Analysis
-
max time kernel
27s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 02:58
Static task
static1
Behavioral task
behavioral1
Sample
b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe
Resource
win7-20240903-en
General
-
Target
b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe
-
Size
2.9MB
-
MD5
9d38889192a887e1128ec41dd417fb6d
-
SHA1
bf6b8a7c9ea4519ee2b4233375b9cf2cc9c7840b
-
SHA256
b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963
-
SHA512
d4e8aee2c1318e34537d0803f137282b5e9ec58b9a8113e38e8576f0808066f5a690149ea97f720d02642645e85edeba5c1dc482e6d730da25cb99caf604c8e3
-
SSDEEP
49152:l9PJuLnwLwJL6OBkiP4hpzl9h+q+GJNXu:l9PILnwLwJL6OBMRvdN
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
xworm
xclient.fahrerscheinonlineholen.de:2489
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
telegram
https://api.telegram.org/bot8174428401:AAHxlGtOg4tsy0J0kYm7h8822BuHfnk8vKQ/sendMessage?chat_id=1434988227
Extracted
lumma
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
hgzuiajogwnqs
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/dDuwSpUA
Signatures
-
Amadey family
-
Asyncrat family
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000016d6d-27.dat family_xworm behavioral1/memory/1728-36-0x0000000000AF0000-0x0000000000B0C000-memory.dmp family_xworm behavioral1/memory/1728-137-0x000000001A820000-0x000000001A83C000-memory.dmp family_xworm -
Lumma family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1728-135-0x0000000002230000-0x0000000002248000-memory.dmp family_asyncrat -
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 1b9de42531.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9fa6c4bda9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1b9de42531.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 844 powershell.exe 2772 powershell.exe 2572 powershell.exe 2144 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1b9de42531.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9fa6c4bda9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9fa6c4bda9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1b9de42531.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk vQeyqr1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk vQeyqr1.exe -
Executes dropped EXE 5 IoCs
pid Process 2792 skotes.exe 1728 vQeyqr1.exe 904 9fa6c4bda9.exe 1956 c2f1c4d35d.exe 2056 1b9de42531.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 1b9de42531.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 9fa6c4bda9.exe -
Loads dropped DLL 8 IoCs
pid Process 2100 b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe 2792 skotes.exe 2792 skotes.exe 2792 skotes.exe 2792 skotes.exe 2792 skotes.exe 2792 skotes.exe 2792 skotes.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" vQeyqr1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 35 pastebin.com 36 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2100 b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe 2792 skotes.exe 904 9fa6c4bda9.exe 2056 1b9de42531.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fa6c4bda9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b9de42531.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 vQeyqr1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a vQeyqr1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 vQeyqr1.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2260 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1728 vQeyqr1.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2100 b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe 2792 skotes.exe 844 powershell.exe 2772 powershell.exe 2572 powershell.exe 2144 powershell.exe 904 9fa6c4bda9.exe 1728 vQeyqr1.exe 2056 1b9de42531.exe 2056 1b9de42531.exe 2056 1b9de42531.exe 2056 1b9de42531.exe 2056 1b9de42531.exe 2056 1b9de42531.exe 1728 vQeyqr1.exe 1728 vQeyqr1.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1728 vQeyqr1.exe Token: SeDebugPrivilege 844 powershell.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2144 powershell.exe Token: SeDebugPrivilege 1728 vQeyqr1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1728 vQeyqr1.exe 1728 vQeyqr1.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2792 2100 b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe 31 PID 2100 wrote to memory of 2792 2100 b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe 31 PID 2100 wrote to memory of 2792 2100 b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe 31 PID 2100 wrote to memory of 2792 2100 b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe 31 PID 2792 wrote to memory of 1728 2792 skotes.exe 33 PID 2792 wrote to memory of 1728 2792 skotes.exe 33 PID 2792 wrote to memory of 1728 2792 skotes.exe 33 PID 2792 wrote to memory of 1728 2792 skotes.exe 33 PID 1728 wrote to memory of 844 1728 vQeyqr1.exe 35 PID 1728 wrote to memory of 844 1728 vQeyqr1.exe 35 PID 1728 wrote to memory of 844 1728 vQeyqr1.exe 35 PID 1728 wrote to memory of 2772 1728 vQeyqr1.exe 37 PID 1728 wrote to memory of 2772 1728 vQeyqr1.exe 37 PID 1728 wrote to memory of 2772 1728 vQeyqr1.exe 37 PID 1728 wrote to memory of 2572 1728 vQeyqr1.exe 39 PID 1728 wrote to memory of 2572 1728 vQeyqr1.exe 39 PID 1728 wrote to memory of 2572 1728 vQeyqr1.exe 39 PID 1728 wrote to memory of 2144 1728 vQeyqr1.exe 41 PID 1728 wrote to memory of 2144 1728 vQeyqr1.exe 41 PID 1728 wrote to memory of 2144 1728 vQeyqr1.exe 41 PID 2792 wrote to memory of 904 2792 skotes.exe 43 PID 2792 wrote to memory of 904 2792 skotes.exe 43 PID 2792 wrote to memory of 904 2792 skotes.exe 43 PID 2792 wrote to memory of 904 2792 skotes.exe 43 PID 1728 wrote to memory of 2260 1728 vQeyqr1.exe 44 PID 1728 wrote to memory of 2260 1728 vQeyqr1.exe 44 PID 1728 wrote to memory of 2260 1728 vQeyqr1.exe 44 PID 2792 wrote to memory of 1956 2792 skotes.exe 46 PID 2792 wrote to memory of 1956 2792 skotes.exe 46 PID 2792 wrote to memory of 1956 2792 skotes.exe 46 PID 2792 wrote to memory of 1956 2792 skotes.exe 46 PID 2792 wrote to memory of 2056 2792 skotes.exe 48 PID 2792 wrote to memory of 2056 2792 skotes.exe 48 PID 2792 wrote to memory of 2056 2792 skotes.exe 48 PID 2792 wrote to memory of 2056 2792 skotes.exe 48 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe"C:\Users\Admin\AppData\Local\Temp\b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe"C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'vQeyqr1.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2260
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019050001\9fa6c4bda9.exe"C:\Users\Admin\AppData\Local\Temp\1019050001\9fa6c4bda9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\1019051001\c2f1c4d35d.exe"C:\Users\Admin\AppData\Local\Temp\1019051001\c2f1c4d35d.exe"3⤵
- Executes dropped EXE
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\1019052001\1b9de42531.exe"C:\Users\Admin\AppData\Local\Temp\1019052001\1b9de42531.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD507e410214a2aeb8f577e407154252f3c
SHA1697fac558b66c0476c3f04d80764fa75eb6de77d
SHA25612e340e551abbf8a61a6dd73d45c94e88aa217ceae070ba0748360d24c706114
SHA512470b208122d6177e4635038418e4966a63725c7f9b21b4d41f3c89b953bae9a23e141424b358110de3a8d1624c125224a7471bb44ef7039c313d03e844a20ecc
-
Filesize
612B
MD5e3eb0a1df437f3f97a64aca5952c8ea0
SHA17dd71afcfb14e105e80b0c0d7fce370a28a41f0a
SHA25638ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
SHA51243573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
-
Filesize
1.8MB
MD527c1f96d7e1b72b6817b6efeff037f90
SHA12972cc112fc7e20cbf5952abe07407b8c1fbb2a2
SHA256aec3ec473de321d123e939985579227ee62b53b3b3edb7ab96e2a66c17e9696d
SHA5129a31dc9945889d35aea8710df2f42806c72c422b7b5f4aa8acba6986cbd9ea6a49181a41a50ee21ccbed86cbff87c98a742e681ac3f6a87e2bd4436c9112eb32
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
4.2MB
MD5a1a76771507e4a627eccb41e1663aa47
SHA11bb24963526fb70dcbd724dcbe1ba54d22e7eab8
SHA256c0193a45321ed0251587b1b5c5631f3149f97eeef4a64cf0ba6b506d7aec8e6b
SHA5129fa92583862528cbc937f9643cb077b731394121dfa180e2b57a9655e84a377288b3f3d97d2ef1b85657ea2872e5424ed2c42488be0f85dfbe20945b9e94849d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5df79180318fac48545778ef22e1f4b87
SHA175f9ba00d7d6c07d08f5d4de1e144f4e0daff40a
SHA25684a9252ce9e24a4cdb64ef46e329135a9cbc6b6afa615d0a40450f4dbcc3d4d0
SHA5121caff72633248cf7e48445c9ef57f182bc3685925fdabbd6fe5c7cf7b098554db2260865f6b82b1cfc8a10d0d44ea4b701dc3dd55ea11c8e9133fefa596858c6
-
Filesize
2.9MB
MD59d38889192a887e1128ec41dd417fb6d
SHA1bf6b8a7c9ea4519ee2b4233375b9cf2cc9c7840b
SHA256b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963
SHA512d4e8aee2c1318e34537d0803f137282b5e9ec58b9a8113e38e8576f0808066f5a690149ea97f720d02642645e85edeba5c1dc482e6d730da25cb99caf604c8e3