Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    89s
  • max time network
    107s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    23/04/2023, 05:14

General

  • Target

    AutoClicker-3.0.exe

  • Size

    844KB

  • MD5

    7ecfc8cd7455dd9998f7dad88f2a8a9d

  • SHA1

    1751d9389adb1e7187afa4938a3559e58739dce6

  • SHA256

    2e67d5e7d96aec62a9dda4c0259167a44908af863c2b3af2a019723205abba9e

  • SHA512

    cb05e82b17c0f7444d1259b661f0c1e6603d8a959da7475f35078a851d528c630366916c17a37db1a2490af66e5346309177c9e31921d09e7e795492868e678d

  • SSDEEP

    12288:GaWzgMg7v3qnCiWErQohh0F49CJ8lnybQg9BFg9UmTRHlM:BaHMv6CGrjBnybQg+mmhG

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 46 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 44 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AutoClicker-3.0.exe
    "C:\Users\Admin\AppData\Local\Temp\AutoClicker-3.0.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2040
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef73f9758,0x7fef73f9768,0x7fef73f9778
      2⤵
        PID:1836
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1196 --field-trial-handle=1224,i,14376819815862719494,6997339233020808990,131072 /prefetch:2
        2⤵
          PID:1572
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1224,i,14376819815862719494,6997339233020808990,131072 /prefetch:8
          2⤵
            PID:996
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1224,i,14376819815862719494,6997339233020808990,131072 /prefetch:8
            2⤵
              PID:1188
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2200 --field-trial-handle=1224,i,14376819815862719494,6997339233020808990,131072 /prefetch:1
              2⤵
                PID:928
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2160 --field-trial-handle=1224,i,14376819815862719494,6997339233020808990,131072 /prefetch:1
                2⤵
                  PID:1932
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1368 --field-trial-handle=1224,i,14376819815862719494,6997339233020808990,131072 /prefetch:2
                  2⤵
                    PID:812
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3800 --field-trial-handle=1224,i,14376819815862719494,6997339233020808990,131072 /prefetch:1
                    2⤵
                      PID:2156
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3896 --field-trial-handle=1224,i,14376819815862719494,6997339233020808990,131072 /prefetch:8
                      2⤵
                        PID:2184
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4028 --field-trial-handle=1224,i,14376819815862719494,6997339233020808990,131072 /prefetch:8
                        2⤵
                          PID:2224
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:1676
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\UseHide.xht
                          1⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          PID:2760
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:2
                            2⤵
                            • Modifies Internet Explorer settings
                            • Suspicious use of SetWindowsHookEx
                            PID:2380
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\UseHide.xht
                          1⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          PID:2772
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:2
                            2⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:2464
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\UseHide.xht
                          1⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          PID:2784
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
                            2⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:2364
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\UseHide.xht
                          1⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          PID:2804
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:2
                            2⤵
                            • Modifies Internet Explorer settings
                            • Suspicious use of SetWindowsHookEx
                            PID:2344
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\UseHide.xht
                          1⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          PID:2896
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:2
                            2⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:2604
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\UseHide.xht
                          1⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          PID:2952
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:275457 /prefetch:2
                            2⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:2372
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\UseHide.xht
                          1⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          PID:2992
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:2
                            2⤵
                            • Modifies Internet Explorer settings
                            • Suspicious use of SetWindowsHookEx
                            PID:2632
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\UseHide.xht
                          1⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          PID:2976
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:2
                            2⤵
                            • Modifies Internet Explorer settings
                            • Suspicious use of SetWindowsHookEx
                            PID:2648
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\UseHide.xht
                          1⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          PID:436
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:436 CREDAT:275457 /prefetch:2
                            2⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:1692
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\UseHide.xht
                          1⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          PID:2092
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:2
                            2⤵
                            • Modifies Internet Explorer settings
                            • Suspicious use of SetWindowsHookEx
                            PID:516
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\UseHide.xht
                          1⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          PID:2208
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:2
                            2⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:2088

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          12f06941d8bb3548edc73f63976780cc

                          SHA1

                          1cbb4b3144b450cb2e990305e85aa470dcfaa1d9

                          SHA256

                          94a0602a28722fc93d401dd57a2de166b5674e9b007ca304c0159f76c58f2c1d

                          SHA512

                          46a4ef2231530faa02d98683395660d6e59bedf0e0cb489b7134b7a9293d27eb9bf38f423affc5f2cb9a07fed9003465f628ef00bfb05c46776f977551465b4e

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          f9330e2774de328395f009436247caf9

                          SHA1

                          e4ab9ec87b9e48b9030a6de36cfac813932ce1ec

                          SHA256

                          c7439da8f6565f7be2b406176f7ca62be2056eb1369f2adf6e6ed8d313f051be

                          SHA512

                          d5dd3b378d01e9c27329b6598629f5c8b26c16292a4ef499f0748d7542f290176eda778f86de3be3bd9cb59089d2e3936723e3347437d668d5cf8c8a1b2a2951

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          0642999d6c89f1c97ae00ac4b5b3aaae

                          SHA1

                          6acf220514c5e96eda5e9e64883a1d758e018feb

                          SHA256

                          8c76f9600e7c4c459cac7208ec557254e46bb82b2aa63b3e354ae4774de066d8

                          SHA512

                          2dd924ed24d27aa5f950c4609d91031a97913d5f7da7bf591efdf46df46b0c37a9eb8360dc4e627ccdf1fd6b8ad9e4a4970c05f14040740bd46744b8026ca3fa

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          b16d9c6f5a962b41b98f0f4e80ebfb56

                          SHA1

                          c5e3ef42e18ea456d3064bc5068450239780366e

                          SHA256

                          d2e0b3db143b63d4f118c229f82fc5f21ae1e8a1ca3a2af7951c33c2287019cd

                          SHA512

                          ca82bd7cb3d1639349cb108c0cd347b50868d73bc3ea465d669b36d0168b17bba7358ea4b8c8fddcddf5642f733421b7bdf809243f553161fea13c4aef2eaa09

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          c25807cf62ea94ef076e7ef8e86bedee

                          SHA1

                          dceed22c972d8ea65de1e8170617164f608ab98b

                          SHA256

                          6f5d4adcc8d2da6ab0f5c9992ce0927c68bd3b5165549bec961e7ab5ec5c9cea

                          SHA512

                          4e9e68a0a8d54df59f360f921515d4c7b2b3d9f2585231d9af198429d0e215a8e1d27a0b62491050376b09c081bf6ee5656bbebdeeb503e157cad84f9818fcbb

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          7105e6a5e47602fb363c40464bf9e531

                          SHA1

                          6747ec66d4894d5e817da979611f210b00b803ba

                          SHA256

                          a041b5852b478eaf76614332fc679491fe9ddd04b2ffff701c172366f137c40e

                          SHA512

                          36a732312c39d69402d12696641505b4a69036e2aa330a83920a68d87bf2351b2076a5417c861163ffd1d32f53e0eafc83af29842fd7246bf80190787f7c7f46

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          511050b0f6f305da026a700abc482e8c

                          SHA1

                          b2640b7431b65734d414b93084840b2dc2d8bb4a

                          SHA256

                          d0e837e8e90113db06b151bc6b61daafe805d8608ac732339141fbe91e04e517

                          SHA512

                          f6bd3a0e71ca1d4fbce7a6b205779e9d5b1a76eb9c4545d0c120f30190c52fad7dfe3950a774b8824715fcb5b864b0affb47cc3a2b85156a3c2bfdbe37694e65

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          094cf631744ae073cc0db8d315e29849

                          SHA1

                          98877ac49b56bc5c15d46c4fd8cfe66fc9827e7b

                          SHA256

                          5c53fd8bb3822171149d6a216ab57e6b063f729cc785a2525d920712d76d9a74

                          SHA512

                          88bcc46f2b8caec85f9262e7f0a0ced0b9e4501d074b5c7b1d08a431ef41564aef57bc98a8d5a21f125b6dc09f604b7e8f69c9976a2e38b9dff6e0e3a7faf426

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          342B

                          MD5

                          3c7179c24d8a6a293c78b22a80eb3a89

                          SHA1

                          2e054a546356cf14e7b1981d899c9fdd2ce32032

                          SHA256

                          aec4fe6ddebe23ebdfe7583d59f19e598f0abd7ad13cb45a2d1e2dd6fa114702

                          SHA512

                          fd1fac00cb1dacc0b631e1c8f8520bef87a78391751dcb06d0a70772d9ca20b2f022ca0426d2332c8a44f3e7526d2d4963404e142e23065cc50f790588b1b592

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                          Filesize

                          264KB

                          MD5

                          f50f89a0a91564d0b8a211f8921aa7de

                          SHA1

                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                          SHA256

                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                          SHA512

                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          4KB

                          MD5

                          912db72cdcdfe71f6eec63e1a909225a

                          SHA1

                          6463d420e94f872bd4bea48ff56f3159ed8f9baa

                          SHA256

                          d7a37a8db5f33d1b50d992880b114c83b068ee39e52fbd75af9c37d7d4c55088

                          SHA512

                          f695d9fd8f5fcdb3014b87bd93b37e99728dc350f1687e73fe9c942380e0a0a198a977072ac5f9580d9721034be6916d75cbac8f979080dbfe67e0f784185b07

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp

                          Filesize

                          16B

                          MD5

                          6752a1d65b201c13b62ea44016eb221f

                          SHA1

                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                          SHA256

                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                          SHA512

                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          200KB

                          MD5

                          0734ad4d55f8a24c16c331dcc96366c6

                          SHA1

                          315c8370e126aaa2fdd9b08fd686419bf37d24d5

                          SHA256

                          bd8696b4b55dafa295f5f262acb591468e7b0796ad718f2f3ff1b6032d641130

                          SHA512

                          32301727c6dc9506aa774fde2c98dd4d7de31dd02f7514c5836ca96f5921cd02d06c904806d6e9156691d7f2cb3f771d2215625258633d2859d9ac1cce98e47c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\fd80667f-8a11-4eea-a52e-034d0d77c837.tmp

                          Filesize

                          200KB

                          MD5

                          44aed6c2fc0f1d706a5f80e11c0152a6

                          SHA1

                          8fd9b98800e6a77a4fedce220037721376f951ec

                          SHA256

                          e8c6258a9a0163652cc6d63d5b25013eb3e29c21d6f65db327bbe13d1966f125

                          SHA512

                          a232bf1676f3395a72543284285850bd7b96ca39b8fe7382c4bd7838290194b9e21f71ffa1e672935a34fee88963577189f47ca1ebc18972edd78e0c1412e897

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BD32C821-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          5KB

                          MD5

                          2fadb35bc892b3be9bc7e3e18027b963

                          SHA1

                          7242e5bb043fdf448f4312b3cd1afcb87903da54

                          SHA256

                          afe4725e72ac21813e6d722df2d4947ca1920b9efc8cd1236dbae904debc8492

                          SHA512

                          1de20d9c828b9faf4cdde3aebc1f5dd17aaede5295b447ca4ec4788acf22bfd06617d097a2fe8562006f8d7550cf2efe35b7283131ae05ac29f9c0c5868a4d40

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BD378AE1-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          3KB

                          MD5

                          8306549d3fca1d9d5868761207ea4e6e

                          SHA1

                          57021768dcf8f1d8192bf9e0e42a6d380049c957

                          SHA256

                          febb2ba2b9cd620da86a33de7eccb92f687b73527952f39947cd7b2d2f50dc86

                          SHA512

                          b842b29527f7e1145867d6bce67b818c27e0d1875b9695f9cffecc651d19103ef563dd7add50b8b83684e8a973f8bb6e5841889582c493114e0ab7f45b5c5145

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BD600241-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          4KB

                          MD5

                          d60275345ac11fc496ca995737184522

                          SHA1

                          d78df79de1668433bb0b4a3764e96ab286c564fa

                          SHA256

                          f6793e0c4f9c5120070209d43e59155ffc068a454ebac0d3949df1217e5fc5c3

                          SHA512

                          eadfb5a52eb6894271289ec378105e4e4f6bfd431d1d9982f419a1c575e2470ab57f84e044f9baff0381ae496cf858ff747c09bf9be1fa8f23f39fe653cded2d

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BD600241-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          5KB

                          MD5

                          b7a4c993941e267e05bf982240f8a6d8

                          SHA1

                          f886c183cd3f277e58d2e25155a563bacd8e4608

                          SHA256

                          e5f03fa905f1098eb0c710fad786ddc43a934cd4026bb0cf0de14a17aadd9c6f

                          SHA512

                          c99dcfbba51af3d663bc1058623f4cbad3da40e978a00fd90de0053e7f61b8c02b399c1c82529896841c9dfea708cef85dc286ad556d3e742b39f68d980c3f2e

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BD602951-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          5KB

                          MD5

                          da2bb5e966d20c13dd94519fa94b8325

                          SHA1

                          a546f732d9e7447ef3153a04658c64958e887086

                          SHA256

                          abacf600729b8152cd42eeccc9651690edb498fbb5afab94808efaf7d43774bf

                          SHA512

                          8c2284fb01afc482ecbe08b849b5655310e8755cda0f82211734a80b6a540e64989ee96da3c16a0d82868ed0189004f015dfde6ec28f678df9f6ce664465c972

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BD672661-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          5KB

                          MD5

                          8abc2e4958c3ca5cd9348d665c94a1af

                          SHA1

                          acc6901fe3a70cbd6fb6a05837092482bfb3df91

                          SHA256

                          3bfafbeb3947b67de95e9db00074d6f2c8225ca65d6507f187ff6b8b0210863b

                          SHA512

                          88798f3e1a507eda25a0fc4d3006133cdb459244dc7885a7d00b2f57f35c67647035eec20eb534bb19f1aaa8eb7329be5115cca311da8033cc9199f1825c162f

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BD70ABE1-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          5KB

                          MD5

                          d2a188aea2de7692e31d7deb57110d43

                          SHA1

                          3cdf496bbff5a453d033654ea16e74690fc67506

                          SHA256

                          11a919aa77b1450498ded64b21b3db0c97cbc170d135d8268ca604e3ede1927e

                          SHA512

                          3578f0b39a1fbbd508ea6de59b83e05bfa4ef3efea3613b601868ec49cbe5fd1f50a3506014c2c009aced7b460aa791760b6e90b40b75366648f7fa330ef7874

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BD7C92C1-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          5KB

                          MD5

                          fc48e0e877b959d806c9605298be5488

                          SHA1

                          8dc21da441920a9a6f6f3170e6fe4a65d6617098

                          SHA256

                          832cbb4e1f90d7fea8b293a26c81671d9aee21727c6f8476878465d03c692906

                          SHA512

                          fc9f82a9bb5f43f0ab47612be2420344a274330fed4e7261cc326f29a04b663a16901b84cdb363c21bbc1fc1743dda745a1890e557def7d11df5d32a3bf3c3d7

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{09C305C0-B163-11ED-A1EA-CEE1C2FBB193}.dat

                          Filesize

                          5KB

                          MD5

                          25ead9fadae106725342162bd29e16e7

                          SHA1

                          7d0c3c586712b2a818740b78a27b3e0d53487de8

                          SHA256

                          4e775ea105678327927d28e374021078e8c15e8ba954b51daeaf1a65cc34f9d9

                          SHA512

                          56ed1b5c57dd2d61e1c7848c6c69622212c92447da5b00524a2dec8bd4b6f97f3f4c797df8e186df00ca09a4e59c8de53c032a19d6e33d879f4f836005cf83e0

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{09C305C0-B163-11ED-A1EA-CEE1C2FBB193}.dat

                          Filesize

                          5KB

                          MD5

                          a456b6ef17ae199455da235a0c0840fb

                          SHA1

                          446cd617570ee1e51bc443f9e2b00e8f754e82de

                          SHA256

                          131b031da78fb4da8d83f891adbfd9cfeb425b01881aa114f0c2ac6f73e0836a

                          SHA512

                          3e9b460683cbecd2cedb5e280bf5dd1d1b16f2bc54e7d0a4ed7770ecb576ebaa4b9ef92c6bb425ccc519e47943d9d90028034f13293877784c24f2e8b7030875

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{09C305C0-B163-11ED-A1EA-CEE1C2FBB193}.dat

                          Filesize

                          6KB

                          MD5

                          1aea9cb0b4b2b1c429e88961c365e998

                          SHA1

                          8d35e6ea1a1bda4c7f8533694c04968c4bde1737

                          SHA256

                          67d7be32b21ccc4e97666db79152e6a6441dde5c60343900ceeb46b202daf2ca

                          SHA512

                          df906513579ddf55f8fba858d9972d4677010c0fb6b9d9aae8a2b292a73b0914ec78c874753ab895131ee06496b83861a88e4653372c336136770841ab19fc08

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{09C305C0-B163-11ED-A1EA-CEE1C2FBB193}.dat

                          Filesize

                          6KB

                          MD5

                          e18ed38e15695f84b1bec7e5ec3e1486

                          SHA1

                          60333aef306d437af2bbf494bfe540f7fd726e09

                          SHA256

                          4ae9f64b4bde25757db54d3f1eada907f1765158e7484c182378627d2b2ec3a3

                          SHA512

                          15e8589b981a981623f171ebcd210d68495d2fa51e6d6fd6894508440dfa58542d4ec4a16f394f589d0f0820f07484aaa9dd4ed60b4701b4b921888070293956

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{09C305C0-B163-11ED-A1EA-CEE1C2FBB193}.dat

                          Filesize

                          7KB

                          MD5

                          9cedbc6ad216b2240a0cb6888de029ff

                          SHA1

                          e8f964e8c64f1ba52513e58b4e2da160678666d0

                          SHA256

                          75ff8a58e226d93d664034fb182704238e61419afede6b4bc3a9235575d33f82

                          SHA512

                          582ec89e28578a48c4a6645ee9ecc1aef208b61318ced8fbd36bdcf0dd93a8a75bc31f83a2d7c72fe4f04bc4e203088c84f30f485eea715b305ecb2696a6686a

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{09C305C0-B163-11ED-A1EA-CEE1C2FBB193}.dat

                          Filesize

                          7KB

                          MD5

                          b94cbb7769e24de1fe7fa1982acc8df7

                          SHA1

                          b3936e5cc134db67b00350a4bc5ae72f514db044

                          SHA256

                          2398ef8e39546e6ca03bae694e04aa590e2869a8d0f6a9df852b3d3466db2aca

                          SHA512

                          244a17664a4942bbd4b378f9fe2743464682ddafb24cb7f96920f7d07c8ad04b3833d0f44be2841a24e9fe23fa7cede8ca645ade910d282ccf76dee374ba9eae

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{09C305C0-B163-11ED-A1EA-CEE1C2FBB193}.dat

                          Filesize

                          7KB

                          MD5

                          8183062290c895efcc7a236a877498bb

                          SHA1

                          2d6bb56cb5c0715715f179593f4feec38e96b2d5

                          SHA256

                          516c32bd94e5991af1b33bc84a2ba82b1c3d64794cadcacaf015377126854e48

                          SHA512

                          a1ee765998ea48e71ddeb475e07f6c192f8f57878450e0b823a1bf6445bc1e8ec19998477e30fd31f5a1f5ceffe3a0fb2ce2fea2a17aaeced36ee7441056616e

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{09C305C0-B163-11ED-A1EA-CEE1C2FBB193}.dat

                          Filesize

                          8KB

                          MD5

                          4f60662b0c2833c6ab1d7f8ee7cba54e

                          SHA1

                          88d91779e09dae0cb79ccafbccf9405d1258a30d

                          SHA256

                          8de2f06f9df265ef0e63bcb15c17ab384700566c4d8edf3487996cbbedeea0ac

                          SHA512

                          d19700b06bc532f51a63bd8d6265d70738786693ee5ac91b9ab98fb29150664365c45e9dac5ae3f9558d7adb15014bc6c6ae6a7ebc3dcf86f9fa9382051e5f16

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{09C305C0-B163-11ED-A1EA-CEE1C2FBB193}.dat

                          Filesize

                          9KB

                          MD5

                          f2ba0e6c905501b0b9ce46c4d4afc782

                          SHA1

                          290d411e36ba9b625ab580c9492eb97454b7ebc5

                          SHA256

                          0d7243d13ec80c36f5b11143563d3b707a38b4b901f924267b394406ee18af66

                          SHA512

                          687acfece40ad76b115fb9bf1d5c5f4b6da70686c8472788c2306b14dfbf56ca0c55b00606ecce4a6734b77c807961afc3d790e8a07843826b896c1ba0ecabd6

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{09C305C0-B163-11ED-A1EA-CEE1C2FBB193}.dat

                          Filesize

                          9KB

                          MD5

                          356b29509abac47a4ba0520cb61cec80

                          SHA1

                          456449647f0f8f3ce5d5f44a16bc431a7de80abe

                          SHA256

                          cfd16ad735cb35f729652f555106f0e078eb11b766d2b8190102142cd306f813

                          SHA512

                          5f0bda2a963a483f6a55acc2c589d2550ec39fa954e71281854463afdb56a3ba1da6983a68717c8c5e7eea3e2a603889f4d407bdabf098ce22c41467f977d9dd

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{C4B88081-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          6KB

                          MD5

                          58533c75cb367cfc1942bf5462e30e32

                          SHA1

                          a1ab67b7716e4200bd98f2ef11597fbd0134fa47

                          SHA256

                          a3a4e15900b68e1bb7708ddd42ff963b053dbbf66dde9c4a7d83778054f398d4

                          SHA512

                          bf88b50705f712d1a6ef11cbd5774aa0f5ec3d60da5a2efaaa89a98818c79989d6e43f035b7461a3ceb2aff76cbd7b10b86a455aff1565e20900c1ac9eff4ce4

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{C4F8C5A0-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          4KB

                          MD5

                          79da22c7f8c2038410df90cf1005592b

                          SHA1

                          2db86a879355cff254ac3ebce3724e71a3ae0f95

                          SHA256

                          0a10d90fe275edb70c3cdfde6d92a8915951797b8b7edba6d1d436137377fb69

                          SHA512

                          cdb25921fb867b250a11d58adb0fe2c47847372cdfcc9596b9cca252eaaf322688fab2b3bd8fd02f55be74f0e2322f052ef554051d9bb41c02b44a37a251706e

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{C5109360-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          4KB

                          MD5

                          8c628928bcbf59a44546dad014c12f16

                          SHA1

                          4c923b6bc837d8e5d75594ea02a6b755b66c890b

                          SHA256

                          ca1d46ea1df0523b91cd27e98b9c9c8b4997f1539fea6fe2214ac42d493abbd1

                          SHA512

                          1e45b6585a90d4ce37e414df5431339871306483f30fe378a9bb349b7da09dfb2b2ae704e0ddf403752d5d0946e0ee6ed404bb8f5ca73007637c2ac57853e7df

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{C52F8540-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          4KB

                          MD5

                          0d1c8e4ddc872ee38a928834e1a132fa

                          SHA1

                          ccafe7cdae324e177d074ca7af50d39c0ef1fff1

                          SHA256

                          fd24973375a6238cdff50cb0d13d24eef64c10d4a24b53b8627b476cf5bc1aee

                          SHA512

                          2a661059505262c1b5983dc8881f795e30f3c4d876354f90ef05a5b74010c9793fdc295e51c798fe1b965650eb0f3e6fb6453999b5203a019eabff6f2d6bef61

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{C544F1A0-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          4KB

                          MD5

                          b1a27d5479a5a1ed0c02196fef12f9cb

                          SHA1

                          d473bc9111e4dd6165b5ae36b2a56f47c8019bb1

                          SHA256

                          114406f12eb4d31cf80f240724fe9991cc94c7d0d9bedbbd604abe2c0e24ee26

                          SHA512

                          e8d4f59a2cb26ebf0e7f9fdc4a0f9675095064f56b8e6761fc746ceb50990cce6c314a4f191ac4888cf263e5f77e86ec9cf7c0c1ff40ef4d609117c691cf0b86

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{C5475301-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          4KB

                          MD5

                          a0bc28ba1b6843622d1316b5a08f9cd0

                          SHA1

                          8c3437d45b90cece7424e53f0f8535c7fd4f0826

                          SHA256

                          1355025ba012dcee169fc5ab3368482f40cf5b266cbe4ba72228eb13efdab340

                          SHA512

                          98d5e1465c4c2617307947de85f8526e371809ae1b7acd4b8818cb50675b6ecacbb6bc54f88c6b9b849c060c6a6170a5fa9e1fca1b6a42f85c2b3ffed7b46459

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{C563E381-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          4KB

                          MD5

                          b66c3104858803f889f10cac7bc585b0

                          SHA1

                          89e274c54429b3390db9f5f511e5f705676f24ad

                          SHA256

                          1979963974361fb7ddd72dc255b0aad53545b77ffbaeaf720943127e10f8e523

                          SHA512

                          dc42d02af2fe7dc2ca0c7efea0852b0528e7dc7715124b86da6e9b3a211b958eb0b642191420a45577398b9ab72103c6b0c5ebf6d346903c26acc819dd2d3e7d

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{C5807401-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          4KB

                          MD5

                          1ea477cecd52744bd135b3b4392d367d

                          SHA1

                          4ed910e55d57c1e60293bb1777a6ab73f57d2edc

                          SHA256

                          ae0fa6f97cbe18dafb1c20b308d536417d5a927609db4a184eab579dec8deb34

                          SHA512

                          8300d871cdf2b35de2bce5c65d40596d69df4b79d63d76b9f165efef9f7be6c735d696c14047396456dc64dab93fb18137a8d76e8908dcf209de3ab2c9bb4e6a

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{C5B00F81-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          4KB

                          MD5

                          09ab4bb89c16607c7484c17cc3f8e8cf

                          SHA1

                          5706d9c49498b1824b814fa3df4f900d078a2c78

                          SHA256

                          0f237d19d2b6a37b11a4ac39f706d4549fd140715f7f638f8b54dda047a10d37

                          SHA512

                          30e6cfb092f0b96cfe7df32b93627b94e7f86e97ba8f75bb0c709669c5c574cdd218fd426dc337426759e1f273144e6c9213e6b7b76a37594af8f8c21e5d89c6

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{C5C57BE1-E1A6-11ED-8C8F-6AEE4B25B7A6}.dat

                          Filesize

                          4KB

                          MD5

                          71b8f1cad258c32e52ac794d66d6c5c8

                          SHA1

                          2cd80353a82bc6bc96b66426923d7b3b169700f5

                          SHA256

                          5aa24da9431fa57949e23f745700b6831721f86950c563fb7d90d59dd80d6531

                          SHA512

                          d13e7db0766d8ebd8f3e9b2b16d1027f6a66f80c477726ca0e290749eed3ac4eeaf4210e969964bb2d4cde93a8e69b025dc24483544c4355640d7abf070d02a7

                        • C:\Users\Admin\AppData\Local\Temp\Cab846F.tmp

                          Filesize

                          61KB

                          MD5

                          fc4666cbca561e864e7fdf883a9e6661

                          SHA1

                          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

                          SHA256

                          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

                          SHA512

                          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

                        • C:\Users\Admin\AppData\Local\Temp\Cab86F3.tmp

                          Filesize

                          61KB

                          MD5

                          e71c8443ae0bc2e282c73faead0a6dd3

                          SHA1

                          0c110c1b01e68edfacaeae64781a37b1995fa94b

                          SHA256

                          95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

                          SHA512

                          b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

                        • C:\Users\Admin\AppData\Local\Temp\Tar8746.tmp

                          Filesize

                          161KB

                          MD5

                          be2bec6e8c5653136d3e72fe53c98aa3

                          SHA1

                          a8182d6db17c14671c3d5766c72e58d87c0810de

                          SHA256

                          1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

                          SHA512

                          0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

                        • C:\Users\Admin\AppData\Local\Temp\~DFD4E7EBF30E627A03.TMP

                          Filesize

                          20KB

                          MD5

                          f7af3e06083a15f6b0486ce2c4ae2504

                          SHA1

                          066dffdd8d3f21b3e88e3368b8f758175f84e8dd

                          SHA256

                          87da03620927cfeca1c05114a175d3321a85a5575546631b3e6acbee9486d891

                          SHA512

                          b228d926178b9eaf6d73f6ffa9f8b12c1b38ba467aebdf24d0264e09b6f1efc58116dd2bf4c0c80f0d9b01ef9fcaa0504cfd0e33beb05003423753cf7ce70028