Analysis
-
max time kernel
278s -
max time network
252s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 16:55
Static task
static1
Behavioral task
behavioral1
Sample
Cooking Academy 3 - Restaurant Royale - (Www.ApunKaGames.Net).exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Cooking Academy 3 - Restaurant Royale - (Www.ApunKaGames.Net).exe
Resource
win10v2004-20240226-en
General
-
Target
Cooking Academy 3 - Restaurant Royale - (Www.ApunKaGames.Net).exe
-
Size
59.1MB
-
MD5
d1d2741c5529ae82a83bd36fa7b9ab0f
-
SHA1
069ed7c62f8dc0f7f4dc5df233b65aa3408966ef
-
SHA256
f693a80a523e0ab6320c73e3dd7ac9b1def25d85a62000baa01b30594c5d38c5
-
SHA512
c1f44e0d24a69802ec05ca62c343e404ba54b08343bc5da7837f7c46d7d87cbf19cf29b3712ab40074d09f5ff6ef8e088c1ffd94d9f5ccad03ed32b5f7595d4a
-
SSDEEP
786432:EL55cma/pYzg6raTvKBHYEiaO8zXJ2mz7VLMQTRD1u+PTLzwLrMZCOf9pKOwy:Encmah2rL4X7mz77D1pPELryff/R
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CookingAcademy3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate CookingAcademy3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CookingAcademy3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate CookingAcademy3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CookingAcademy3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate CookingAcademy3.exe -
Executes dropped EXE 3 IoCs
pid Process 2924 CookingAcademy3.exe 792 CookingAcademy3.exe 2328 CookingAcademy3.exe -
Loads dropped DLL 24 IoCs
pid Process 2924 CookingAcademy3.exe 2924 CookingAcademy3.exe 2924 CookingAcademy3.exe 2924 CookingAcademy3.exe 2924 CookingAcademy3.exe 2924 CookingAcademy3.exe 2924 CookingAcademy3.exe 2924 CookingAcademy3.exe 792 CookingAcademy3.exe 792 CookingAcademy3.exe 792 CookingAcademy3.exe 792 CookingAcademy3.exe 792 CookingAcademy3.exe 792 CookingAcademy3.exe 792 CookingAcademy3.exe 792 CookingAcademy3.exe 2328 CookingAcademy3.exe 2328 CookingAcademy3.exe 2328 CookingAcademy3.exe 2328 CookingAcademy3.exe 2328 CookingAcademy3.exe 2328 CookingAcademy3.exe 2328 CookingAcademy3.exe 2328 CookingAcademy3.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main Cooking Academy 3 - Restaurant Royale - (Www.ApunKaGames.Net).exe -
Modifies registry class 42 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\bdlqwT = "}XEd" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\agjp = "}IxK[}v`xxW}Wt~IEzhOoVj_iL|u" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\Ypmu = "mX^FWH]fpT]vBHiBdta" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\gnjmzmxOzzOL = "BYJ\\@lmmUjQacfbrm`RH@syn_" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\Ypmu = "mX^FWH]fpT]yBHiBdsx" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\InprocServer32\ThreadingModel = "Both" CookingAcademy3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\ProgID CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\agjp = "}IxK[}v`xxW}Wt~IEzhOoVj_iL|u" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\posfyprszCzm = "]q|VK~unfmDEQnxlZap`oZ|~" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\Ypmu = "mX^FWH]fpT]xBHiBdwZ" CookingAcademy3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\InprocServer32\2.0.50727 CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\InprocServer32\2.0.50727\ImplementedInThisVersion CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\Ypmu = "mX^FWH]fpT]tBHiBdwp" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\gnjmzmxOzzOL = "BYJ\\@lmmUjPacfbrm`SH@syn_" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\Ypmu = "mX^FWH]fpT]wBHiBd\x7fa" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\krgehZpoLFvnm = "HFINKfb^Pr[Q]]us" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\gnjmzmxOzzOL = "BYJ\\@lmmUjPacfbrm`SH@syn_" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\Bcfaiaidjjhit = "UCNhiiHxvCB\x7fcTbHeAe" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\Server\ = "diasymreader.dll" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\krgehZpoLFvnm = "HFINKfb^Pr[Q]]us" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\ExkbrQ = "\\KWWZmYT`\\eKsTjj\x7fpQ[d`ujhIOexR\\" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\Bcfaiaidjjhit = "UCNhiiHxvCB\x7fcTbHeAe" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\bdlqwT = "pwdt" CookingAcademy3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2} CookingAcademy3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\Server CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\Bcfaiaidjjhit = "U_NhiiHxvCB\x7fcTbHeAe" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\ = "NDP SymReader" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\InprocServer32\2.0.50727\ = "2.0.50727" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\ProgID\ = "CorSymReader_SxS" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\bdlqwT = "w]gL" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\posfyprszCzm = "]q|VK~unfmDEQnxlZap`oZ|~" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\bdlqwT = "yezt" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\Bcfaiaidjjhit = "UNNhiiHxvCB\x7fcTbHeAe" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\fnirpDawmZ = "duBWfQK^sMX_Djkgf" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\ExkbrQ = "\\KWWZmYT`\\eKsTjj\x7fpQ[d`ujhIOexR\\" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\bdlqwT = "T@FP" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\InprocServer32\ = "mscoree.dll" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\gnjmzmxOzzOL = "BYJ\\@lmmUjSacfbrm`PH@syn_" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\Ypmu = "mX^FWH]fpT]uBHiBdvP" CookingAcademy3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\InprocServer32 CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\fnirpDawmZ = "duBWfQK^sMX_Djkgf" CookingAcademy3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB13E46-A8B0-7270-B3E9-7B669242A8E2}\bdlqwT = "BE[\\" CookingAcademy3.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\ProgramData\TEMP:5ED747B8 CookingAcademy3.exe File opened for modification C:\ProgramData\TEMP:5ED747B8 CookingAcademy3.exe File opened for modification C:\ProgramData\TEMP:5ED747B8 CookingAcademy3.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 2924 CookingAcademy3.exe Token: SeIncBasePriorityPrivilege 2924 CookingAcademy3.exe Token: 33 792 CookingAcademy3.exe Token: SeIncBasePriorityPrivilege 792 CookingAcademy3.exe Token: 33 2328 CookingAcademy3.exe Token: SeIncBasePriorityPrivilege 2328 CookingAcademy3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 364 Cooking Academy 3 - Restaurant Royale - (Www.ApunKaGames.Net).exe 364 Cooking Academy 3 - Restaurant Royale - (Www.ApunKaGames.Net).exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale - (Www.ApunKaGames.Net).exe"C:\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale - (Www.ApunKaGames.Net).exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:364
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\CookingAcademy3.exe"C:\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\CookingAcademy3.exe"1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\CookingAcademy3.exe"C:\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\CookingAcademy3.exe"1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:792
-
C:\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\CookingAcademy3.exe"C:\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\CookingAcademy3.exe"1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:2328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD564ea9a81399c18bcc01a423dbd0a52a6
SHA1c141b83be3466d0e75512f3bca5820338d8ea329
SHA256df4b4706bf1ebf014b525f5167ab8acf3057c8d8c37a47b4e655d942a766dbb0
SHA5128c310b7efb126e29eda936c191889e8ff580f054a12e7eeef7eb9a50376cdf72e6165e99e1dee4170fe86a88cf626b492dcae5c198486fc734897d35df56c814
-
C:\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\CookingAcademy3.exe
Filesize6.2MB
MD5eafa79fe13b71c0fd9562a11393851e0
SHA1e8c5604206a515b5c02d51b18d884c2885303ef3
SHA25604b79eec9386506b307f3f554af5a69aa9fd925d78fbb52fae805453e5a62f5a
SHA5120f35d87ff7f1da50795c373c09e213439bf5a2322764c7f63f5b1a8a6cc5fa257f53986ff9e765bf4a8d59785d76d73487179dd66377ecc760d0643e4dbd6d94
-
C:\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\CookingAcademy3.exe
Filesize5.9MB
MD5b230ad088769084e40c33020ca1b141e
SHA1ed845c6b01d8c55968b5d7b0939828eeaebba509
SHA256930f7aa2431478305e143f9320ac1d691c647babd2a338b50d6d0c4fba78f7b7
SHA5122ec046b7cb42084d05516fa5d2132a3f385cd5dbe95902aeffe2df4c25a9bbb54e481d130fcec6b26da886530a99d4d322559022dd40c86ed4e78166d248dc3e
-
C:\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\CookingAcademy3.exe
Filesize5.0MB
MD5ab6989bec4d8b8bddea3f6ca0c080d7b
SHA1c85931feba759edab59871f4c60523ce00476b5d
SHA256fc9a10b44f441b91521f817211c9945d7863334d8bcdd8683630ea96e157574a
SHA5127b051724cc01e7286e87213cd6e2338376e17d317284466080ea40a03d7bdc23104b437c263b3880e0fba371e90ec709d3bbd707451653c5bb972f2de997b2f9
-
C:\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\CookingAcademy3.exe
Filesize1.9MB
MD5c9c15c13b6c3d8c3d8e74f17ba6c714e
SHA11a1442986bd2df24110740bc16c3e15a4bdf0de2
SHA2560e26ef225d8dbe2aee0569abcb3472d40bfc5466dee5147e5d34b7dfafe366e8
SHA512ff5d4bf6916e7de923c8ce6b191d77784f9b5f2f536441d18d15f43ceee1373a6955dda0f22fbdce27541726697fd29469b24aa53c2ac57f563f2e9fd6bbae4e
-
C:\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\properties\config.xml
Filesize294B
MD554c58d46f0e8b79293e840b0e3de5b67
SHA129710b9b4c1ae4c0fd40a31f699398bb3a2e033d
SHA256e1786f0e1d8fc59e49d8632683157d6a98bcef684e699965359ff5aae748cb70
SHA5124ee1f3491b1cc2f08fb9f52eec91160dc00cc9503b9ccffa9ed85e9c94445a352dad18cd2d89ccf9506f6df4323e7eefef6628b97d71dc0f792cc17f5ca6dd72
-
Filesize
304B
MD53e3810caec7c2f45dc745eda939fdba5
SHA11dc97a29e82a32719349b3d45c87407de47bb94c
SHA256cad40a75c33f429a8c9b7ae0c63c17b670e49d25a2151ef9cc7564921630d0d1
SHA5128755e6bf7f9a1ba77e544fc23d2168a586d5c3387b8750583eefff4149c09ed7da4ef3c9e191e349a20236532795a5ab2d0ce90e2618c70ff3ea477ae385414a
-
\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\BigFish.dll
Filesize17KB
MD593f70d633936113d582ac4fab82f8442
SHA10453cbf6d18f7b821320e0ac5cd280b5a64b145b
SHA2561e68a152f303164b1a2e1f8555c2c6281253943ee413eef92bedb5c5bf7bd8b9
SHA51290018f11b8aead8a8e85c9c9092bbe18213dc27230fda2bbc0a56da2db268f2695fd24025169d739044e951faf90b237d6874721aa166a5bf8e921ee697f6941
-
\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\libcurl.dll
Filesize611KB
MD5981f71bc1f50cfbe711bf895f4ed0e1b
SHA106823c4e5a6249205ac296d14ec471765d6e3581
SHA256f62eabefbbc823c2dc13476c94d5ba3a189da5020abab65239ef65e34c46d42e
SHA5120a8802026a3a0fefe6447ac5dba6a72709a3a461ea196471e0f5a12770534a1a69fbe788839832432c25e58f7684fe056aca5828636a1e3713cb7c76a7db8e6e
-
\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\libeay32.dll
Filesize1.6MB
MD5a9f8f35cc2caf8dba7167b91420a680b
SHA16fd1de054c228e7d1a515b08377a4b4993e79c4b
SHA256c7da870ad431d2bac13b40963ee5e7fec8fbc7ca7bc2b40308374ba5149e3651
SHA5124d92ecd79a87c44ec5a7ff652f726d781c1505f4c73d5f86ae20c512f601df3747d3da244dd57ea4396ed44c69d8587d6567be5f4ae8156bc462b8e9232bb8e2
-
\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\libeay32.dll
Filesize1.6MB
MD5d222c6d370145b5316d3e1455114f24f
SHA1601b1f5a4af8eb3063a8ac44b16f9076a40affaf
SHA2562fb295d8284b0298bdf6b8dfebf049697360065235c563ebb19c3605892172ce
SHA5126ba404b7a03b07ebd0af0adebb0fa18c6806198c6fcd26446265c98f0ad9340a86c5d36526bf6cce3f57028b90e5aab500718269486cf4a197f569885afd3a63
-
\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\libidn-11.dll
Filesize273KB
MD556295c7afe3f0542d59d12ca955380db
SHA1a076c754e77185f8c107b27b13d2307ccc981acf
SHA2561869c96af7c8f1130490b626f9b2c335f14a7b014035310d2421200e6cd98a81
SHA5129b81d42aad1c9d2281f06ca565b71a4e1d74d269da7dbe8d11e1200d495cddf80e4e41a99b8b0a9962a57ecaf69076bf93a57c67cadd004febcef84161f29b1f
-
\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\msvcp100.dll
Filesize411KB
MD503e9314004f504a14a61c3d364b62f66
SHA10aa3caac24fdf9d9d4c618e2bbf0a063036cd55d
SHA256a3ba6421991241bea9c8334b62c3088f8f131ab906c3cc52113945d05016a35f
SHA5122fcff4439d2759d93c57d49b24f28ae89b7698e284e76ac65fe2b50bdefc23a8cc3c83891d671de4e4c0f036cef810856de79ac2b028aa89a895bf35abff8c8d
-
\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\msvcr100.dll
Filesize752KB
MD567ec459e42d3081dd8fd34356f7cafc1
SHA11738050616169d5b17b5adac3ff0370b8c642734
SHA2561221a09484964a6f38af5e34ee292b9afefccb3dc6e55435fd3aaf7c235d9067
SHA5129ed1c106df217e0b4e4fbd1f4275486ceba1d8a225d6c7e47b854b0b5e6158135b81be926f51db0ad5c624f9bd1d09282332cf064680dc9f7d287073b9686d33
-
\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\ssleay32.dll
Filesize356KB
MD5612b2747d39d9ef838ab9eacbc1f6c3a
SHA13df032de697521589264bb9a89ad0f4a3cc7b099
SHA256c3dde5b99c3b5b7fe2a0fc2d198c0ccdccda8e5551d5dcee186f1c67e9f40f1d
SHA5121048b7c48c351e57c3f4cfdbdeb3dfdad235f740ac2b01bb6e739f189c3a2eca4bacb2e4b08b7c9850ebfb09fba142ef4c00798ba7b1b8a620b0994e07b3ce1d
-
\Users\Admin\AppData\Local\Temp\Cooking Academy 3 - Restaurant Royale Www.ApunKaGames.Net)\Game\zlib1.dll
Filesize110KB
MD5e4d7dd0a413519b21621ccb7d1d78fa4
SHA1b2300402703433109cee85fd9f70e81bf867c319
SHA256f4b42f671cf34329584afe4193c311dbb2a0396524499a23819467431a2b673d
SHA512362efff6e94393740ffada25fc5ba19c77ad619fadbf296ca20620383ea54155af70bdff13ce725bb5b758ef2f3347e798dd411e0c8b05ec07ca2739e56a47cc