Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08/06/2023, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
CheatEngine75.exe
Resource
win7-20230220-en
General
-
Target
CheatEngine75.exe
-
Size
28.6MB
-
MD5
a4b99286d19825f642183f3e78782513
-
SHA1
3a13275632f09a763200b7d453c164d2887f5795
-
SHA256
3bc3a26ab7f5f0b02c5175ba04514a5344804f6c886fdd3ea1f1f9d317ee7a40
-
SHA512
e51ba67f7c462ae1b755a879b7d3ec70e302159fc3d08fd6b843075e5c5d3ab1a49a9bcf59773cac6c041152e77dd11c75374f0b8a15cab92e85d0771d85c6b9
-
SSDEEP
786432:uCxuEnwFho+zM77UDZiZCd08jFZJAI5E70TZFHiO:nEXFhV0KAcNjxAItjiO
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1088 icacls.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Cheat Engine 7.5\languages\is-8461O.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\is-AIFON.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-A5AVD.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\dlls\is-DP8Q5.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\example-c\is-LT9IH.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\c# template\CEPluginLibrary\Properties\is-SMV0U.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\badassets\is-68K6J.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-M8SKP.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\windowsrepair.exe CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\gtutorial-i386.exe CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\sec_api\is-HLHE4.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\sec_api\is-UHBJI.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\ceshare\is-LU4BO.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\dlls\src\Mono\MonoDataCollector\is-MGRFE.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\libmikmod64.dll CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\is-M5RT6.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\is-R95PV.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-104KR.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-S66M4.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\is-51EP6.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\ced3d10hook.dll CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-TLAHN.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\winapi\is-EK35S.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\is-03R5V.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\is-3I2OQ.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\win32\is-I8QPL.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-0TC6V.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\is-0DFFB.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-6DSVB.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\example-c\is-SR3GJ.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\languages\is-G3EPP.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\languages\is-0T7HV.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\is-UEIOF.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\is-LP3P0.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\badassets\is-SFSIR.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-PFPD4.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\is-0Q2HR.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\is-CVL6A.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\example-c\is-VVQ4P.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\c# template\CEPluginLibrary\is-R779J.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-254E2.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-TDLCR.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-EQJ4T.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\dlls\src\Mono\MonoDataCollector\is-8QFT5.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\is-TCMDM.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\CheatEngine.chm CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-0ELNQ.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-417EV.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\languages\is-S882I.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\is-6RRDV.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\ceshare\is-VVAKE.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\c# template\CEPluginLibrary\SDK\is-BBQ89.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\tcc64-64.dll CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-9PN3I.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\winapi\is-1FBG5.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\c# template\CEPluginLibrary\is-3ENK7.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\badassets\is-748D5.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\libipt-64.dll CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\cheatengine-i386.exe CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-1A91B.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\win32\is-3AUH8.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\winapi\is-TMRS7.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\is-6MGKE.tmp CheatEngine75.tmp -
Executes dropped EXE 5 IoCs
pid Process 1196 CheatEngine75.tmp 884 CheatEngine75.exe 664 CheatEngine75.tmp 788 _setup64.tmp 1036 Kernelmoduleunloader.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1696 sc.exe 944 sc.exe -
Loads dropped DLL 7 IoCs
pid Process 2028 CheatEngine75.exe 1196 CheatEngine75.tmp 1196 CheatEngine75.tmp 1196 CheatEngine75.tmp 884 CheatEngine75.exe 664 CheatEngine75.tmp 664 CheatEngine75.tmp -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 CheatEngine75.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 CheatEngine75.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 CheatEngine75.tmp -
Runs net.exe
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 664 CheatEngine75.tmp 664 CheatEngine75.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 664 CheatEngine75.tmp -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1196 2028 CheatEngine75.exe 28 PID 2028 wrote to memory of 1196 2028 CheatEngine75.exe 28 PID 2028 wrote to memory of 1196 2028 CheatEngine75.exe 28 PID 2028 wrote to memory of 1196 2028 CheatEngine75.exe 28 PID 2028 wrote to memory of 1196 2028 CheatEngine75.exe 28 PID 2028 wrote to memory of 1196 2028 CheatEngine75.exe 28 PID 2028 wrote to memory of 1196 2028 CheatEngine75.exe 28 PID 1196 wrote to memory of 884 1196 CheatEngine75.tmp 29 PID 1196 wrote to memory of 884 1196 CheatEngine75.tmp 29 PID 1196 wrote to memory of 884 1196 CheatEngine75.tmp 29 PID 1196 wrote to memory of 884 1196 CheatEngine75.tmp 29 PID 1196 wrote to memory of 884 1196 CheatEngine75.tmp 29 PID 1196 wrote to memory of 884 1196 CheatEngine75.tmp 29 PID 1196 wrote to memory of 884 1196 CheatEngine75.tmp 29 PID 884 wrote to memory of 664 884 CheatEngine75.exe 30 PID 884 wrote to memory of 664 884 CheatEngine75.exe 30 PID 884 wrote to memory of 664 884 CheatEngine75.exe 30 PID 884 wrote to memory of 664 884 CheatEngine75.exe 30 PID 884 wrote to memory of 664 884 CheatEngine75.exe 30 PID 884 wrote to memory of 664 884 CheatEngine75.exe 30 PID 884 wrote to memory of 664 884 CheatEngine75.exe 30 PID 664 wrote to memory of 1460 664 CheatEngine75.tmp 32 PID 664 wrote to memory of 1460 664 CheatEngine75.tmp 32 PID 664 wrote to memory of 1460 664 CheatEngine75.tmp 32 PID 664 wrote to memory of 1460 664 CheatEngine75.tmp 32 PID 1460 wrote to memory of 1404 1460 net.exe 33 PID 1460 wrote to memory of 1404 1460 net.exe 33 PID 1460 wrote to memory of 1404 1460 net.exe 33 PID 664 wrote to memory of 1236 664 CheatEngine75.tmp 34 PID 664 wrote to memory of 1236 664 CheatEngine75.tmp 34 PID 664 wrote to memory of 1236 664 CheatEngine75.tmp 34 PID 664 wrote to memory of 1236 664 CheatEngine75.tmp 34 PID 1236 wrote to memory of 2016 1236 net.exe 36 PID 1236 wrote to memory of 2016 1236 net.exe 36 PID 1236 wrote to memory of 2016 1236 net.exe 36 PID 664 wrote to memory of 1696 664 CheatEngine75.tmp 38 PID 664 wrote to memory of 1696 664 CheatEngine75.tmp 38 PID 664 wrote to memory of 1696 664 CheatEngine75.tmp 38 PID 664 wrote to memory of 1696 664 CheatEngine75.tmp 38 PID 664 wrote to memory of 944 664 CheatEngine75.tmp 39 PID 664 wrote to memory of 944 664 CheatEngine75.tmp 39 PID 664 wrote to memory of 944 664 CheatEngine75.tmp 39 PID 664 wrote to memory of 944 664 CheatEngine75.tmp 39 PID 664 wrote to memory of 788 664 CheatEngine75.tmp 41 PID 664 wrote to memory of 788 664 CheatEngine75.tmp 41 PID 664 wrote to memory of 788 664 CheatEngine75.tmp 41 PID 664 wrote to memory of 788 664 CheatEngine75.tmp 41 PID 664 wrote to memory of 1088 664 CheatEngine75.tmp 43 PID 664 wrote to memory of 1088 664 CheatEngine75.tmp 43 PID 664 wrote to memory of 1088 664 CheatEngine75.tmp 43 PID 664 wrote to memory of 1088 664 CheatEngine75.tmp 43 PID 664 wrote to memory of 1036 664 CheatEngine75.tmp 45 PID 664 wrote to memory of 1036 664 CheatEngine75.tmp 45 PID 664 wrote to memory of 1036 664 CheatEngine75.tmp 45 PID 664 wrote to memory of 1036 664 CheatEngine75.tmp 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\is-RDS4U.tmp\CheatEngine75.tmp"C:\Users\Admin\AppData\Local\Temp\is-RDS4U.tmp\CheatEngine75.tmp" /SL5="$7012C,29086952,780800,C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\is-A9QTP.tmp\CheatEngine75.exe"C:\Users\Admin\AppData\Local\Temp\is-A9QTP.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\is-SL2HM.tmp\CheatEngine75.tmp"C:\Users\Admin\AppData\Local\Temp\is-SL2HM.tmp\CheatEngine75.tmp" /SL5="$1019C,26511452,832512,C:\Users\Admin\AppData\Local\Temp\is-A9QTP.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST4⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\system32\net.exe"net" stop BadlionAntic5⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BadlionAntic6⤵PID:1404
-
-
-
C:\Windows\system32\net.exe"net" stop BadlionAnticheat5⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BadlionAnticheat6⤵PID:2016
-
-
-
C:\Windows\system32\sc.exe"sc" delete BadlionAntic5⤵
- Launches sc.exe
PID:1696
-
-
C:\Windows\system32\sc.exe"sc" delete BadlionAnticheat5⤵
- Launches sc.exe
PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\is-QQ6AP.tmp\_isetup\_setup64.tmphelper 105 0x2045⤵
- Executes dropped EXE
PID:788
-
-
C:\Windows\system32\icacls.exe"icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)5⤵
- Modifies file permissions
PID:1088
-
-
C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe"C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe" /SETUP5⤵
- Executes dropped EXE
PID:1036
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD59af96706762298cf72df2a74213494c9
SHA14b5fd2f168380919524ecce77aa1be330fdef57a
SHA25665fa2ccb3ac5400dd92dda5f640445a6e195da7c827107260f67624d3eb95e7d
SHA51229a0619093c4c0ecf602c861ec819ef16550c0607df93067eaef4259a84fd7d40eb88cd5548c0b3b265f3ce5237b585f508fdd543fa281737be17c0551163bd4
-
Filesize
328KB
MD519d52868c3e0b609dbeb68ef81f381a9
SHA1ce365bd4cf627a3849d7277bafbf2f5f56f496dc
SHA256b96469b310ba59d1db320a337b3a8104db232a4344a47a8e5ae72f16cc7b1ff4
SHA5125fbd53d761695de1dd6f0afd0964b33863764c89692345cab013c0b1b6332c24dcf766028f305cc87d864d17229d7a52bf19a299ca136a799053c368f21c8926
-
Filesize
468KB
MD5daa81711ad1f1b1f8d96dc926d502484
SHA17130b241e23bede2b1f812d95fdb4ed5eecadbfd
SHA2568422be70e0ec59c962b35acf8ad80671bcc8330c9256e6e1ec5c07691388cd66
SHA5129eaa8e04ad7359a30d5e2f9256f94c1643d4c3f3c0dff24d6cd9e31a6f88cb3b470dd98f01f8b0f57bb947adc3d45c35749ed4877c7cbbbcc181145f0c361065
-
Filesize
5KB
MD55cff22e5655d267b559261c37a423871
SHA1b60ae22dfd7843dd1522663a3f46b3e505744b0f
SHA256a8d8227b8e97a713e0f1f5db5286b3db786b7148c1c8eb3d4bbfe683dc940db9
SHA512e00f5b4a7fa1989382df800d168871530917fcd99efcfe4418ef1b7e8473caea015f0b252cac6a982be93b5d873f4e9acdb460c8e03ae1c6eea9c37f84105e50
-
Filesize
128KB
MD543dac1f3ca6b48263029b348111e3255
SHA19e399fddc2a256292a07b5c3a16b1c8bdd8da5c1
SHA256148f12445f11a50efbd23509139bf06a47d453e8514733b5a15868d10cc6e066
SHA5126e77a429923b503fc08895995eb8817e36145169c2937dacc2da92b846f45101846e98191aeb4f0f2f13fff05d0836aa658f505a04208188278718166c5e3032
-
Filesize
140KB
MD50daf9f07847cceb0f0760bf5d770b8c1
SHA1992cc461f67acea58a866a78b6eefb0cbcc3aaa1
SHA256a2ac2ba27b0ed9acc3f0ea1bef9909a59169bc2eb16c979ef8e736a784bf2fa4
SHA512b4dda28721de88a372af39d4dfba6e612ce06cc443d6a6d636334865a9f8ca555591fb36d9829b54bc0fb27f486d4f216d50f68e1c2df067439fe8ebbf203b6a
-
Filesize
137KB
MD542e2bf4210f8126e3d655218bd2af2e4
SHA178efcb9138eb0c800451cf2bcc10e92a3adf5b72
SHA2561e30126badfffb231a605c6764dd98895208779ef440ea20015ab560263dd288
SHA512c985988d0832ce26337f774b160ac369f2957c306a1d82fbbffe87d9062ae5f3af3c1209768cd574182669cd4495dba26b6f1388814c0724a7812218b0b8dc74
-
Filesize
146KB
MD50eaac872aadc457c87ee995bbf45a9c1
SHA15e9e9b98f40424ad5397fc73c13b882d75499d27
SHA2566f505cc5973687bbda1c2d9ac8a635d333f57c12067c54da7453d9448ab40b8f
SHA512164d1e6ef537d44ac4c0fd90d3c708843a74ac2e08fa2b3f0fdd4a180401210847e0f7bb8ec3056f5dc1d5a54d3239c59fb37914ce7742a4c0eb81578657d24b
-
Filesize
124KB
MD55f1a333671bf167730ed5f70c2c18008
SHA1c8233bbc6178ba646252c6566789b82a3296cab5
SHA256fd2a2b4fe4504c56347c35f24d566cc0510e81706175395d0a2ba26a013c4daf
SHA5126986d93e680b3776eb5700143fc35d60ca9dbbdf83498f8731c673f9fd77c8699a24a4849db2a273aa991b8289e4d6c3142bbde77e11f2faf603df43e8fea105
-
Filesize
136KB
MD561ba5199c4e601fa6340e46bef0dff2d
SHA17c1a51d6d75b001ba1acde2acb0919b939b392c3
SHA2568783f06f7b123e16042bb0af91ff196b698d3cd2aa930e3ea97cfc553d9fc0f4
SHA5128ce180a622a5788bb66c5f3a4abfde62c858e86962f29091e9c157753088ddc826c67c51ff26567bfe2b75737897f14e6bb17ec89f52b525f6577097f1647d31
-
Filesize
119KB
MD52a2ebe526ace7eea5d58e416783d9087
SHA15dabe0f7586f351addc8afc5585ee9f70c99e6c4
SHA256e2a7df4c380667431f4443d5e5fc43964b76c8fcb9cf4c7db921c4140b225b42
SHA51294ed0038068abddd108f880df23422e21f9808ce04a0d14299aacc5d573521f52626c0c2752b314cda976f64de52c4d5bcac0158b37d43afb9bc345f31fdbbc0
-
Filesize
131KB
MD52af7afe35ab4825e58f43434f5ae9a0f
SHA1b67c51cad09b236ae859a77d0807669283d6342f
SHA2567d82694094c1bbc586e554fa87a4b1ed6ebc9eb14902fd429824dcd501339722
SHA51223b7c6db0cb9c918ad9f28fa0e4e683c7e2495e89a136b75b7e1be6380591da61b6fb4f7248191f28fd3d80c4a391744a96434b4ab96b9531b5ebb0ec970b9d0
-
Filesize
283B
MD5af5ed8f4fe5370516403ae39200f5a4f
SHA19299e9998a0605182683a58a5a6ab01a9b9bc037
SHA2564aa4f0b75548d45c81d8e876e2db1c74bddfd64091f102706d729b50a7af53a5
SHA512f070049a2fae3223861424e7fe79cbae6601c9bee6a56fadde4485ad3c597dc1f3687e720177ab28564a1faab52b6679e9315f74327d02aa1fb31e7b8233a80f
-
Filesize
157KB
MD5df443813546abcef7f33dd9fc0c6070a
SHA1635d2d453d48382824e44dd1e59d5c54d735ee2c
SHA256d14911c838620251f7f64c190b04bb8f4e762318cc763d993c9179376228d8ca
SHA5129f9bea9112d9db9bcecfc8e4800b7e8032efb240cbbddaf26c133b4ce12d27b47dc4e90bc339c561714bc972f6e809b2ec9c9e1facc6c223fbac66b089a14c25
-
Filesize
182KB
MD54a3b7c52ef32d936e3167efc1e920ae6
SHA1d5d8daa7a272547419132ddb6e666f7559dbac04
SHA25626ede848dba071eb76c0c0ef8e9d8ad1c53dfab47ca9137abc9d683032f06ebb
SHA51236d7f8a0a749de049a830cc8c8f0d3962d8dce57b445f5f3c771a86dd11aaa10da5f36f95e55d3dc90900e4dbddd0dcc21052c53aa11f939db691362c42e5312
-
Filesize
197KB
MD59f50134c8be9af59f371f607a6daa0b6
SHA16584b98172cbc4916a7e5ca8d5788493f85f24a7
SHA256dd07117ed80546f23d37f8023e992de560a1f55a76d1eb6dfd9d55baa5e3dad6
SHA5125ccafa2b0e2d20034168ee9a79e8efff64f12f5247f6772815ef4cb9ee56f245a06b088247222c5a3789ae2dcefadbc2c15df4ff5196028857f92b9992b094e0
-
Filesize
260KB
MD5dd71848b5bbd150e22e84238cf985af0
SHA135c7aa128d47710cfdb15bb6809a20dbd0f916d8
SHA256253d18d0d835f482e6abbaf716855580eb8fe789292c937301e4d60ead29531d
SHA5120cbf35c9d7b09fb57d8a9079eab726a3891393f12aee8b43e01d1d979509e755b74c0fb677f8f2dfab6b2e34a141f65d0cfbfe57bda0bf7482841ad31ace7790
-
Filesize
2KB
MD5650c02fc9f949d14d62e32dd7a894f5e
SHA1fa5399b01aadd9f1a4a5632f8632711c186ec0de
SHA256c4d23db8effb359b4aa4d1e1e480486fe3a4586ce8243397a94250627ba4f8cc
SHA512f2caaf604c271283fc7af3aa9674b9d647c4ac53dffca031dbf1220d3ed2e867943f5409a95f41c61d716879bed7c888735f43a068f1cc1452b4196d611cb76d
-
Filesize
200KB
MD56e00495955d4efaac2e1602eb47033ee
SHA195c2998d35adcf2814ec7c056bfbe0a0eb6a100c
SHA2565e24a5fe17ec001cab7118328a4bff0f2577bd057206c6c886c3b7fb98e0d6d9
SHA5122004d1def322b6dd7b129fe4fa7bbe5d42ab280b2e9e81de806f54313a7ed7231f71b62b6138ac767288fee796092f3397e5390e858e06e55a69b0d00f18b866
-
Filesize
256KB
MD519b2050b660a4f9fcb71c93853f2e79c
SHA15ffa886fa019fcd20008e8820a0939c09a62407a
SHA2565421b570fbc1165d7794c08279e311672dc4f42cb7ae1cbddcd7eea0b1136fff
SHA512a93e47387ab0d327b71c3045b3964c7586d0e03dddb2e692f6671fb99659e829591d5f23ce7a95683d82d239ba7d11fb5a123834629a53de5ce5dba6aa714a9a
-
Filesize
3.1MB
MD59aa2acd4c96f8ba03bb6c3ea806d806f
SHA19752f38cc51314bfd6d9acb9fb773e90f8ea0e15
SHA2561b81562fdaeaa1bc22cbaa15c92bab90a12080519916cfa30c843796021153bb
SHA512b0a00082c1e37efbfc2058887db60dabf6e9606713045f53db450f16ebae0296abfd73a025ffa6a8f2dcb730c69dd407f7889037182ce46c68367f54f4b1dc8d
-
Filesize
324KB
MD5e9b5905d495a88adbc12c811785e72ec
SHA1ca0546646986aab770c7cf2e723c736777802880
SHA2563eb9cd27035d4193e32e271778643f3acb2ba73341d87fd8bb18d99af3dffdea
SHA5124124180b118149c25f8ea8dbbb2912b4bd56b43f695bf0ff9c6ccc95ade388f1be7d440a791d49e4d5c9c350ea113cf65f839a3c47d705533716acc53dd038f8
-
Filesize
413KB
MD58d487547f1664995e8c47ec2ca6d71fe
SHA1d29255653ae831f298a54c6fa142fb64e984e802
SHA256f50baf9dc3cd6b925758077ec85708db2712999b9027cc632f57d1e6c588df21
SHA51279c230cfe8907df9da92607a2c1ace0523a36c3a13296cb0265329208edc453e293d7fbedbd5410decf81d20a7fe361fdebddadbc1dc63c96130b0bedf5b1d8a
-
Filesize
201KB
MD5de625af5cf4822db08035cc897f0b9f2
SHA14440b060c1fa070eb5d61ea9aadda11e4120d325
SHA2563cdb85ee83ef12802efdfc9314e863d4696be70530b31e7958c185fc4d6a9b38
SHA51219b22f43441e8bc72507be850a8154321c20b7351669d15af726145c0d34805c7df58f9dc64a29272a4811268308e503e9840f06e51ccdcb33afd61258339099
-
Filesize
264KB
MD5f9c562b838a3c0620fb6ee46b20b554c
SHA15095f54be57622730698b5c92c61b124dfb3b944
SHA256e08b035d0a894d8bea64e67b1ed0bce27567d417eaaa133e8b231f8a939e581d
SHA512a20bc9a442c698c264fef82aa743d9f3873227d7d55cb908e282fa1f5dcff6b40c5b9ca7802576ef2f5a753fd1c534e9be69464b29af8efec8b019814b875296
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac6877f9b8766af4371787201a1a3b48
SHA199f36fd3112de5dbcca7dd3ebb3e6714809a437e
SHA2568efc140ac0aa8678c29ef9d3a25f1b6fcaa8c557d85b15439d7a71e07dcc95a8
SHA512fd8e5ade5b37f8d123d94974f17f40b1669fee15181dc3a9c8857c9b163208d2f85e3d3c141b50c7c097dc2bf315a47774eb166b39105991c5503515b43d2fa5
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
26.1MB
MD5e0f666fe4ff537fb8587ccd215e41e5f
SHA1d283f9b56c1e36b70a74772f7ca927708d1be76f
SHA256f88b0e5a32a395ab9996452d461820679e55c19952effe991dee8fedea1968af
SHA5127f6cabd79ca7cdacc20be8f3324ba1fdaaff57cb9933693253e595bfc5af2cb7510aa00522a466666993da26ddc7df4096850a310d7cff44b2807de4e1179d1a
-
Filesize
26.1MB
MD5e0f666fe4ff537fb8587ccd215e41e5f
SHA1d283f9b56c1e36b70a74772f7ca927708d1be76f
SHA256f88b0e5a32a395ab9996452d461820679e55c19952effe991dee8fedea1968af
SHA5127f6cabd79ca7cdacc20be8f3324ba1fdaaff57cb9933693253e595bfc5af2cb7510aa00522a466666993da26ddc7df4096850a310d7cff44b2807de4e1179d1a
-
Filesize
258KB
MD56b7cb2a5a8b301c788c3792802696fe8
SHA1da93950273b0c256dab64bb3bb755ac7c14f17f3
SHA2563eed2e41bc6ca0ae9a5d5ee6d57ca727e5cba6ac8e8c5234ac661f9080cedadf
SHA5124183dbb8fd7de5fd5526a79b62e77fc30b8d1ec34ebaa3793b4f28beb36124084533e08b595f77305522bc847edfed1f9388c0d2ece66e6ac8acb7049b48ee86
-
Filesize
6KB
MD5e4211d6d009757c078a9fac7ff4f03d4
SHA1019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
SHA51217257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e
-
Filesize
2.9MB
MD5c47a946f3d41363c77ca4c719516e49b
SHA101cb165e95fb6590f66673d25917b838c847ba8b
SHA25632361da66cbedf8ac39a309427a132a1927350a38f1bc3f32f0ea78562b24848
SHA5124520a1bf4754dce663ee038ff34de33b9bc73cdb93e3cb7674bbbc9096002664edd6adee6257677277c6fdf48418bdecfb26c26d113e241eab0a621a9a1888d7
-
Filesize
3.1MB
MD59aa2acd4c96f8ba03bb6c3ea806d806f
SHA19752f38cc51314bfd6d9acb9fb773e90f8ea0e15
SHA2561b81562fdaeaa1bc22cbaa15c92bab90a12080519916cfa30c843796021153bb
SHA512b0a00082c1e37efbfc2058887db60dabf6e9606713045f53db450f16ebae0296abfd73a025ffa6a8f2dcb730c69dd407f7889037182ce46c68367f54f4b1dc8d
-
Filesize
3.1MB
MD59aa2acd4c96f8ba03bb6c3ea806d806f
SHA19752f38cc51314bfd6d9acb9fb773e90f8ea0e15
SHA2561b81562fdaeaa1bc22cbaa15c92bab90a12080519916cfa30c843796021153bb
SHA512b0a00082c1e37efbfc2058887db60dabf6e9606713045f53db450f16ebae0296abfd73a025ffa6a8f2dcb730c69dd407f7889037182ce46c68367f54f4b1dc8d
-
Filesize
236KB
MD59af96706762298cf72df2a74213494c9
SHA14b5fd2f168380919524ecce77aa1be330fdef57a
SHA25665fa2ccb3ac5400dd92dda5f640445a6e195da7c827107260f67624d3eb95e7d
SHA51229a0619093c4c0ecf602c861ec819ef16550c0607df93067eaef4259a84fd7d40eb88cd5548c0b3b265f3ce5237b585f508fdd543fa281737be17c0551163bd4
-
Filesize
26.1MB
MD5e0f666fe4ff537fb8587ccd215e41e5f
SHA1d283f9b56c1e36b70a74772f7ca927708d1be76f
SHA256f88b0e5a32a395ab9996452d461820679e55c19952effe991dee8fedea1968af
SHA5127f6cabd79ca7cdacc20be8f3324ba1fdaaff57cb9933693253e595bfc5af2cb7510aa00522a466666993da26ddc7df4096850a310d7cff44b2807de4e1179d1a
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
2.0MB
MD5fad0877741da31ab87913ef1f1f2eb1a
SHA121abb83b8dfc92a6d7ee0a096a30000e05f84672
SHA25673ff938887449779e7a9d51100d7be2195198a5e2c4c7de5f93ceac7e98e3e02
SHA512f626b760628e16b9aa8b55e463c497658dd813cf5b48a3c26a85d681da1c3a33256cae012acc1257b1f47ea37894c3a306f348eb6bd4bbdf94c9d808646193ec
-
Filesize
6KB
MD5e4211d6d009757c078a9fac7ff4f03d4
SHA1019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
SHA51217257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e
-
Filesize
2.9MB
MD5c47a946f3d41363c77ca4c719516e49b
SHA101cb165e95fb6590f66673d25917b838c847ba8b
SHA25632361da66cbedf8ac39a309427a132a1927350a38f1bc3f32f0ea78562b24848
SHA5124520a1bf4754dce663ee038ff34de33b9bc73cdb93e3cb7674bbbc9096002664edd6adee6257677277c6fdf48418bdecfb26c26d113e241eab0a621a9a1888d7
-
Filesize
3.1MB
MD59aa2acd4c96f8ba03bb6c3ea806d806f
SHA19752f38cc51314bfd6d9acb9fb773e90f8ea0e15
SHA2561b81562fdaeaa1bc22cbaa15c92bab90a12080519916cfa30c843796021153bb
SHA512b0a00082c1e37efbfc2058887db60dabf6e9606713045f53db450f16ebae0296abfd73a025ffa6a8f2dcb730c69dd407f7889037182ce46c68367f54f4b1dc8d