Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
8e1cb59d9b4995f148f0750e19d7364d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e1cb59d9b4995f148f0750e19d7364d.exe
Resource
win10v2004-20231215-en
General
-
Target
8e1cb59d9b4995f148f0750e19d7364d.exe
-
Size
67KB
-
MD5
8e1cb59d9b4995f148f0750e19d7364d
-
SHA1
1ecfc110d5e1d682cfada01fbcc73ff02cb151eb
-
SHA256
b9f4ad753c98772c744cf6fd019cc2a6bd16dbe2bb14ae9eda2e22f447b17d56
-
SHA512
9bef0c1300c610865fc048220064cf939b56c982c777aa61fa9e84026be431ea25c5b5da1a79e1899a90cfa4486614c5f9df521de5640dd9905fa7d31d370062
-
SSDEEP
768:9xeureunneuIytcStnb6Xn9UgucR4XZjwttI9Nuz6Ff9LJW1XYApsCR6GJ4Dsxul:BcSZbtaRIZOIj7F9LYXfnxkU0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1532 juschrd.scr -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winprot = "C:\\Windows\\juschrd.scr" 8e1cb59d9b4995f148f0750e19d7364d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winprot = "C:\\Windows\\juschrd.scr" juschrd.scr -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\juschrd.scr 8e1cb59d9b4995f148f0750e19d7364d.exe File opened for modification C:\Windows\juschrd.scr 8e1cb59d9b4995f148f0750e19d7364d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68E5D011-C30E-11EE-BCDB-CE253106968E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d30000000000200000000001066000000010000200000000776b7934d7454bda43eef362af281dcef81304b3791947232ee5adbb6a228b4000000000e8000000002000020000000f73e629f8c4265c0bc3aa92c485bcb0d369035f783058587c0bfb614800b8cf1200000004368892f90e5805eccbdf8db87fa5d96ac6c50921dad0f48d33c9a4a889571cc40000000e95473f7908db5e3e04e03b3cd1004daaaddc903e215be5298c34c38e26895eaf1762114246aa3520d301526d89e722af845fe6a976c75c42559453d9dca07a3 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0029cd3d1b57da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413179583" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 juschrd.scr Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 juschrd.scr Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 juschrd.scr Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 juschrd.scr Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 juschrd.scr Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 juschrd.scr -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr 1532 juschrd.scr -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1184 iexplore.exe 1184 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1184 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 28 PID 2532 wrote to memory of 1184 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 28 PID 2532 wrote to memory of 1184 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 28 PID 2532 wrote to memory of 1184 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 28 PID 2532 wrote to memory of 1532 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 29 PID 2532 wrote to memory of 1532 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 29 PID 2532 wrote to memory of 1532 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 29 PID 2532 wrote to memory of 1532 2532 8e1cb59d9b4995f148f0750e19d7364d.exe 29 PID 1184 wrote to memory of 2700 1184 iexplore.exe 30 PID 1184 wrote to memory of 2700 1184 iexplore.exe 30 PID 1184 wrote to memory of 2700 1184 iexplore.exe 30 PID 1184 wrote to memory of 2700 1184 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e1cb59d9b4995f148f0750e19d7364d.exe"C:\Users\Admin\AppData\Local\Temp\8e1cb59d9b4995f148f0750e19d7364d.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.newvirtualcards.com.br/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
-
-
C:\Windows\juschrd.scrC:\Windows\juschrd.scr2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a23a324fd9037062a9d36fa7be7beedf
SHA1a42558f618e96d49c6fe38429e534c93abeac45d
SHA2568bbab60f1e661d0554c06d698135145735886879136a89b9406d8daf52102609
SHA512a34bfd7a0b00675956990e4875c5642cb22279e1dc2d4e702f7a6392c20bf90161fd2be36440188e6ee0a11e8bcbc71abc49b2c92a4e773cca80eb46fcbdd8ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a296252af363689b723f12ab6cc7080b
SHA1d1e8cb9775da18948ff642dd21d1e453e2c2dade
SHA256b68cc99de258a35f6f1b4bfa375c63ae377ec6e287bfda13149365894f60cf0f
SHA51252b58475989ea2ec8cc213f308c2cbb36c1ee2f16e4c5a76b47bc6431820cdcfeb3c9760c239e2e7373236aeb7620cac22ba25df9c1fc7517168b57251a58fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556d2e6cc9723d8668f0c566970a603c0
SHA12b2d43ddf486cdb4d1e7d17b8d3e84acc6c2219f
SHA2562f70f344c511e419efd342c80afa108b8bdace62c77548415be850a78b142538
SHA51279a0e71a727e2d5cefa0e71ef43c35380222504aa2f994471b9eabdfa6ea130f3a4c4cca0f12ec4353a4309f59f931a02d5f9386f164ac3fadf83e5432116fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547a0f1d77fc33d409cfcc524862cfdac
SHA17e4b1af562f5dffc804f1cc09533819241ea4960
SHA256d326c28825a86b4c6837095e26ff8e389e2d749dce5eda11ebc48af176f1dae8
SHA512c4d453d774c5f812895d5e80d8e11b1d47260e8b8fefaaefcb13382cd26e33d7dc31e2027737de7fd782cadb3b905ea787f05329de00e5e5f8269aa9aebe5f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dd2642f5ed5dadb26725a1b2afe3d05
SHA1d7a8a393e948b77035cddac0cbf4649f5798298b
SHA2568652fff88b28d27c3e808785cd3840bd126d50270c1efe54865393aca697d7af
SHA512c7e93d4c18aa2bb6a78a19a00fe43e857ba56cf2b23cce831ea2bad065806904a20da01585499ca9f4e983ea88a3512a2959c786945aa8829e6dda0f6e5a3264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b052ae5093f6d5b597d37126ce0158c
SHA1ed8f41382ac0a0b2eb4a3dc7ccb3efd8e2df7cbf
SHA2560b9c370fa664402710e5d24674526fd91df3ec04b8a7e5e1f7867e0fddab9085
SHA5128129271282e2eb9ba0c591a89bc60dbaa1dc8070d4714530848ab69513131f96b3f38a1a3879be45ba1417b781242c4f8fe40aaa93ee41333bb9aff87ef8aeb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5489c6cd9d338770a3fb40d7cde62d95a
SHA1905920c0ef5c1e0f5389ca64e3f89e00ff195760
SHA2566e14230ec5b50ca4308d6294d2831f3e1a7cfb59709dd9e4a86fc7f824bf4183
SHA51232ea124d18ef7068e93ba4f34f1386dcfe77149998bad582125cf02dffe4115a864825e4bebbb58e5febbbdafdab8d008d9c466fb4682f0f312b2e27a31abfab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1d5e1a0959a8ee6709fe0752be810c3
SHA18e26c9cdfec6a11310d2dc3c5b11ba74024ed9d5
SHA25642081ce804759a4329c5474f3de7a8d146da08af405aec3b0e414c436081afdc
SHA512b972721abf6bbab477223c8257bd278a6d80170b1e997e9ec31747fa3a5c49cab3aaec64cb822ec1f3929424e0a6a150956a2876115dae5ad077f1ca63ba8c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509645f6931e0d901954ef0835d75d94c
SHA103e78857eb371a0a5d12286aa4cd569810d5a206
SHA256aa024dca96e5f468f10095c80cb7abf950f0f7ce83c1575856b27a4a4c104570
SHA512a7275004ee469317060d6f5705d9039556f61f0504b9b4ff439bf780501d167d0d157520b05a363788b378303fe3dd93514868d0945d3e888ff968d5cfb00b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fab5973a059d8ba328d8384008a07b22
SHA13f0debb6a670ecb6438513f00a4b163668514ee2
SHA256f9391b56662f8b12dca2cc272920d843cd14ce1125230c99d3528b4ed4e73f62
SHA512e4841a1d8edddd34f33a0ddd742c5376a55a5b213ce78caee926d2edc2485a7ba0237ff5c7e9a49efe671b8f437e3b46eb7a4b37f495c6114293a49a08a41035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8213f3f9b02c40729eb5002e0168036
SHA1b17801f74305424e708db1795fc53ea6a61b6d6b
SHA25648c737ce1112abbf058e8d285c14aa921f31dd14b246f641d82da107feac3bfa
SHA512ca7467fe43bd1b78b3a519a8b83df1b3c2ef70fad4f58d2698757ee0c9b0c71eeb5583f8eaf7228928ee80b0f9e3b13323af09cd7a9bfedcca5293f532d8cd50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532cf2665e9e37220e6b8831058e1d0ec
SHA1e5697d1e19442807b1d234f263bd56396edfb35c
SHA2563459257a19d59c9a5223a85e3df06a9b562a251b6a41fb6926cacb2bfebbec4c
SHA5126aacb3e390af6644c9c3950306fa59b6f1d319ff6e4819f6e08906c943b7f91ee616158e0ae53b33b5afd7a8df6d557fe8e8ba5effa72e5891abd03eaf597a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587e241a37c9443465d95d9c25ae91c0c
SHA1d422db2e3ff2212920c6a4228ca6910f958907e2
SHA25658aac41ec00142208edafaa119493280ad2207147c03e6cfacfdec4d6be012ea
SHA512b2337f88f8659f63824a6537111fa2a117ee7c7f1eeab54fcb7b4318f60aeee3fb149a21b514ccfc0715d2fc53a6761c897f4d3ea28463773437c9658b700c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e244c6141b68472e8f57fd4f5be01a79
SHA14a9c975a5523033a3d1d4e475647f5cd394d1026
SHA256d7da6d5282f2909b822b9855479bf07d2be8cb91e571638be88ff434c06d8ffe
SHA512d51d6462b92358510492e06537e49b4f09bbad6a451b8454d5899a769aba30fc60ccc5bc036aed98ab3f727fd973687445a5ea82d6851f5dd484b7bf2c73a12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5937d3dbee36d0c466a15050f2c75378e
SHA14ccf4c190f929973a1e5dd46a2285303449e09ae
SHA2563bb9e9e26079019d9e48aa0d382aa0af78d97d8babe37784d68884567bc7f1b7
SHA512c0817099b18191a2e314296dc1e8c9e63ec2189b86da4de39b6ed68e57f3a86c682f42cef26ae622caad9d12879143c777c2ffc3cfadbef16188ca10a8c8764d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504df8360df50b0d2f8d4fbd0fdd7c441
SHA1afb90959fc32904b035979be5be76e07f7a545b9
SHA256c1e2e611212486fa3971e3d442f16a734adfef940dd4fe43157643cffb51bcf0
SHA512c9700d6890ea0103d1c0de1a63d31ff1a078f1a480a82bfae9e0e61660c6fba79690af41f83fae8a3888303e7acf992d732d347df5e1584a341de3c882f83b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d504b69d862fc13be3d1d7c00afcd76
SHA13805d1f356836b8e0a8cb06b1222416e9548baf4
SHA256920b6de7411adec4c82c56fb6b1d3856efd291c34266fd9e4508324af7e0a6b3
SHA5126db86acf8ef3e8bef806379646ef1185681cfc901f47570b6bb97d75f1e5f13da902f5998c2492d20b153cddb655a8b428e9d0a8ba4c1d3847d834b24afbc579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e8e5252518694f9cb836b45a1ca32dd
SHA1d21bb94f7d6713eec5df9651726bcc11084f624d
SHA25642262bc84749b2f67c5cc4143334f13d1cd6795a79c2af6c05f3a5008a516acc
SHA5122b88dae8375d106acc19cd40a65a7b083aadbc4478d46e68a5607be7e94c9c68bd930880a72f1fd34ebf9a297906e5f2fe883e145af10ee1fa2d7ab5787ed269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580dab29902d3743e818fe598003a1397
SHA1d9f39c09f22e0982dbe8ea902c1163e7fe78dd7b
SHA2564b9110f7b6d8b6c93cee238bedc579b818c2aacfcb755cadcdd320c25acc27f3
SHA512decd2e9bcf81687856b0947de5a9851a83d36aaba1fc35006efeb0648be332eda82350ff01142ac84421173cc96cb0a75aac2d27e9f32b642d836a7681ac10e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539c8578bf14056f250a2ade2cb81f984
SHA1c591c8fda0912f316ddea2cbf66db19b749c9f87
SHA256e0b211c397f0db751810c1c19dd2bac569883cf700f65b854f81a1fd449bfca3
SHA512c800eda98adef81778c9b68a10b553877c6f32344591c47d889b38b164e09c2f147d442a8c3c9c5c387d26ff9096390f6d923a52ec7d0695626cb0d28b4fb5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3cc3e5252bde2d6dbd098316a0219c8
SHA1ac1779d7bda2c60ecc4729d9d794e0921481ef8a
SHA256c91a3b315ee3e23f376e4bc1d13fba8d5051f4feda8088c9e4fcdf9e13e9e66f
SHA512faff75fb71e4dea4398303cd02b232c304175e0ec06154f9841f1bda08e9797dc8dc048ea1f5dd1cc878cb43cd838116f39a975cc2242081dddda18f2d26e875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD592a055982bd63513323209bd3490ee97
SHA1628a1108f1c2fd1112e891e120be1d669c352f2d
SHA256e3a14c7e454b2b61b53f881e81426120f15fb1bff8451313ce81b8477acb0bb8
SHA5126a9e9d63127cad5cb72ad5d1d1de21fbc8c311cebdd4a8d7d696ecec38d4c5b7e038f6dc0ea6f8dc5194bd84d3dce5919c718cacc5dc1a6745aead5c6e64ed00
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
67KB
MD58e1cb59d9b4995f148f0750e19d7364d
SHA11ecfc110d5e1d682cfada01fbcc73ff02cb151eb
SHA256b9f4ad753c98772c744cf6fd019cc2a6bd16dbe2bb14ae9eda2e22f447b17d56
SHA5129bef0c1300c610865fc048220064cf939b56c982c777aa61fa9e84026be431ea25c5b5da1a79e1899a90cfa4486614c5f9df521de5640dd9905fa7d31d370062