Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/08/2023, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe
Resource
win10v2004-20230703-en
General
-
Target
dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe
-
Size
1.0MB
-
MD5
74e79a60ce45bb51e5874dd0c437d15b
-
SHA1
80a7d880e0e38f32631ec8b9758a75427990b65a
-
SHA256
dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977
-
SHA512
1c341702c9d52e30527210f64ad525d13868509cba97fc2f5b59a1715456fa1ba73bc3f5493f28d72f18f9f3dda7d0074f6249e9cfb4317bf965b306e5e495a9
-
SSDEEP
12288:pTUSKJGZ35fGlPVWJmmeri0ZGwe+06cEB9Tll6XR5nWFpPoSxPFd:pTz35fWPcJmtrRZIEXR7bPPn
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1720-57-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-58-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-60-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-64-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-68-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-70-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-75-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-77-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-81-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-85-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-91-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-95-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-97-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-99-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-101-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-93-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-89-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-87-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-83-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-79-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-73-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-66-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-62-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-59-0x0000000003400000-0x000000000343E000-memory.dmp upx behavioral1/memory/1720-103-0x0000000003400000-0x000000000343E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CF3D091-3ECD-11EE-8B12-EA84BFBCA582} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "398638013" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005a31a35914bcf84cb1db54e391e8cdcb000000000200000000001066000000010000200000007126170e47c525280e854ad4c4ad9f88ab20b2570f91cce2a88551205bfbecbf000000000e800000000200002000000075fa55113b4819fa74ccfce7478ebea2b04b32ce997481f6f2d2b6c9278357fb20000000ad66d740b0164b90e4e3ff8b042e7c460cc0617edf5a26900435c6cb90f23bab4000000057b4bc918f75fb7fe52fc641dd065cab8a484b4f14bc9a579bb3ba748906c8af3c37b96a27738fd2af9521b8c1d92c75bb555eb8da4a971d18c98cfb54a4f2c1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d68203dad2d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1720 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe Token: SeDebugPrivilege 1720 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1720 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe 1720 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe 1720 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe 1720 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe 1720 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe 3024 iexplore.exe 3024 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1720 wrote to memory of 3024 1720 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe 29 PID 1720 wrote to memory of 3024 1720 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe 29 PID 1720 wrote to memory of 3024 1720 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe 29 PID 1720 wrote to memory of 3024 1720 dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe 29 PID 3024 wrote to memory of 2908 3024 iexplore.exe 30 PID 3024 wrote to memory of 2908 3024 iexplore.exe 30 PID 3024 wrote to memory of 2908 3024 iexplore.exe 30 PID 3024 wrote to memory of 2908 3024 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe"C:\Users\Admin\AppData\Local\Temp\dcfaa9ef485a92b253a8ba2199efa27145056e1dd81a97fa88c4ba980202c977.exe"1⤵
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://qm.qq.com/cgi-bin/qm/qr?_wv=1027&k=SxtsS6y_A93IHg5tI5osgd0FhzaQFyzH&authKey=HufF4xeBiQJmW43j7rFbWtuHhdOfdEu45JZ%2FCTHc4AyJfzI4kZmOHI7UCVkQ4ZVs&noverify=0&group_code=7995798862⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56fdfe0ae7d1f96c11e3efd80605b1062
SHA15b536dc9388a289c6733edd595cb4f02aea6d819
SHA2562bd2da07d4d68188f097b5ec35bcf1c505cbfd85490a4d32fc9918a9704c3ff8
SHA5127895f082584ce132a14c1afcad664ae5d2cdac7ad3a22fc73a072be455a1a312a6ae49207f5f31f76c0b4bccb12368cb8a9abf5aef5986c5bebbe65fff1decb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1638ce86f1f86ff1cc5c00c1e9b878a
SHA1e5e30cd428f940062b16b1da90e7d058654e78de
SHA256e69eea08c5f41f051b6eaff64b1eddb5f979804e5dc18f772eeb9539843300ff
SHA512f85cce12b2df6ecb3d295453532a4de23fd51fabd73be8ab48ca7a631c38fe286adc2630bdfdf37c1dd8708ee3cd892779b501ca2a76e8e214d7c7568ce883b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7af233252be9c1093abcaebe9c79de5
SHA1e4212e2b8feedf09f0d8c473d1b200f6c0ae415a
SHA256810fc89329249ec5a27aa07df1d4cfa62cdff2aa20ac965dfe5bf55c22f865a9
SHA51219c7bdeb578255ab243c83828d60cf72469978a8bff3fe4875fea823b0aaa5dc310739800e407967a7b89241888daa559cfb9bab3c416b240fe2fa71508c7812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5045adef4a2f3a3a7e153442d0e54be0e
SHA19d5f758095afce6524f691977ceb431b0903903b
SHA25641fc58c02d1de346bb9a6d2b3fbafc4a8e9016e7292e6abf6fc4801ee3026eb6
SHA512c1628837c27f41ad6ab2054d439dd9f19550c5130419f664c1d3a6d76bb59dde77c3ecc9e35c90e01eaa2b2fe7295a5bb50dd92e5d94bd1be994dea9e2300128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa90496fabf642bd120b46eac7f65b3c
SHA1be5f7d536245367465b26a4bf205dddbd7fd73b8
SHA2567b2619243bee6ba2d8ba003303893d1072b66b4542516d8e16dfc59f130525bf
SHA5129025417ad4f0969201400904d3fcfcf67952bfab3d88ef6d68d64a0eaf0aec577f55fc0fe4eece05d44e604fc159171ea0aecefb0fe1130a35cedc528e8220ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb35386708c7ba97456a02681eb4a5b3
SHA1965750aca2d43eec54d2a2188f3ab6cf59653e54
SHA2564500160bdfdd2dc47f776c93e671af9497dbb488963253151e9100d1bf7e8f23
SHA512d7bc1ac961f316c600880bc769b6c0652512bacfcf3043c80afc2048ad2e2bdae1f3c8ba7d17b06da04c92068946bb10375f92ca682b5766bb0da45af7abcfba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506baf13f75f30ef8c6aebd85e7d0e6f2
SHA12a957ed6ac7c6b4abd86cdce56807e87f696fea2
SHA256c0763cc33bbaac0166e6a4ebd95741961be52ad67ffedd2ef2a4dd4e4d228f5b
SHA5125a2bbb053bab9c839ef5d57c7f2eca2f9267bf90dfadcfa4d6c2e3592018ab8e248b4714e49655c817024c3355c541fbc9d825fa13bf8429e3ab7426cee4a4f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509880837173c3a2cf84dc3dac7872028
SHA10890785a9977e37c46d24b7ab9b93ad318b5159a
SHA256d61ec0d395d4a8333eea17bc8804a204e3e0b5be753854a8c3ea9bc19d5735dd
SHA512d1be4ee2e55e431a9af75dad7bdd5ae0f206f656d51089e426bdeffddb22f63ef3c117c904064d8e7fecbd2d5c993408aa4cf25a61b2fc507e99fd37ff1bb25f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589f3ef078f15e37c6ae0bdb13bf980ca
SHA1a6fed86a78b80848ddc377e8143421cd506b8d21
SHA256786aa3cde6a326531a7105442eca410f2b35d581cf4a10d87f97d08a7b3c860f
SHA5124b85e99456ceeef3b0be436531e2cbbc1302074938750e4cc1bf36c24934b3ec3583cb47dfb022ec02765fdf30a58f5b4fd228f65992a1e73ae92b03ea3b3b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1dea8976ab1f8811bb74b016ca083b1
SHA15c9cc74f71f45d8be7eb8ce3209d70a696a14c06
SHA2569ef453da7d8eeb88993f945102241748b9729f299d36a08259a1d64e28c6c115
SHA512cb1695847da76981e3019bafc8d740b3c07fd501ed28fce4531da1b1385f0f9395862c1d44c9a5d176d3a85ed88481988e2a33ddfdd999e12790a3d19f913b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e64c84e4cf5e13e9315d1c33f6cbe9c4
SHA1cae6cb4dcd1d748536265489a57cd16dfe5daae2
SHA25690e19203149586ae391e31a501784c84f618e78a7edcee694840e2be185565dd
SHA51250feee28936ed6110cab53793fbc2e6fe3442b8551f12e3582ac0e3f3ab3eda30132b219020a25ac19a93a49e1cb43be33c6dffefa87c13e357d96407af3fbf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db2687e47effcdd2f64ec758e12c3afb
SHA1cc18305aeeb34a3768bdc41248eda411b22a9b1a
SHA25676cb606faf8948aacd57ab00da897e23f6ed33b75770971b31e8eb8384abeb34
SHA5122eedac0a57b0cfcf1ec1362f42a4fb360946225d594c0ab670d049be08173c659997d2fc758cc3d3f3718a04731544823552d9c09a97b637b9b206dfd60f82b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9713973da08cdf06a7a3624c49c5fcf
SHA11e711f864a6b1b01ac24a2ca932d30f7e4018dae
SHA256be85e2ec570ac02566b0ed955474e2c6d8a48299cbaaca3e4a8ca5f5167b165c
SHA5124fe3b708db8a5ba1bc08e9e4b8316665d0582a9f361c8e29114d4638f96a26bc46da4e610f19e07aa3663801b0599d383abf1e751034635bc5d87cfbad39884d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e13f9b04abf8e80dfbe63eb48e3828a5
SHA1d4a88c035698e31ec257f358156d2941ecd44bbe
SHA256980584757565e028c41f4e2784f9b3501bb6e10b58c23285cc2f42f77b626169
SHA5125b2fa5dc42ca0c0ab46b04513d626e0a266bfce8ea07707abb6337947ceea217187091ec9dfba78321428d4be20173de5a070002291fb304cd1bbb1ac65ee410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf04005375653d5c290aa80cd087c782
SHA14a7f753b46b209209f9d0c8bf182066b6a2c5bd3
SHA2568f43d674ff88cff8743f67c22c295e12786be18c5960ea755fd7161664d8dc3b
SHA512c75ed083e32411af96b390bfa2655f037382a7153458d1270f36376a720bbcc7b679eeeadae28dde66f1b6ad6aa072bef1c96548ad23a0cad9306591ad7fda07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da2477d260d2f61a16f8c56fd370ed38
SHA1af521fa4c265f7c0c1fb3840083469aad41fc2ce
SHA2563917f3f7a3dd6624ff0bb0bbcaa28d25ff10c44ed0e661a906778baa846e4ea9
SHA512f21a93ea754d70a7125adb5f561ddb1908e4a5b1f207ac638949808e2a522d785b59bfa2a1302cc89a17feebc628b3f826f2e41869d511db1ac95e2fe2731884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5110f3918837167b1971e126a09f2a178
SHA1d51f194c9f220627103a0d78c7f73162c6fc8b55
SHA2567f48beb6a0a7aca7a1d10a43a5d80ab4f506a978da75dc73d6dba071a314efde
SHA512dcabdf93cfdf96308d4efdcba202ba957febacdf6c215f89217dc745f336df92a8b719fe391614a68172b855ebae296e6029880c529269546fa8f6ad6f38cff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf868cbcac3fd6098f155c50e7fffe60
SHA1a9010a38d2a438582df3ef457ea337b8b650f0b1
SHA256b571f89a51a5292273159af73e00f0b81170a23bfc7d60399cf393c7d0e8e2a3
SHA51272f719bcc64b427faa5c18ad8ee2d2afbebfca3056789393d012463f8b204702389ac3eca704c7437fa73ac55c1ef0d6ea44a3ac98b623122cb7408fd2bf0a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfc0e9ceafa5144a11e303aea6e2f6db
SHA1f0dd0d05361a3de41a0131f2c5a31e94e1c050a9
SHA2569a8d9032c9773c01ed0cae20a49866ad1c221f19e7fab9994592d34915b025a7
SHA5125a6b8185646f47fe51d7e26cf4f3417b0031c7f32a47ea7964150dd0031a33f055715716f2fa040fbf20a5fb0617d5eedd7b6db119f55eec67e53642876cb05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a291a8418751bf123a618d53632f4475
SHA11c1124edd40be2c17c8faf0e4abef0255fa4e365
SHA256e2c036b6aabed60e858068e7d7bfce99e283354ae1c62afc45d65f01e966b0c8
SHA51298c70d5bb8f86bcb88342450088736a805d9f968420c9785eb5e3859f0d1039b60dea636ce5d017483e8cb181dd4e6c63705c394ecd56a1a9559c6fc5e836522
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27