Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-01-2024 04:02

General

  • Target

    453b1f8024eb2cae23617bf7b1721a7c.exe

  • Size

    1.4MB

  • MD5

    453b1f8024eb2cae23617bf7b1721a7c

  • SHA1

    5fb3e994d80f67e9ccbf1548a1d989872de6b7b3

  • SHA256

    e14f4ccdd8da390ab4170e041b4654e51b229b6d925b6366596ec3fc1365d860

  • SHA512

    360ba38afffd21bc263f87c3e5a660cbf041c00087431767e75707be091739ed5b49eca252b63161b2a2f04a37ead7fac5a4258c7939750e2a9ce6b04b1c0420

  • SSDEEP

    24576:TIVFA1pqtg/TnMbX0lwyh0FVmEByA1swFYyOsdwsuQOSIt21QbYfS0IP:CFA1pvTMbOwa0TmUqMYEOFQOSIsQbY6J

Malware Config

Signatures

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops Chrome extension 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\453b1f8024eb2cae23617bf7b1721a7c.exe
    "C:\Users\Admin\AppData\Local\Temp\453b1f8024eb2cae23617bf7b1721a7c.exe"
    1⤵
    • Drops Chrome extension
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im chrome.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im chrome.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1172
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3500 --field-trial-handle=1848,i,7574460607382488655,14440472972296219075,131072 /prefetch:1
        3⤵
          PID:912
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2784 --field-trial-handle=1848,i,7574460607382488655,14440472972296219075,131072 /prefetch:1
          3⤵
            PID:4984
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1848,i,7574460607382488655,14440472972296219075,131072 /prefetch:1
            3⤵
              PID:4004
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1848,i,7574460607382488655,14440472972296219075,131072 /prefetch:1
              3⤵
                PID:4492
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=2264 --field-trial-handle=1848,i,7574460607382488655,14440472972296219075,131072 /prefetch:8
                3⤵
                  PID:1460
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=2136 --field-trial-handle=1848,i,7574460607382488655,14440472972296219075,131072 /prefetch:8
                  3⤵
                    PID:452
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1848,i,7574460607382488655,14440472972296219075,131072 /prefetch:2
                    3⤵
                      PID:4120
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3816 --field-trial-handle=1848,i,7574460607382488655,14440472972296219075,131072 /prefetch:1
                      3⤵
                        PID:5348
                    • C:\Windows\SysWOW64\xcopy.exe
                      xcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\" /s /e /y
                      2⤵
                      • Enumerates system info in registry
                      PID:1888
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x104,0x108,0x10c,0xe4,0x110,0x7ff913d19758,0x7ff913d19768,0x7ff913d19778
                    1⤵
                      PID:224
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:4600

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\kjkfjbddnkpfcflenfcleijhgaaiapaf\8.66.88_0\background.html

                        Filesize

                        786B

                        MD5

                        9ffe618d587a0685d80e9f8bb7d89d39

                        SHA1

                        8e9cae42c911027aafae56f9b1a16eb8dd7a739c

                        SHA256

                        a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e

                        SHA512

                        a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\kjkfjbddnkpfcflenfcleijhgaaiapaf\8.66.88_0\icon.png

                        Filesize

                        6KB

                        MD5

                        c8d8c174df68910527edabe6b5278f06

                        SHA1

                        8ac53b3605fea693b59027b9b471202d150f266f

                        SHA256

                        9434dd7008059a60d6d5ced8c8a63ab5cae407e7152da98ca4dda408510f08f5

                        SHA512

                        d439e5124399d1901934319535b7156c0ca8d76b5aa4ddf1dd0b598d43582f6d23c16f96be74d3cd5fe764396da55ca51811d08695f356f12f7a8a71bcc7e45c

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\kjkfjbddnkpfcflenfcleijhgaaiapaf\8.66.88_0\js\aes.js

                        Filesize

                        13KB

                        MD5

                        4ff108e4584780dce15d610c142c3e62

                        SHA1

                        77e4519962e2f6a9fc93342137dbb31c33b76b04

                        SHA256

                        fc7e184beeda61bf6427938a84560f52348976bb55e807b224eb53930e97ef6a

                        SHA512

                        d6eee0fc02205a3422c16ad120cad8d871563d8fcd4bde924654eac5a37026726328f9a47240cf89ed6c9e93ba5f89c833e84e65eee7db2b4d7d1b4240deaef2

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\kjkfjbddnkpfcflenfcleijhgaaiapaf\8.66.88_0\js\content.js

                        Filesize

                        14KB

                        MD5

                        dd274022b4205b0da19d427b9ac176bf

                        SHA1

                        91ee7c40b55a1525438c2b1abe166d3cb862e5cb

                        SHA256

                        41e129bb90c2ac61da7dac92a908559448c6448ba698a450b6e7add9493739c6

                        SHA512

                        8ee074da689a7d90eca3c8242f7d16b0390b8c9b133d7bbdef77f8bf7f9a912e2d60b4a16f1c934f1bd38b380d6536c23b3a2f9939e31a8ef9f9c539573387b4

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\kjkfjbddnkpfcflenfcleijhgaaiapaf\8.66.88_0\js\jquery-3.3.1.min.js

                        Filesize

                        84KB

                        MD5

                        a09e13ee94d51c524b7e2a728c7d4039

                        SHA1

                        0dc32db4aa9c5f03f3b38c47d883dbd4fed13aae

                        SHA256

                        160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef

                        SHA512

                        f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\kjkfjbddnkpfcflenfcleijhgaaiapaf\8.66.88_0\manifest.json

                        Filesize

                        1KB

                        MD5

                        f0b8f439874eade31b42dad090126c3e

                        SHA1

                        9011bca518eeeba3ef292c257ff4b65cba20f8ce

                        SHA256

                        20d39e65b119ed47afd5942d2a67e5057e34e2aef144569796a19825fea4348e

                        SHA512

                        833e3e30f091b4e50364b10fc75258e8c647ddd3f32d473d1991beda0095827d02f010bf783c22d8f8a3fa1433b6b22400ad93dc34b0eb59a78e1e18e7d9b05f

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                        Filesize

                        18KB

                        MD5

                        0508050c24d96fc42734039ca001b9da

                        SHA1

                        d047f5325c5c9d6920973b70b94043b526960f1e

                        SHA256

                        539dc1e6534934e630a5525caf1dd93fdcf07fc488ba1b3ab7743c6523eb9935

                        SHA512

                        3f8917eb6ffce1c3fc977b4987983109d91fcd47b6e7faf6e157fad8217a49bc0f90c6c875cc0bcd3cc78ece82abf71c80fa9f35c21389ed225ec3ece5cab82d

                      • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\CrashpadMetrics-active.pma

                        Filesize

                        93KB

                        MD5

                        9a73d25cf9983a6730a7497760a8f727

                        SHA1

                        4dd12496ea1330e6d8662615f1501e8775a2e64b

                        SHA256

                        2260fc70983a81885eb1ece06ed715e7791211c2c9c29293bec52a725c02a6b4

                        SHA512

                        584e9dc83d4608314ce337d5d66b177b339bad5589597ae2aa2335cb5713f68bb7cd852090f9512f029ab7a88abdcecc34f49952cc83848da1ad7a2d6eb7d171

                      • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad\settings.dat

                        Filesize

                        40B

                        MD5

                        bb2cdf82802bf69b297c9fae3fa48e85

                        SHA1

                        f26dbf7984929197238377b2b3e37f974447448d

                        SHA256

                        29998264d3f24068d6705e32cb6306f042797a0025aaebda57b3c581a49be0c7

                        SHA512

                        00535865805747cb5fe10f4f67872b52e94fd0ce51937f94a7662254027919b13df4af538557116cd4a8002afbeb295c601a79d5e64c8d2d2de9cf377eba1db7

                      • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        48B

                        MD5

                        004827d91cdbc91386295b1fe18e18f4

                        SHA1

                        65a16775217d855f72196977c116427d86b7478e

                        SHA256

                        84e3ccb3e21fbf0ccf90bb5b2457f5e0772e959ef147c035ae8b2669d8a9bcca

                        SHA512

                        fac1012fe940148ebb5aa1be3256e39010a2ea49e73c1739aa0776fe9c86f6d494aa046e18d5e440d6972f9c903d8dadb8317e27e44389220eafea13a89bd042

                      • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        672B

                        MD5

                        15068666c931db83b920862a7919674f

                        SHA1

                        df5d2ffa0204b72742596dd03f3aa1d14bdf046f

                        SHA256

                        43f4bdebcc26d99545663f68a687635c3ddbbf648e02035032bd42df1253c8ff

                        SHA512

                        2acf88163f7a9af5f970fc34caf8ed610233625ee38ae8107bc7d53214fc7aa76ef40e17affeeb2691cb94a08fda59ca4135cb9f2bcfcda98778d93a5f4fa50a

                      • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\_metadata\verified_contents.json

                        Filesize

                        18KB

                        MD5

                        2f0dde11ea5a53f11a1d604363dca243

                        SHA1

                        8eef7eb2f4aa207c06bcdd315342160ebacf64e8

                        SHA256

                        5a2940c7c5adba1de5e245dbff296d8abc78b078db04988815570ce53e553b1d

                        SHA512

                        f20305a42c93bcde345ba623fef8777815c8289fe49b3ec5e0f6cf97ee0d5b824687674d05827d6c846ee899da0d742407670db22ff0d70ebee5a481ab4a0ff0

                      • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extensions\kjkfjbddnkpfcflenfcleijhgaaiapaf\8.66.88_0\js\background.js

                        Filesize

                        15KB

                        MD5

                        ada3d930e163dc3e8528bc0e10de6ce2

                        SHA1

                        96d76479e8630a7a09c9eff6155f78e8f559ad7e

                        SHA256

                        90307b05b888ef9ff89a5106f0ba17e63fdc285c4fe91bf32c4108a5ca86e3f9

                        SHA512

                        0ac019e080a0333a213a97628a0906ac31f0f086a83736d3afefa843683577fcf2dab082d825c2481bb22affc75d5da93ce733ab1dce093a492769f4231f5e22

                      • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\8a7d919f-2f65-42f7-8c6f-4348f2b4c08f.tmp

                        Filesize

                        868B

                        MD5

                        af7e52662c4ad40c7fc5d1fb2438255a

                        SHA1

                        85b1679efeebfbc34eb5acfaa244a7aa38bf1eee

                        SHA256

                        46d2757be1a07e614c8e1de77cde77e09eb08fbc86aa82b3eea052d50f259dde

                        SHA512

                        a1a644eaacbe76f06887fb2d063547c65740e24c9c824e3744a898283e887f9d8f11a28217d25fdffcb261276755d031c611b01f16d133eed2790023cd1319a2

                      • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

                        Filesize

                        868B

                        MD5

                        38d3a7df29ba9a860327c4a7c5e1be71

                        SHA1

                        aa5b9d1dca4e48eb8c85cfc114cfebba20620e47

                        SHA256

                        fd38d43e0e81c195c751f0284fd7fb2a73a316244ff4773da67dbcdb361964f8

                        SHA512

                        9549d3a9455dbed5ed585b7342d2d64cb3ba85b88bdea5fdb345e3926ca7e8a76acd390ca917525a4aa879e77c5be3d198896bbd5398e3d6bdbdb95f0e5c3ae8

                      • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        c1f4d641cc0b50167d177b0fd6146377

                        SHA1

                        abf3b8d816a54c4c21c81627f0beac8de937eb60

                        SHA256

                        c36289b7557dab66d302a139f6af72358138e4039961b6a4c84b63aaf438b3ec

                        SHA512

                        e2ed029cf083e82dd20e4c94bf288c285a2eb56e3a8821e0bf9ffdeb5608fbd870ecc9ba65cc4ad53e63ea5acf4877e8976262f6979dd0e8d3a9a1358445280a

                      • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Last Version

                        Filesize

                        14B

                        MD5

                        9eae63c7a967fc314dd311d9f46a45b7

                        SHA1

                        caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf

                        SHA256

                        4288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d

                        SHA512

                        bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8

                      • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\ShaderCache\data_0

                        Filesize

                        8KB

                        MD5

                        cf89d16bb9107c631daabf0c0ee58efb

                        SHA1

                        3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                        SHA256

                        d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                        SHA512

                        8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                      • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\ShaderCache\data_1

                        Filesize

                        264KB

                        MD5

                        f50f89a0a91564d0b8a211f8921aa7de

                        SHA1

                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                        SHA256

                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                        SHA512

                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                      • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\ShaderCache\data_2

                        Filesize

                        8KB

                        MD5

                        0962291d6d367570bee5454721c17e11

                        SHA1

                        59d10a893ef321a706a9255176761366115bedcb

                        SHA256

                        ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                        SHA512

                        f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                      • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\ShaderCache\data_3

                        Filesize

                        8KB

                        MD5

                        41876349cb12d6db992f1309f22df3f0

                        SHA1

                        5cf26b3420fc0302cd0a71e8d029739b8765be27

                        SHA256

                        e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                        SHA512

                        e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                      • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\ShaderCache\index

                        Filesize

                        256KB

                        MD5

                        1081fa566e80a90ff44555f0ab89c1bf

                        SHA1

                        666321b8ba5d9fff6920669f9fa0d6fc72d7a4ef

                        SHA256

                        f3c53df75ac00b54baae01fcd36f265bbe2701c4c1e03a07dad68c8d08e30d83

                        SHA512

                        dbd7bb45c350ae6b40e924582dc9ccfb75ac14ffb3494f0529626a3d28f23019916e610855137872825bf60799cdca1353f9c98722834be065a51070d13ba97f