Analysis
-
max time kernel
34s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 00:35
Behavioral task
behavioral1
Sample
a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe
Resource
win10v2004-20241007-en
General
-
Target
a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe
-
Size
2.3MB
-
MD5
7c57d72004735616fb64f15e439f3750
-
SHA1
63c082d942af68212e4b0531c75656ec41033b02
-
SHA256
a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484
-
SHA512
50d5ae04c02fad8d269d9b618e564a9529af50e4839713051eade001d70d806b483e140b023b7780ef916129861fe81dfac1f932939bf491b358892204c9f33f
-
SSDEEP
49152:IreH0d/LXHncL2O4EOPOF45OMjUfkptVxftQHpn:IreUdD3cL749jUu5G
Malware Config
Signatures
-
Detect Neshta payload 3 IoCs
resource yara_rule behavioral1/files/0x0001000000010314-21.dat family_neshta behavioral1/memory/2364-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2364-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 2 IoCs
pid Process 2164 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 3012 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe -
Loads dropped DLL 3 IoCs
pid Process 2364 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 2164 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 2364 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3012 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 3012 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2164 2364 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 30 PID 2364 wrote to memory of 2164 2364 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 30 PID 2364 wrote to memory of 2164 2364 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 30 PID 2364 wrote to memory of 2164 2364 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 30 PID 2364 wrote to memory of 2164 2364 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 30 PID 2364 wrote to memory of 2164 2364 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 30 PID 2364 wrote to memory of 2164 2364 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 30 PID 2164 wrote to memory of 3012 2164 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 31 PID 2164 wrote to memory of 3012 2164 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 31 PID 2164 wrote to memory of 3012 2164 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 31 PID 2164 wrote to memory of 3012 2164 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 31 PID 2164 wrote to memory of 3012 2164 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 31 PID 2164 wrote to memory of 3012 2164 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 31 PID 2164 wrote to memory of 3012 2164 a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe"C:\Users\Admin\AppData\Local\Temp\a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\jds259441752.tmp\a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe"C:\Users\Admin\AppData\Local\Temp\jds259441752.tmp\a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:3012
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
Filesize
2KB
MD56bb55b49aaa3f481dbdb7279e239b543
SHA1971cc1f5d8b0a46ade278dc8934be44254a00476
SHA2563bb9b34777cf13a2e76177961a3f66a492c68d2c6cb5dc6266a9dd568f68c79c
SHA512a105bf6f10366f982f0b663c4976719185b2da8b1ab377a492dd85663dfc08ae447ceaa503b07c140f473e8fc1678b320a0aa9d686adffd415078b0fcf19f342
-
Filesize
5KB
MD5ac3cecb52d8cadc17d17200221fc76c4
SHA1b2d754e73f3fa7f54cb4669b0d3976ef54d6567f
SHA2565ed23e2b1f26ce9e5df4524119ab77a3a6fd445b276b7328840d45faa8bffd9d
SHA512dd7bd61fd8a8d389ffd1030ddd63dc5b51184aa7d0bda2e7ee76140bfa8c3a4a9ee7d0014461fa008592e0613136cbac5418e3c691b64e1d73f7c62f1855e1c3
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\Users\Admin\AppData\Local\Temp\3582-490\a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe
Filesize2.3MB
MD51c098b289611a95a1a84a77afe64620e
SHA13a13fea5daf0f6e9bc6932dfba6582c5420b8be5
SHA256641d91c2036584022ff85c76450b367b7031dd2fc845a507c7b5948eeb2696fc
SHA51280882b3ff1b4e2e65d7a2c7ace82708065d07820b5a30f845b5aebe9bc7ef6ea2461eef3b05858a115f7f36ea9121d6134ad99e25447e2b8e2c9dfa29f433dd7
-
\Users\Admin\AppData\Local\Temp\jds259441752.tmp\a8ac338ad84e6c3dfee4dde0ed049a9f451446eee55cc68a0443d7577224e484N.exe
Filesize1.9MB
MD55fa91f525da5564ac9b1ab6462de47dc
SHA17a780289f3ea3ea6ab82f4e7d6f8642f4e2fe97a
SHA25660e616a1676abc59b68c63ef64ac39cd66895ea52a858145af381be870f3a491
SHA512884af87cd6208aa3155423bb5f5d2b92ea1b3a6b50fc26ca76aaa7f069e4c2794c03fa87079de25e332a0a9ea4198760b0dd4384ec8787c44f360a275a7d3490