Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 09:53
Static task
static1
Behavioral task
behavioral1
Sample
ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe
Resource
win7-20240903-en
General
-
Target
ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe
-
Size
1.8MB
-
MD5
1ea9d91847f9f3bb581c6952315c6c6c
-
SHA1
729679ec3696c9be635158aa6741623f7ba47233
-
SHA256
ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8
-
SHA512
995b7238500949ff5537e6aa2bb02b9a856e8145be162a4124b961879c8a6004a63c152687d5826428cc76e4aeba8db48a3e97a614b6cfdae675fa7a41a3d679
-
SSDEEP
49152:6Nc4Q4Du7Y5SGb/hFs7COZ0IfY4Q021LevvJL0S:ZYEGDHOZ0IA4D2lcv50
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
default_valenciga
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://drive-connect.cyou/api
https://crib-endanger.sbs/api
https://faintbl0w.sbs/api
https://300snails.sbs/api
https://bored-light.sbs/api
https://3xc1aimbl0w.sbs/api
https://pull-trucker.sbs/api
https://fleez-inc.sbs/api
https://thicktoys.sbs/api
Extracted
lumma
https://drive-connect.cyou/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7cd0b6caf3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 7cd0b6caf3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7cd0b6caf3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7cd0b6caf3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7cd0b6caf3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7cd0b6caf3.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fa302dbf50.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v_dolg.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fda39fd11a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7cd0b6caf3.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fda39fd11a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fda39fd11a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fa302dbf50.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fa302dbf50.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v_dolg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v_dolg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7cd0b6caf3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7cd0b6caf3.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs Qtdedcpuf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs Ixpla.exe -
Executes dropped EXE 21 IoCs
pid Process 2712 axplong.exe 1288 stealc_default2.exe 2604 alexshlu.exe 1664 alexshlu.exe 2356 fa302dbf50.exe 1680 AllNew.exe 1524 Gxtuum.exe 1616 am209.exe 1960 defnur.exe 680 v_dolg.exe 2836 stail.exe 2368 stail.tmp 916 videominimizer.exe 2052 chrome11.exe 2860 l4.exe 2212 l4.exe 1460 Qtdedcpuf.exe 1864 Ixpla.exe 1964 networkmanager.exe 2324 fda39fd11a.exe 4076 7cd0b6caf3.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine fda39fd11a.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 7cd0b6caf3.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine fa302dbf50.exe -
Loads dropped DLL 45 IoCs
pid Process 2440 ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe 2440 ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe 2712 axplong.exe 2712 axplong.exe 2712 axplong.exe 2712 axplong.exe 2604 alexshlu.exe 2712 axplong.exe 2712 axplong.exe 2712 axplong.exe 1680 AllNew.exe 2712 axplong.exe 1616 am209.exe 1288 stealc_default2.exe 1288 stealc_default2.exe 2712 axplong.exe 1524 Gxtuum.exe 2836 stail.exe 2368 stail.tmp 2368 stail.tmp 2368 stail.tmp 2368 stail.tmp 916 videominimizer.exe 2712 axplong.exe 2712 axplong.exe 2860 l4.exe 2212 l4.exe 2712 axplong.exe 2712 axplong.exe 2712 axplong.exe 2712 axplong.exe 2712 axplong.exe 2712 axplong.exe 2712 axplong.exe 2712 axplong.exe 1544 WerFault.exe 1544 WerFault.exe 1544 WerFault.exe 1544 WerFault.exe 1544 WerFault.exe 316 WerFault.exe 316 WerFault.exe 316 WerFault.exe 316 WerFault.exe 316 WerFault.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7cd0b6caf3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 7cd0b6caf3.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\fda39fd11a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006192001\\fda39fd11a.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7cd0b6caf3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006193001\\7cd0b6caf3.exe" axplong.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA v_dolg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2440 ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe 2712 axplong.exe 2356 fa302dbf50.exe 680 v_dolg.exe 2324 fda39fd11a.exe 4076 7cd0b6caf3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2604 set thread context of 1664 2604 alexshlu.exe 36 -
resource yara_rule behavioral1/files/0x000700000001a509-2835.dat upx behavioral1/memory/2712-2841-0x0000000006B90000-0x000000000730B000-memory.dmp upx behavioral1/memory/1964-2846-0x00000000000C0000-0x000000000083B000-memory.dmp upx behavioral1/memory/1964-2848-0x00000000000C0000-0x000000000083B000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Application\chrome.exe chrome11.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe chrome11.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe File created C:\Windows\Tasks\Gxtuum.job AllNew.exe File created C:\Windows\Tasks\defnur.job am209.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1544 1460 WerFault.exe 58 316 1864 WerFault.exe 60 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ixpla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language am209.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language videominimizer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fda39fd11a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alexshlu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alexshlu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa302dbf50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stail.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AllNew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defnur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v_dolg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qtdedcpuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cd0b6caf3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default2.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 fa302dbf50.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 fa302dbf50.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25040000000100000010000000d474de575c39b2d39c8583c5c065498a2000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a fa302dbf50.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\SystemCertificates\Root\Certificates\EB1E7D77F4977FB71F1C41C2D931C4FFD2D3BF9D v_dolg.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\SystemCertificates\Root\Certificates\EB1E7D77F4977FB71F1C41C2D931C4FFD2D3BF9D\Blob = 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 v_dolg.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\SystemCertificates\Root\Certificates\EB1E7D77F4977FB71F1C41C2D931C4FFD2D3BF9D\Blob = 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 v_dolg.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\SystemCertificates\Root\Certificates\EB1E7D77F4977FB71F1C41C2D931C4FFD2D3BF9D\Blob = 190000000100000010000000be5879dc0e17d6088b2d663eaa4373000f0000000100000020000000c1e9312072f33e52cf865a523ff35f97645e830c39b9c4366e7f086afa9d95cf030000000100000014000000eb1e7d77f4977fb71f1c41c2d931c4ffd2d3bf9d0200000001000000cc0000001c0000006c000000010000000000000000000000000000000100000043004e003d0054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f007200690074007900000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e003000000000000b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f007200690074007900000014000000010000001400000048400de9a7f26874640f894594a0ddd9c0754ab220000000010000000a03000030820306308201eea00302010202087e74344bf0d2f65c300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233313231323039353432375a170d3237303331373039353432375a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a0282010100d3aca39ea8f10b1db21c33e4a3b9a0b5a6abcd518e3108262ec689be7a85867e29e43256c451effad5bb011fb69d6c837a427897978850c00139a024c16ebf500a510c98a589b54abcd08cbdd6c4cd98bcef46135f7a2155e562aa8e99502fb6f55b03e93d4e7615bcd0b0f7159f5f3969a9d4e5d9e9b08085eb98ee6a322f8c7fab44ae3324eff961d0af9c8cc6d6fec817e5c5479554fc4228c547a34fd75cabf50bf4f02ac28f3f4b8be020a4ea3a2a779f70422838ce7f911262aef5ae60943aa18400eddfc6655060172f2194926c493cf669edf84b7b0738ef033296a0a654b28f878c6cc04314c19938586a4b8643810adaa1133f66445315b9d97dbd0203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b05000382010100a6a700a8033cc3e36e0440cd5001be20f1a1dbaea42692f4615a6e3ed7362742c867134e1e136d4cfbdb88b616676ea995bf135cbcd5355399edff52e0b0690ca5f8d220b23b9aaf93058146a2f33b553bb7a35062148c9c043d86d091ae9148ce4598202ff3a2f6653662d39c3e3ca31292f1529240b8f9dfb9b6eba5be0668c04bba834a07660bd5cf4e7d8da4eb67114fc500c92e86e6a406ad7014f93a02b257576317409c0996afef41d399dfe3815f7923b4c384608374645b21d1bbe9617ffbc096c7cd6092de5272977db139092581d20435e9d058b212e41ed6facf088d5c3545e54e7245c810fdf979b8fd8c3a8cef9f7f0108ca72d2739ff4fcf5 v_dolg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 fa302dbf50.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2440 ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe 2712 axplong.exe 1288 stealc_default2.exe 2356 fa302dbf50.exe 1288 stealc_default2.exe 680 v_dolg.exe 2368 stail.tmp 2368 stail.tmp 2052 chrome11.exe 2324 fda39fd11a.exe 4076 7cd0b6caf3.exe 4076 7cd0b6caf3.exe 4076 7cd0b6caf3.exe 1460 Qtdedcpuf.exe 1864 Ixpla.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2052 chrome11.exe Token: SeDebugPrivilege 1460 Qtdedcpuf.exe Token: SeDebugPrivilege 1864 Ixpla.exe Token: SeDebugPrivilege 4076 7cd0b6caf3.exe Token: SeDebugPrivilege 1460 Qtdedcpuf.exe Token: SeDebugPrivilege 1864 Ixpla.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2440 ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe 1680 AllNew.exe 1616 am209.exe 2368 stail.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2712 2440 ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe 30 PID 2440 wrote to memory of 2712 2440 ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe 30 PID 2440 wrote to memory of 2712 2440 ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe 30 PID 2440 wrote to memory of 2712 2440 ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe 30 PID 2712 wrote to memory of 1288 2712 axplong.exe 33 PID 2712 wrote to memory of 1288 2712 axplong.exe 33 PID 2712 wrote to memory of 1288 2712 axplong.exe 33 PID 2712 wrote to memory of 1288 2712 axplong.exe 33 PID 2712 wrote to memory of 2604 2712 axplong.exe 34 PID 2712 wrote to memory of 2604 2712 axplong.exe 34 PID 2712 wrote to memory of 2604 2712 axplong.exe 34 PID 2712 wrote to memory of 2604 2712 axplong.exe 34 PID 2604 wrote to memory of 1664 2604 alexshlu.exe 36 PID 2604 wrote to memory of 1664 2604 alexshlu.exe 36 PID 2604 wrote to memory of 1664 2604 alexshlu.exe 36 PID 2604 wrote to memory of 1664 2604 alexshlu.exe 36 PID 2604 wrote to memory of 1664 2604 alexshlu.exe 36 PID 2604 wrote to memory of 1664 2604 alexshlu.exe 36 PID 2604 wrote to memory of 1664 2604 alexshlu.exe 36 PID 2604 wrote to memory of 1664 2604 alexshlu.exe 36 PID 2604 wrote to memory of 1664 2604 alexshlu.exe 36 PID 2604 wrote to memory of 1664 2604 alexshlu.exe 36 PID 2604 wrote to memory of 1664 2604 alexshlu.exe 36 PID 2712 wrote to memory of 2356 2712 axplong.exe 37 PID 2712 wrote to memory of 2356 2712 axplong.exe 37 PID 2712 wrote to memory of 2356 2712 axplong.exe 37 PID 2712 wrote to memory of 2356 2712 axplong.exe 37 PID 2712 wrote to memory of 1680 2712 axplong.exe 38 PID 2712 wrote to memory of 1680 2712 axplong.exe 38 PID 2712 wrote to memory of 1680 2712 axplong.exe 38 PID 2712 wrote to memory of 1680 2712 axplong.exe 38 PID 1680 wrote to memory of 1524 1680 AllNew.exe 39 PID 1680 wrote to memory of 1524 1680 AllNew.exe 39 PID 1680 wrote to memory of 1524 1680 AllNew.exe 39 PID 1680 wrote to memory of 1524 1680 AllNew.exe 39 PID 2712 wrote to memory of 1616 2712 axplong.exe 40 PID 2712 wrote to memory of 1616 2712 axplong.exe 40 PID 2712 wrote to memory of 1616 2712 axplong.exe 40 PID 2712 wrote to memory of 1616 2712 axplong.exe 40 PID 1616 wrote to memory of 1960 1616 am209.exe 41 PID 1616 wrote to memory of 1960 1616 am209.exe 41 PID 1616 wrote to memory of 1960 1616 am209.exe 41 PID 1616 wrote to memory of 1960 1616 am209.exe 41 PID 2712 wrote to memory of 680 2712 axplong.exe 43 PID 2712 wrote to memory of 680 2712 axplong.exe 43 PID 2712 wrote to memory of 680 2712 axplong.exe 43 PID 2712 wrote to memory of 680 2712 axplong.exe 43 PID 1524 wrote to memory of 2836 1524 Gxtuum.exe 44 PID 1524 wrote to memory of 2836 1524 Gxtuum.exe 44 PID 1524 wrote to memory of 2836 1524 Gxtuum.exe 44 PID 1524 wrote to memory of 2836 1524 Gxtuum.exe 44 PID 1524 wrote to memory of 2836 1524 Gxtuum.exe 44 PID 1524 wrote to memory of 2836 1524 Gxtuum.exe 44 PID 1524 wrote to memory of 2836 1524 Gxtuum.exe 44 PID 2836 wrote to memory of 2368 2836 stail.exe 45 PID 2836 wrote to memory of 2368 2836 stail.exe 45 PID 2836 wrote to memory of 2368 2836 stail.exe 45 PID 2836 wrote to memory of 2368 2836 stail.exe 45 PID 2836 wrote to memory of 2368 2836 stail.exe 45 PID 2836 wrote to memory of 2368 2836 stail.exe 45 PID 2836 wrote to memory of 2368 2836 stail.exe 45 PID 2368 wrote to memory of 1612 2368 stail.tmp 46 PID 2368 wrote to memory of 1612 2368 stail.tmp 46 PID 2368 wrote to memory of 1612 2368 stail.tmp 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe"C:\Users\Admin\AppData\Local\Temp\ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1288
-
-
C:\Users\Admin\AppData\Local\Temp\1001527001\alexshlu.exe"C:\Users\Admin\AppData\Local\Temp\1001527001\alexshlu.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\1001527001\alexshlu.exe"C:\Users\Admin\AppData\Local\Temp\1001527001\alexshlu.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1664
-
-
-
C:\Users\Admin\AppData\Local\Temp\1002824001\fa302dbf50.exe"C:\Users\Admin\AppData\Local\Temp\1002824001\fa302dbf50.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\10000361101\stail.exe"C:\Users\Admin\AppData\Local\Temp\10000361101\stail.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\is-SHSSP.tmp\stail.tmp"C:\Users\Admin\AppData\Local\Temp\is-SHSSP.tmp\stail.tmp" /SL5="$B01D0,3664531,54272,C:\Users\Admin\AppData\Local\Temp\10000361101\stail.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause video-minimizer_121227⤵
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause video-minimizer_121228⤵
- System Location Discovery: System Language Discovery
PID:2072
-
-
-
C:\Users\Admin\AppData\Local\Video Minimizer 2.31\videominimizer.exe"C:\Users\Admin\AppData\Local\Video Minimizer 2.31\videominimizer.exe" -i7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:916
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe"C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1960
-
-
-
C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe"C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:680
-
-
C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe"C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2052 -
C:\Windows\System32\certutil.exe"C:\Windows\System32\certutil.exe" -silent -importPFX -p "" -f "C:\Users\Admin\AppData\Local\Temp\tmp2FC9.tmp"4⤵PID:1620
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe"C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\onefile_2860_133784708730232000\l4.exeC:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2212
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 6324⤵
- Loads dropped DLL
- Program crash
PID:1544
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 6324⤵
- Loads dropped DLL
- Program crash
PID:316
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe"C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe"3⤵
- Executes dropped EXE
PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\1006192001\fda39fd11a.exe"C:\Users\Admin\AppData\Local\Temp\1006192001\fda39fd11a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\1006193001\7cd0b6caf3.exe"C:\Users\Admin\AppData\Local\Temp\1006193001\7cd0b6caf3.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD505574162f8903085a1bf8093b0716157
SHA11babb85c7f120c92eb692cc401621db79d6ec420
SHA25647531a0f2ae741c56b37899e4ea504cce24e8daa41876f37897f79d11858ba05
SHA512a2bc8618fcd60d7dadbedc47beb4e93d5af8a095b42f63d950f004fd3b43a209fde7771cd40de3f9b182517b05f734472e665dc22a291c0b0c43a1fc9ccd2931
-
Filesize
307KB
MD568a99cf42959dc6406af26e91d39f523
SHA1f11db933a83400136dc992820f485e0b73f1b933
SHA256c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3
SHA5127342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75
-
Filesize
809KB
MD59821fa45714f3b4538cc017320f6f7e5
SHA15bf0752889cefd64dab0317067d5e593ba32e507
SHA256fd9343a395c034e519aea60471c518edbd8cf1b8a236ec924acf06348e6d3a72
SHA51290afec395115d932ea272b11daa3245769bdcc9421ecd418722830259a64df19ed7eacca38000f6a846db9f4363817f13232032ab30f2ab1aa7e88097361d898
-
Filesize
2.8MB
MD56a3268db51b26c41418351e516bc33a6
SHA157a12903fff8cd7ea5aa3a2d2308c910ac455428
SHA256eaebfc5e60378bbc47a603ca1310440c290a396cb2446de36ff6e7afb624ee0c
SHA51243f257dbb7e444355e29a8023e8c8838c9e0ca7538a86c25ac41db1e0308bf73c3adda1b0fe5d0bcf536387b9ce5f8fed216f5f7d92c80bcc12e7bffde979b33
-
Filesize
429KB
MD5c07e06e76de584bcddd59073a4161dbb
SHA108954ac6f6cf51fd5d9d034060a9ae25a8448971
SHA256cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9
SHA512e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f
-
Filesize
429KB
MD5ce27255f0ef33ce6304e54d171e6547c
SHA1e594c6743d869c852bf7a09e7fe8103b25949b6e
SHA25682c683a7f6e0b4a99a6d3ab519d539a3b0651953c7a71f5309b9d08e4daa7c3c
SHA51296cfafbab9138517532621d0b5f3d4a529806cfdf6191c589e6fb6ebf471e9df0777fb74e9abbfe4e8cd8821944ad02b1f09775195e190ee8ca5d3fd151d20d9
-
Filesize
3.6MB
MD5378706614b22957208e09fc84fceece8
SHA1d35e1f89f36aed26553b665f791cd69d82136fb8
SHA256df6e6d5bead4aa34f8e0dd325400a5829265b0f615cd1da48d155cc30b89ad6d
SHA512bef7a09ce1ffd0a0b169a6ec7c143ca322c929139ca0af40353502ae22fed455fe10a9b80ba93cc399a88add94f921b7aa801033ddae351f8f8d477781ca476e
-
Filesize
4.5MB
MD55b39766f490f17925defaee5de2f9861
SHA19c89f2951c255117eb3eebcd61dbecf019a4c186
SHA256de615656d7f80b5e01bc6a604a780245ca0ccefd920a6e2f1439bf27c02b7b7a
SHA512d216fa45c98e423f15c2b52f980fc1c439d365b9799e5063e6b09837b419d197ba68d52ea7facf469eae38e531f17bd19eaf25d170465dc41217ca6ab9eb30bf
-
Filesize
5.9MB
MD5d68f79c459ee4ae03b76fa5ba151a41f
SHA1bfa641085d59d58993ba98ac9ee376f898ee5f7b
SHA256aa50c900e210abb6be7d2420d9d5ae34c66818e0491aabd141421d175211fed6
SHA512bd4ef3e3708df81d53b2e9050447032e8dcdcc776cf0353077310f208a30dab8f31d6ec6769d47fb6c05c642bdd7a58fb4f93d9d28e2de0efc01312fbc5e391e
-
Filesize
1.4MB
MD5338cbbffa6028ee1a0beb3e7e6c4abd9
SHA1bd008e415d2d85a124d33d455a2e2b0a0312be39
SHA2561af9406ad522df70d8b59054cbdbef1a267fe199ab0ec1369523cdce9884bea6
SHA512a8bb96d8ab47a3f57d5f1fc48c61392e9b28b379517cd12a468044d42a7ecdf9c099244d94784ff2411b358ea2272f8069a2fee2ea952b693ee460de0f689215
-
Filesize
1.4MB
MD56e7ffd057086e44e4fcc01846cd2b152
SHA105712e7e7b8429b2dd201ea504dc32fefe5795da
SHA256fbc587e990949e428e8ce7a2c74dbf85cd63ffa07370756ad854595fea0033d7
SHA5128cab1824b32c54273658d28738109c8a1ef3170c1fbe02deeee40d40990acb6d45431bfb65a3facebee9a919bd972734012b1e8de035b9c1329f1bd0e709ecd2
-
Filesize
2.1MB
MD5f8d528a37993ed91d2496bab9fc734d3
SHA14b66b225298f776e21f566b758f3897d20b23cad
SHA256bc8458a8d78cf91129c84b153aafe8319410aacb8e14aec506897c8e0793ba02
SHA51275dc1bbb1388f68d121bab26fc7f6bf9dc1226417ad7ed4a7b9718999aa0f9c891fed0db3c9ea6d6ccb34288cc848dc44b20ea83a30afd4ea2e99cff51f30f5a
-
Filesize
1.7MB
MD56731bd7e893f440a5f73edfd40b73112
SHA18e396ca101830e0116881c8d8c81c6d5e7918afe
SHA256599399619509681016345f5e4e50f6edd38a70496201d1a9fbfe5c53d7f4690b
SHA512d0247ad0a1392a9b622d08e22feee7d79854c8f1492f0b4d5d5e669f7efce409e3a3961f8229ebb40aca97ed6e36066b40393b3e9cb78d7356d34d530c125110
-
Filesize
2.7MB
MD59aa3e28acbd0b5a2e045a6d513c93b6b
SHA19381e49745b0e1c2fab053f8d4d2a59bc61988f1
SHA2562f1568be0dd8f9a154b003441a09464578fc012d81f60faab98f8ba9c1913898
SHA512994aacaaafb7a60400aa05ad2524eac325b50b46109a75a71e2907e0dc08b5147ad7f63d308c72b92dc70d232335134815b461b00c18c722a365e6e0f8491471
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2KB
MD552908d07fbfda0b08326dd585b3e62ec
SHA17a505b3083c4e3548651734c0a45297d6858e255
SHA2567bb6b8502facffd66526092f97d300c30548ee2954afe273048e2dee0050b2bf
SHA512c4ba38b3c7a228bf52c496fd81c0f135646a8c57ca6a9e933ac9f685ae1e24d8283f6705ba7a04b760fe946386f9044b37880ee4e359b249affbb05e22e2c4ef
-
Filesize
689KB
MD574915f4aba366d52c6053ca60f017b58
SHA1dee65173bf70cc66b1f7e8a360077274803b76e2
SHA256f6cbdf7e04dd6e42a464bf0e1794374fb5a5c6740e19353eefae2e0705bd255a
SHA512b56743e7322f824eb03b432504a2ab0e005b271cc56b1bee53afd9d98050e13cf695b53969d800533eed1fbb9deda8e8b580d1eaf34d47b2c08962bba2282185
-
Filesize
5.9MB
MD563c4e3f9c7383d039ab4af449372c17f
SHA1f52ff760a098a006c41269ff73abb633b811f18e
SHA256151524f6c1d1aeac530cfd69de15c3336043dc8eb3f5aeaa31513e24bfd7acdd
SHA512dcfb4804c5569ad13e752270d13320f8769601b7092544741e35bc62a22af363b7a5ea7c5a65132c9575540a3e689a6946110502bd0f046385b8739e81761fbf
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
3.4MB
MD58b3e6dae10a8df6749671e2edd7293ef
SHA1384a330c084651c5e400e1edb47491665681f9c9
SHA2568f9bdb0ad286fc79d8d82aa2e0e133352cd0723243f7f6c390c85303dba16516
SHA5122738a21783ea867e8fc6fa9aed4e753ac0040878b0748333a58dcbe3ca725c5b179ce8fd8f6083e4ea3bae71f1fbaac9290060e6bbeb539a4a8401725e8ee6f5
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\EB1E7D77F4977FB71F1C41C2D931C4FFD2D3BF9D
Filesize1KB
MD5961884af1d420a6b42f677fa3f8b6071
SHA1d2b31b504eeb872a422e2e8c2b244253c167383c
SHA25641af3af531e3467c1e9fc49234d29dbf0aee7dd962c75e676c16a964f6741abe
SHA51283989eda631ed84e79a8e5f0f534376b0816ee23a81535cd7d321205e6be086251f867d3906a89ad619334e19dfa3ecf03bc3f6194ab11bb28c089688a7b401c
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.8MB
MD51ea9d91847f9f3bb581c6952315c6c6c
SHA1729679ec3696c9be635158aa6741623f7ba47233
SHA256ef2e18b8b4a8248113a78f0761f5ccb14f80c607843acc90a5e0ffcc86b376b8
SHA512995b7238500949ff5537e6aa2bb02b9a856e8145be162a4124b961879c8a6004a63c152687d5826428cc76e4aeba8db48a3e97a614b6cfdae675fa7a41a3d679
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb