Overview
overview
8Static
static
3Kiwi X/DiscordRPC.dll
windows7-x64
1Kiwi X/DiscordRPC.dll
windows10-2004-x64
1Kiwi X/Kiw...er.exe
windows7-x64
8Kiwi X/Kiw...er.exe
windows10-2004-x64
8Kiwi X/KiwiAPI.dll
windows7-x64
1Kiwi X/KiwiAPI.dll
windows10-2004-x64
1Kiwi X/Mic...re.dll
windows7-x64
1Kiwi X/Mic...re.dll
windows10-2004-x64
1Kiwi X/Mic...ms.dll
windows7-x64
1Kiwi X/Mic...ms.dll
windows10-2004-x64
1Kiwi X/Mic...pf.dll
windows7-x64
1Kiwi X/Mic...pf.dll
windows10-2004-x64
1Kiwi X/Mon...o.html
windows7-x64
1Kiwi X/Mon...o.html
windows10-2004-x64
1Kiwi X/Mon...ain.js
windows7-x64
1Kiwi X/Mon...ain.js
windows10-2004-x64
1Kiwi X/Mon...bat.js
windows7-x64
1Kiwi X/Mon...bat.js
windows10-2004-x64
1Kiwi X/Mon...fee.js
windows7-x64
1Kiwi X/Mon...fee.js
windows10-2004-x64
1Kiwi X/Mon...cpp.js
windows7-x64
1Kiwi X/Mon...cpp.js
windows10-2004-x64
1Kiwi X/Mon...arp.js
windows7-x64
1Kiwi X/Mon...arp.js
windows10-2004-x64
1Kiwi X/Mon...csp.js
windows7-x64
1Kiwi X/Mon...csp.js
windows10-2004-x64
1Kiwi X/Mon...css.js
windows7-x64
1Kiwi X/Mon...css.js
windows10-2004-x64
1Kiwi X/Mon...ile.js
windows7-x64
1Kiwi X/Mon...ile.js
windows10-2004-x64
1Kiwi X/Mon...arp.js
windows7-x64
1Kiwi X/Mon...arp.js
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06/10/2023, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
Kiwi X/DiscordRPC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Kiwi X/DiscordRPC.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Kiwi X/Kiwi X Bootstrapper.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Kiwi X/Kiwi X Bootstrapper.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
Kiwi X/KiwiAPI.dll
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Kiwi X/KiwiAPI.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Kiwi X/Microsoft.Web.WebView2.Core.dll
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Kiwi X/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
Kiwi X/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
Kiwi X/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
Kiwi X/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
Kiwi X/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
Kiwi X/Monaco/Monaco.html
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
Kiwi X/Monaco/Monaco.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
Kiwi X/Monaco/vs/base/worker/workerMain.js
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
Kiwi X/Monaco/vs/base/worker/workerMain.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
Kiwi X/Monaco/vs/basic-languages/bat/bat.js
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
Kiwi X/Monaco/vs/basic-languages/bat/bat.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
Kiwi X/Monaco/vs/basic-languages/coffee/coffee.js
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
Kiwi X/Monaco/vs/basic-languages/coffee/coffee.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
Kiwi X/Monaco/vs/basic-languages/cpp/cpp.js
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
Kiwi X/Monaco/vs/basic-languages/cpp/cpp.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
Kiwi X/Monaco/vs/basic-languages/csharp/csharp.js
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
Kiwi X/Monaco/vs/basic-languages/csharp/csharp.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
Kiwi X/Monaco/vs/basic-languages/csp/csp.js
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
Kiwi X/Monaco/vs/basic-languages/csp/csp.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
Kiwi X/Monaco/vs/basic-languages/css/css.js
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
Kiwi X/Monaco/vs/basic-languages/css/css.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
Kiwi X/Monaco/vs/basic-languages/dockerfile/dockerfile.js
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
Kiwi X/Monaco/vs/basic-languages/dockerfile/dockerfile.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
Kiwi X/Monaco/vs/basic-languages/fsharp/fsharp.js
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
Kiwi X/Monaco/vs/basic-languages/fsharp/fsharp.js
Resource
win10v2004-20230915-en
General
-
Target
Kiwi X/Kiwi X Bootstrapper.exe
-
Size
178KB
-
MD5
9f07ff71a41d0707a88c679aeead9bc1
-
SHA1
4c003b20f81fda703383c3751ac2bdeb41a57987
-
SHA256
4d819c0df101498676f943c688edcd812161be8e82fd2a1877b5690cd3679ca9
-
SHA512
c1537f0050fd22edcbd5e47bf4c13754a9126ebe897a2be42d45e302e1dbad2da69af0487a3d2eb373184ddb1c682dbef27ddef616faf5f0c19bd566ae767d62
-
SSDEEP
768:TIEJncjFwUuDtL1uogdqbYBKuv4+CdQpKEBy0lGtCvvApflHp+jEJOxCjZonIrjs:TmMmKzz3GMIh5
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2888 Kiwi X.exe -
Loads dropped DLL 1 IoCs
pid Process 2604 Kiwi X Bootstrapper.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008c66dacf3255794896cbcb5ac20a7140000000000200000000001066000000010000200000000a8975660b38c1e29e14b45c8118c121f293e1db75c0d2e1fe71b4d6b5f860f4000000000e80000000020000200000007796adfe4e54b09b311b190ca93bcb5781d7b0492eb9536b81a4099ad3027f459000000033fe9927d895b16b32db4567e60a97c059827b2ac80df425819722f95c1134c9353dd5451095b24f9664a5ed734f3a311ddb694398dc20604e44f17863313f612728449a9b18729e257c2dbc3f165b6c74d98d5f9961e82c382a42dd37df8613d84da8138fafbbff9818fa1a27545f70774ca0ba6698d785e7d9788ce308281e8f9188964cd6330bda97cea261d6ee2a400000008afb089e5fea8935a8653fa8b30795403ac9053bdfcb240c9281719ece72822a0720542dbdf49163186c8f1681ba5e9826220df91ec181dfe914317905349f76 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48A728F1-644D-11EE-9BFA-76A8121F2E0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e071fc195af8d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008c66dacf3255794896cbcb5ac20a7140000000000200000000001066000000010000200000007edef0cdec4a093901087295f1683deccc9fa03a758ab118a930f95534b66df6000000000e80000000020000200000002363796d96d7f02d197f69e59f47eb935b0aeb7ac783f6a756d2d5e7913ad1ae200000003e30a2db17c3db06c9d1a43da1d1f5ab6d72930ae97fd85f9d39a9c81269bf3a40000000cca2d01d8e7aa09b16e017b7211703a7d0ea9a3fe3b54d61b24aa8a004b08a1480a94ccb14d4a6d52a4f5ee5499e20a33f10f755c0e6b2c600aca45d3c4d2c1e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402761227" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 Kiwi X Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 Kiwi X Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 Kiwi X Bootstrapper.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2604 Kiwi X Bootstrapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2604 Kiwi X Bootstrapper.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2560 iexplore.exe 2560 iexplore.exe 1340 IEXPLORE.EXE 1340 IEXPLORE.EXE 1340 IEXPLORE.EXE 1340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2888 2604 Kiwi X Bootstrapper.exe 28 PID 2604 wrote to memory of 2888 2604 Kiwi X Bootstrapper.exe 28 PID 2604 wrote to memory of 2888 2604 Kiwi X Bootstrapper.exe 28 PID 2604 wrote to memory of 2888 2604 Kiwi X Bootstrapper.exe 28 PID 2888 wrote to memory of 2560 2888 Kiwi X.exe 29 PID 2888 wrote to memory of 2560 2888 Kiwi X.exe 29 PID 2888 wrote to memory of 2560 2888 Kiwi X.exe 29 PID 2888 wrote to memory of 2560 2888 Kiwi X.exe 29 PID 2560 wrote to memory of 1340 2560 iexplore.exe 31 PID 2560 wrote to memory of 1340 2560 iexplore.exe 31 PID 2560 wrote to memory of 1340 2560 iexplore.exe 31 PID 2560 wrote to memory of 1340 2560 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Kiwi X\Kiwi X Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Kiwi X\Kiwi X Bootstrapper.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Kiwi X\Kiwi X.exe"C:\Users\Admin\AppData\Local\Temp\Kiwi X\Kiwi X.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=Kiwi X.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1340
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584e8871727519fdd113db1819038e61f
SHA117fb9c0ed659f3e2d08f94bc689ee3ab0154ee44
SHA25696b895035926b4a13afa44d965f78913005398c94d53c3e39f22e2ea1de7386e
SHA51213b46adbfd367dddc4ca4aaf0aa77d9c92de500597c47604501c2d0b33bc9f456c8404b06af138c9b77dc4403960369e38b79cf0892219169b6e0d0842854cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9b08f237c8b9dbe8c19e3f2f1a4afe8
SHA1b6cbb5b38e55f1936a92446cdbbaa6c917ce338c
SHA2569d003e97093c80571061acb09c23f27277951626bc896536c03007c79792fa8c
SHA512f160890311f43e150c7fc56d09f4972832d7138d0f9547e8f6306e94ec24f533093c55456bf7be985452eb71abb185d45143b5a43784916383546448d5dd01a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549d79a0c68bed0273c6e87baeccb3e05
SHA19365d5991cef7da54b22e314f166667cd094ad59
SHA2560f066d9bd18155e203a0868996d2e878d767fefd592adec2b2a0669100022e35
SHA51284243d147c9450a6350c6d1fb1b6991f0644678b60c10c9f3dcd84c9dd76a9ab47f78ec71b28134a7f8d71e43da2363ce601c7cc198541300d86b74af027bc77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503eec170c9b351e9cdf38fd5d5c92a6e
SHA1dbf92dcd78cf33c78a6531a238112f4c50ff7727
SHA2566b25a5d8a67ba8fc8506e079ca2f51ea63f62227758032b81f1bd582a7511b1d
SHA512f237b691a3f5f78b4f355eb1ed059c972d12b468ced968c8900143ff0d356b74a97f4f415365ea952169ae912a46f0071ad0905db6fa3e1ac60bf547d2fd3c05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7ff6c32c83a60fcee812883897f214b
SHA159a59683125403656028c5735d435d05a2e048c0
SHA256109bc85b43028b7857dd177a6f7e6ce200b4b032e560a1b3afc1b34613376427
SHA512b2a9c4847575690b602e980dab78633011c0da4e5b9f449e2ee07d385a2c2fe3834858884ae667d07001697087077c544ed82e848d252879fac44ddbbe159b39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5832ad79020b1b058016424c6fac259ad
SHA160914199619f62c307bc71ba24be9f03bb8d30ea
SHA25637dd2b92b30efae7e0a7eefeb587f0d0833ee7d884c98ec28c991fd20089b2f5
SHA512ac3d2ff412caf4c5df74fa91e60459bf04f41a8269520ee8663b1cb516f3789bc85e1770edbb619034744072cd1a3ddcbf85b8861c3ca4c855865dec2079923e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8d8a759213062048e5a704af053a15d
SHA1b8945c78aa86a102034c13305b600c2bf502af43
SHA256481a78f0f6df9d5b1b4cd43cbf9d5373af4178602bb7a841bf1d577aca2ad087
SHA512343ce823ab138757572070ef9eb5860ad5894ced7fbc4254890f551e87f0013af6f35d385c9526478fa67fbfa78051208035e1e2d7ac21f9abc69fda7b7c82f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5366bca5c31e5e691e468652b46cc7173
SHA15ba4825ca20c8f72c26e8f2ae159883b69dcbc44
SHA256343034a8c2d1530cc6ca6430521b4d6287d342ce80358d700bfe90cb0d4b8632
SHA51256dc18e23a5b6a0f89db9b21fa149a593f5296ad0e90af8706bfcb24e863a6f4f8a2ae33aedb14f3932281fd854940bdc1fc5061926907c62149f6c2ef142605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d45b51a3a255e7cef8ee204a0b514271
SHA1d5e7e8f783b47d63d4ad352217b038c1848a8182
SHA256072cd4b725828c6b333bc78750d4b213cfd3bfb25443b3bc8cb4a085f2ea73b2
SHA512b17894855d3028e44d08027d4177ef28ca6e9afadfea1e776509e7cd31a387aaa786cbb00208d973593d2bbb882a58c9d537f8ec6c570a4c117b84d83f78f276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb0e268cb81346b3295522f1737671b3
SHA150a1a35f4ac95eafeceea2e0e6ae45624d300ef9
SHA256c64ae753fae0de190fc8e678771ef6de6f9dd4233373f8473158893eca39b989
SHA512dcb7649dff60310feb49adb850bd1ff9ca337b765e2ec63d37c272f6166e46015d06b36e4ae7d3463b549d5ef9d6dfea7d9474376fddd36822e82bb100b47683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f1a1d8c2f3d0164954d9359bf082742
SHA1c85ef3e26535e39ce2952e8c988bdf78d29d0c0b
SHA25647a2b9808929c317d9fb777b1bb2a7ad8c7c49c9385afa006c30f03cc9b44dfc
SHA51222f173e7d62b2bf51d4cda9f58dc85773f76d8e0389fb756d010a67de0ddf5ef415c5a8fa98b1a894be8dbe3f6162752b2f63a1aa4895f965655a122b4b3ca0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c2f1c6b79af4fb5e30f9d2ed9c34cf8
SHA19326ee02c08e5b77b5dd44a368cb8a7f3ae42caf
SHA2566e6664ab3a92cef668dca17c341020c2b41dfe91a840019df8dcd26afde1b13d
SHA5125ac359265a1f3db183b8291334cba4009b4b72767ad0b8ec9661bd56189b74e0bd57081284336bd802c5ff16db7c738f173524ebef634dfe1c38a3a6140834c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5b82d924bc50941de4c4b4c055f2837
SHA16c7dd9d659c8bbebaea28a1cbd585234297e4ec0
SHA25609c5bf9c471f0804002151bb97769c927359909df0397ccfc14f689a102a3e7d
SHA512c1a70d87672cfe9e5a9f263eb3ffc72d356478704f70decc4c6650ebe22725b1f09b8093d5b9d6a6dc85d9bd2d6b9ab38fbc4f5c3a1cdf76f42ac1ce16b90321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550a60c774879e362a058ef27ccd40160
SHA170921293a3c886592f7f4c094651457ddcac3d38
SHA2564239e295880e4966a93bc96e75091b6e67269a2c9b36083b97a6484642a257b1
SHA5125889b0825392e9e82f5c5f2c5f6fa151ee0ba1fa00c7c388f64e1873749a86dba9ffa6d25a9e78cd8028d12693fc94e26942b2f217d0ceca44697631f9c392f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bea922643509f3b068fb92e23002ffeb
SHA1e606b83d990796b8ca7317bd1ccfeee6c53cfbea
SHA25668e88515698dbf6e7efda89cdb9ea3f1925b9045156bfea8cc6b1a6cf998632d
SHA5126dc0dfde10c6756b3d51eed75164b0a6df4abc77347a6e4659dbd7754c67d74065b736fdcd9c6c77f12b297e73f50dea6733121a65c5eb6422928ea232ecd7b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af8ca5c28c322f116192e9c0f1793e21
SHA18060be4bdba4ab6a2b8fe57cf2293f665fca1b32
SHA256a7a9fcb2c8b8630173df14dd23f532f1fe24c8a2d9f3dd6a11ceadefb9fb2b3c
SHA512a05c29a322de66c4823cdadd4d67f416bf8d845b56704240bfd3300b3d75e06716e1dd43f679d73f234542bc3e2d7c500d26be96c7dff0473426c8fec9c3e4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d57e79ed7166b05eeeb36874fa95f03
SHA1b56c1105e0385546dd0899370d822cc242329f3e
SHA256b27995ed2121c4db889079d72df8c41c9b2125e2723692889b8392b33e430a80
SHA51222f6ec5c2225c36d05dcbf1e34b9e3d47ff8dc9ce90b40ae9c0ecd904c003ba7bea2d9df2c36fdde8ea18903040fa4acad8e28e6c42ee59515e647cac1074b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f14fd368c36fdd0e41626a2e6c9d7074
SHA13d3be9ac3f712e1a28950e8508d49775dc01cbfe
SHA256542ca4343b7462499d9859d9d1b216b97d3f0a7f89a1893943b8531356d7e0dc
SHA512cea5efb5dee16c644308729074650b159280fc123f32ee29a821c84bc6d87e01905ad5b221481932e6997f0748ab4a6fc0b296b23f9bffce475f047a4a289e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577c7e8cacecc495c857063f99ebb3e8b
SHA1584e89f6cbc7e82aa31dfedfe44d34724e83a003
SHA2560b37ab63d81a7e2713103dce5f7688ab2bb154e7a03f34d38372bf36bf27e6ce
SHA512afebc79cb6304c7a0615d7aa8640685a2fb756df4a94eeb5263f66e7cdae56ddc5ef4b0ff535aba99430576081c0c3462a103edd9c1f801dbb4085c4c0c6f52b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575862fd29fbe2314312bd784ae4dc299
SHA15490ca4b5bd43dadccc60c7eb9de2518d4d4bdeb
SHA256ce7556d3802671a2f19d6eff344942796721a603e1304a74b971c64a8b2bf32b
SHA5120ffc73eae37e9978edded2d5a1691e403591316d6e66d09245d7e7018ab7e3f5320e85f9d3e74e53fd3ab7535861e7709f171e63ac5d477b414299ee85e5be55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa532a2704de0c86982bad41ff3b212f
SHA1fd43ea7eced233cc6a42bd1a1b791941e92a945a
SHA256ab255052af1d2afd6f328c3a5c07f953fe3bad090300d65d2b91b3a08ce5fc6b
SHA5125e177f3cbab7501ee0f16c2254d7e61ddf3feca10d8d504dc2dc91f360a5d73a6dee445da94a18c2f3fc18f3788522df906d281efaeb855e87f8a785149654fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c97c56ad715d7b8411f3322d16b1177
SHA11f6e7cc21ca5fca78de3f7d676fe484639fa0114
SHA256984ce76db8f3c445ba16477c42f571bdbb6e7a81235306ba8ee1cdefca2f8425
SHA51272ba37563eae8d8fd0d49fdd64d8f4d0495dd04f1c7235378679e2eeb4388c904e28b5112dff29997f2a06cd6840351ab89646a2810a02abe5ed4b6d888457e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c6655cdadb4f56646c452eaa3003c7b
SHA1ae22112508c5f01436246d8fd3ac23313743ce58
SHA256385c0548aee9966bf2e5490341270a917e67b2c136b4cbbed4d963d199010871
SHA512215a65514b7f9f9f78107f6169d7516d1ae9965d79197b2fed103389b694120ce19f8eddca76da6642c55b8c4ef3d82addf7733c7ce1dad4a3db270f10fe11f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f7bd6c9849bb3bf8fa9ec4dd0673bc
SHA109706848d973979880f709caf154d1d2a06a99d1
SHA256fe65e76ad61100f7425062f236ce2f978f77b9faa14733e535da7456fb355060
SHA512d7056ab463a08b0d2106e1e69dac5e686843e926399714c2013cf99ae7063a799bf40f9748d1abcacfdec610208bff13f30ddb92c6103e5d58c210d78ee001f9
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
3.6MB
MD5fec7d6eb28d5a5f7efa5c9ea650bc707
SHA11648cdc041fa877a1673f89e8bba55c907ebb482
SHA25638dc036fe74786370f66ac38cd66f6a4e7afee80380e5253807fa3fdf1457020
SHA5125562ef46650fc97340cbb17ae7f825a97167e183be90286f8e13b8528019c89f28ac10b94d0fb3ac4c1cae2363a1a734fcca3fb5f8b0ce24cc5f1bc298fbee39
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
3.6MB
MD5fec7d6eb28d5a5f7efa5c9ea650bc707
SHA11648cdc041fa877a1673f89e8bba55c907ebb482
SHA25638dc036fe74786370f66ac38cd66f6a4e7afee80380e5253807fa3fdf1457020
SHA5125562ef46650fc97340cbb17ae7f825a97167e183be90286f8e13b8528019c89f28ac10b94d0fb3ac4c1cae2363a1a734fcca3fb5f8b0ce24cc5f1bc298fbee39