Analysis
-
max time kernel
1919s -
max time network
1920s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
30-10-2023 14:14
Static task
static1
Behavioral task
behavioral1
Sample
f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe
Resource
win10v2004-20231023-en
General
-
Target
f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe
-
Size
152KB
-
MD5
32d85825a7f627cdf8070a379b6b464f
-
SHA1
5cafbcdb8ff731cca458ecde9a73e8f0514f0647
-
SHA256
f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0
-
SHA512
3a169cc376ea74d8715a9852a16d04bebfad4a48a79b32bc88bbc5780d97faa7676156d21ee156be40fca45d92e0d046dc3e32db376c2a73971ac2e303e9983c
-
SSDEEP
3072:vZMwqVSRFuYJOuN/9mlMH5KYCRDGNJeYh7hZ:hMwqVyXJOm8lqCRA
Malware Config
Signatures
-
Detects PlugX payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1696-4-0x0000000000430000-0x000000000045E000-memory.dmp family_plugx behavioral1/memory/1696-5-0x0000000000430000-0x000000000045E000-memory.dmp family_plugx behavioral1/memory/1696-16-0x0000000000430000-0x000000000045E000-memory.dmp family_plugx behavioral1/memory/1696-17-0x0000000000430000-0x000000000045E000-memory.dmp family_plugx behavioral1/memory/1696-18-0x0000000000430000-0x000000000045E000-memory.dmp family_plugx behavioral1/memory/1696-20-0x0000000000430000-0x000000000045E000-memory.dmp family_plugx behavioral1/memory/1696-21-0x0000000000430000-0x000000000045E000-memory.dmp family_plugx behavioral1/memory/2144-28-0x0000000000280000-0x00000000002AE000-memory.dmp family_plugx behavioral1/memory/2144-31-0x0000000000280000-0x00000000002AE000-memory.dmp family_plugx behavioral1/memory/2144-30-0x0000000000280000-0x00000000002AE000-memory.dmp family_plugx behavioral1/memory/1696-33-0x0000000000430000-0x000000000045E000-memory.dmp family_plugx behavioral1/memory/2144-34-0x0000000000280000-0x00000000002AE000-memory.dmp family_plugx behavioral1/memory/1696-37-0x0000000000430000-0x000000000045E000-memory.dmp family_plugx behavioral1/memory/1696-39-0x0000000000430000-0x000000000045E000-memory.dmp family_plugx behavioral1/memory/1696-41-0x0000000000430000-0x000000000045E000-memory.dmp family_plugx behavioral1/memory/1696-55-0x0000000000430000-0x000000000045E000-memory.dmp family_plugx behavioral1/memory/1696-57-0x0000000000430000-0x000000000045E000-memory.dmp family_plugx behavioral1/memory/1696-76-0x0000000000430000-0x000000000045E000-memory.dmp family_plugx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AppServerDis = "C:\\Windows\\AppServerDis.exe" f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe -
Drops file in Windows directory 2 IoCs
Processes:
f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exedescription ioc process File opened for modification C:\Windows\AppServerDis.exe f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe File created C:\Windows\AppServerDis.exe f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1DC9BA41-772F-11EE-86DB-46EFE16C03F2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005718aef034e0654ab00265bd8f8b2f5400000000020000000000106600000001000020000000bc9d293a6d84b62ea9e01a57d875f33b5fb983287114c0803d7a60271fc36f23000000000e8000000002000020000000e7d4f80d27e425f0c3e40d151d769baa9ae74096022800202982709aaa0417d620000000cbf9a4194732f85c484ae4e9ec5b80cb2ee40388e4c73e8180b71850787e33524000000074c30f3c6aef06e2cf4401905ed1acb1d68c5405bb75488d3a5ad6a6a21d48410bf69f6bbfc63c7c3fa97fc034013fb18d173dd8e4a213acb713e1e3e12c3843 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c138f33b0bda01 iexplore.exe -
Modifies registry class 2 IoCs
Processes:
f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exedescription ioc process Key created \REGISTRY\MACHINE\Software\CLASSES\MJ f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\MJ\CLSID = 35004200380034004500360035003800440038003800380043003200320030000000 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 3008 vlc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exemsiexec.exepid process 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe 2144 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exemsiexec.exevlc.exepid process 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 2144 msiexec.exe 3008 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exemsiexec.exedescription pid process Token: SeDebugPrivilege 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe Token: SeTcbPrivilege 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe Token: SeDebugPrivilege 2144 msiexec.exe Token: SeTcbPrivilege 2144 msiexec.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
vlc.exeiexplore.exepid process 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 2500 iexplore.exe -
Suspicious use of SendNotifyMessage 16 IoCs
Processes:
vlc.exepid process 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe 3008 vlc.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exevlc.exeiexplore.exeIEXPLORE.EXEpid process 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe 3008 vlc.exe 2500 iexplore.exe 2500 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exeiexplore.exedescription pid process target process PID 1696 wrote to memory of 2144 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe msiexec.exe PID 1696 wrote to memory of 2144 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe msiexec.exe PID 1696 wrote to memory of 2144 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe msiexec.exe PID 1696 wrote to memory of 2144 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe msiexec.exe PID 1696 wrote to memory of 2144 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe msiexec.exe PID 1696 wrote to memory of 2144 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe msiexec.exe PID 1696 wrote to memory of 2144 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe msiexec.exe PID 1696 wrote to memory of 2144 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe msiexec.exe PID 1696 wrote to memory of 2144 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe msiexec.exe PID 1696 wrote to memory of 2144 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe msiexec.exe PID 1696 wrote to memory of 2144 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe msiexec.exe PID 1696 wrote to memory of 2144 1696 f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe msiexec.exe PID 2500 wrote to memory of 2944 2500 iexplore.exe IEXPLORE.EXE PID 2500 wrote to memory of 2944 2500 iexplore.exe IEXPLORE.EXE PID 2500 wrote to memory of 2944 2500 iexplore.exe IEXPLORE.EXE PID 2500 wrote to memory of 2944 2500 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe"C:\Users\Admin\AppData\Local\Temp\f75ddb8104bd84b15c1bc9fae54d6a0da809ad001fc9e5c76ab2e733ccb684d0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2564
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\CheckpointUnlock.rmi"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3008
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RemoveSync.mht1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5caedc1b6af9cdf733b38c5807b111e01
SHA1a479186d676d9b8d9cbf5ec2ebc53cea953d3fa3
SHA256c3adf1d778eccae7202598d5d055191db297caab895d452ce9fda7631e3a3bfb
SHA512ad732f682bea2556d16ab7d30296a1430c5ac6a7c864b08774ed0afb7404a0b168957167f50c99bd3bb1109f6f5b9ae5fbbf72f3901a1ed27e2dd97056cd3c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bb86cb74bb0ecfe04874ea76df3aa8f
SHA18330663363c763321320c7f871e3c9ade56ef46b
SHA25653b233c6d0359bf08eefbfed8376e7e5782df7f893323e9e2ad93aad05a24031
SHA512f3e71de9b52d30d2d782925a159cb3fddeae001fcaa406e75f3215415b9b7690b13e162b8d239bb1fadeccc01ec24c02e2da5c8aff5a395a465868bb5aba9b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565812d34b3960b944ad2db2b552255b6
SHA1ff158e9034d71c40435acacd124f5e99f517a28f
SHA256900797a1db0764231853fc08b00da897beddd9ac433f8de5c35489a60a80a70f
SHA5129266cccaa83efdf1c078af785c5bdc035c3179c2ddf357b01f5a43e84765c3b80375b74ad1028bf106b8fea2155050196061333d7543b59cb1669fbf57b24d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5428974b89247a8178c23c8047ff39e69
SHA1f29bb3fc2141d36df2a9703a5a93ce644aaa9a87
SHA256bd7655c69b832ef361b56645ec2cbb31f4067ae8b20a37a4bf6200bd5c353cc2
SHA512561cdef8880fdf73d76c41405a5dcf03ad35752f0dca9d7294e531a5d63d2cafedc9663e943e9d27a00b7dbb6b9cb868c5d1fd0a415bb0aa33cc7e926b316cf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa78734eed5766952f3f90bb9ac21ed7
SHA1cbd68f3626383ac2b98498f7c8f33f1f4f8168b8
SHA256c6d56db04b30a10c9bb90a601e545fc7d36c435f0df482a2a7c9e5d27ae4acfd
SHA512761d46de0836e5b84d5bdbe77c8be45704c66ffdffa473face072916c1c353cbda459b4ce1c324fcf5a49d78a71ea7d0a39a50deaab01133f9941e122991cf0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e90a976584b89717ffdc79e74d18bcb
SHA1594d453c2501b94bf279f108b620834859373bcb
SHA256fe8ab0b16830a44c75c360bbca44bbf1ec735e24d7fc3f7b79dd5d6f8087acd4
SHA5121728d2f6754e95236470cf5aa47fee86d8483e89fa1d904c798eeb5f47cbfb81ebccfdef1081f19dbad31593dda8e4b5e79f6a90c2f1c75f479d3fbe72e433a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59647a67389d1c81bc76d7dd2dd8f7336
SHA18d3840e3cffa43d75beabc8890309c0d05fce713
SHA256e14cd60cfefc2fb6ae9b191e6e2c8a7c82063956914cc342041c9001104313a0
SHA512a5cd2a385ed3e39735e6232acc596a9531343ba694cd9df0c40a146e85e72a6606c026f91d920f39266c77fab60ca562d68ec73ecf18f94519438100e149d33e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55be119157393c1bb9d18ba1f9a4f6677
SHA1598d8f0024d4c0feba5c82eebebcf351112faab5
SHA256cf3ae46dca9d1d62d830e56c887b56f066909ea2b31aaf0daf49ec3099e0d122
SHA512fac1e592af51f140f9474ced99932df05359e6f4e76772ee849c94606bb621eca7a9e2a816d9a57e24e88b1bb5348b4b3234dbcf0a9afc63d4dd0310652ea0e2
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf