362d6780066059f5abee83b0
SHA25688658777877e32310f4732af4046c975e28680475a72f0da798b55ae11e7833a
SHA51256b46a467c2aa2a5255b9de82886085d6452f3d579036e5ef44efbe84715b819c68153e3a8b3a2afbc4e89354058acdd9999427cd0e3eea115348a966a5719f8
-
Filesize
11.6MB
MD58b7a8ff3b4afcd608a592eff187b1020
SHA152c5c8d584a43993548f1308fee1b88faaa0539b
SHA256ab032ff6eedb55c28865fe72f677a48c9695f5605ac2b99d5cb06e42f4cb529d
SHA512fb471a0a1b6767b4221dcd55af4bbc2383f8a4906907ef45b2c311d08c9c80805501f9b2b5e589f7b140935f5fdec0112b3a4b558425ae6ae5580f90031aeafa
-
Filesize
528KB
MD5b7c9f1e7e640f1a034be84af86970d45
SHA1f795dc3d781b9578a96c92658b9f95806fc9bdde
SHA2566d0a06b90213f082cb98950890518c0f08b9fc16dbfab34d400267cb6cdadeff
SHA512da63992b68f1112c0d6b33e6004f38e85b3c3e251e0d5457cd63804a49c5aa05aa23249e0614dacad4fec28ca6efdb5ddee06da5bfbfa07e21942976201079f3
-
Filesize
435KB
MD5069ec7832adbf93bd04a91b07ff00d78
SHA15ed84d13ffcef487eb039cd75de91294c25ed0cc
SHA2568c8c608ae67f8b8a4e56daf2edea1a92cba6866d4f324bd0e5ad1284126849a7
SHA512d9e9d40de2509b112762ade7ef0bb6db91eb5687ae6ea9689abd7a7af8ba601297655587eef34f7d1dac62d77e5b586be71b19f044ebf53028cfe90ddce776f8
-
Filesize
262KB
MD59a4d1b5154194ea0c42efebeb73f318f
SHA1220f8af8b91d3c7b64140cbb5d9337d7ed277edb
SHA2562f3214f799b0f0a2f3955dbdc64c7e7c0e216f1a09d2c1ad5d0a99921782e363
SHA5126eef3254fc24079751fc8c38dda9a8e44840e5a4df1ff5adf076e4be87127075a7fea59ba7ef9b901aaf10eb64f881fc8fb306c2625140169665dd3991e5c25b
-
Filesize
502KB
MD598cc170901603b58bd439bf973ea84be
SHA1a8dc635ace76a8729ee6d98855c85e77d6e8c5a9
SHA256585f8a1147721f9577a002be3cb47116a22c2de61baeeda1f24d1e9b3c763b4d
SHA5128d2ca846fde9abc71b6c2217021c7f49b89ad0c39fb99bd8c1b59464f923ed037b18ed279ab6e5af6770b157d4a40f907d841e91fc23ae5254b58dfb04655675
-
Filesize
2.0MB
MD5b83f5833e96c2eb13f14dcca805d51a1
SHA19976b0a6ef3dabeab064b188d77d870dcdaf086d
SHA25600e667b838a4125c8cf847936168bb77bb54580bc05669330cb32c0377c4a401
SHA5128641b351e28b3c61ed6762adbca165f4a5f2ee26a023fd74dd2102a6258c0f22e91b78f4a3e9fba6094b68096001de21f10d6495f497580847103c428d30f7bb
-
Filesize
559KB
MD5186e53d8c121065a3ad6562cbaef0c02
SHA197aed04456565522e0179649f89f1984b8b8b76c
SHA256e461649db102aeda8da87800e7b2216484a78bfde5d3951dafb7e17d2ca20224
SHA5128a9b85e9fea472740c59d42358544cade86619c5b8bb151d6e094aefef8696bf7510c40ea6ece005970e824f95d37fa8e210f144c5232385fe51058c140d7df5
-
Filesize
896KB
MD55e293e6e64f0d5b0548c64fd7c430c84
SHA1dab42b7227a023144fad3fb77f4103291b970184
SHA2562fb9049c163b58f184368c232e0d34a301ff7b201f88e1b68fe06b456f84c26e
SHA512e5b2ecc6b1f4a1843a6cdaaff1b137d1b076f58d22ab4331c6565c6dc2f8bcc703d71d594a269044c90c1587752f28658d4255aa82defe80f34792f1c7e26f92
-
Filesize
840KB
MD560a5a2ef40371bf1cfc68d3ce6ba0b03
SHA1c71c8d4897dfb17c01fbf1e01887d44347169234
SHA256bd46b3fc5b9ae3b2605fabe85a7556b979775450ea35505192d773699ca44d0b
SHA51213d85a112653dee9a92340f1512a1275b2485b68fcda854206b47453f3de45031cea0bce9cdb4bf355c1a1bd4564ebb7482d38e5244c7fa34f9acbedc4285570
-
Filesize
832KB
MD514ddd0357f93326b3c2703fcfe511869
SHA142c00692c0ec4cf77645a2fc2b9ea58b7e504d0d
SHA2564122ddc9cce5bb08e64b8f1607c5ceb343ea994437878285eb058a46748695be
SHA5129c33866c07b1526ea7025cc3fd7547a1f6f2c8e1e2d0afce8ad6c654a478bcb1273b621c521c4c312ab023a8ba8ccbbcecf92acf9444eb3de2a5c0a95aa80878
-
Filesize
768KB
MD529bb0e1bc32bd4c117dfbf99ca97cf75
SHA15c0f484754d4456044b122f75e831f1db6cfce7c
SHA25628d79ebd599c49282f23372aa7014fbc6d16e9aba98cb86c0dcf8b82e0b39d2c
SHA51262c1ef86eb036ada4e4917c42b8bbfe5780c065d0203847315bc269f1de2f11009af1a1107bdbe1122b8dbee146b33f5377040d4b30d89c2ad875f61d7e884b0
-
Filesize
6KB
MD5e4211d6d009757c078a9fac7ff4f03d4
SHA1019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
SHA51217257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e
-
Filesize
2.5MB
MD53dd530af5e3b612b6a4c6ca87a8583f7
SHA12c8b713bc66b3df6e30c59697c7b3681ff56f5fb
SHA2563bf186f397f1c434850a8e197224a8b2290cd73ebd60778191613735c6296629
SHA512da3957755fba6eb1ee485387babdbbf174e20eecbcf6fc90ebf6497dedcf3fbe785ac02eeee7de2cbb4bbf4776f07788423184b1e2f1ec29012aa32680a817fe