Analysis

  • max time kernel
    36s
  • max time network
    39s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-04-2024 20:41

General

  • Target

    MonkeModManager_2 (1).exe

  • Size

    13.2MB

  • MD5

    a64a50d764de2af1e198bfd517eec2f3

  • SHA1

    913b4cdc597642e4ac33e1a6526cd163f2bc29cb

  • SHA256

    4cbea24a8641dc763864ffe8a2d4ebfa3d7ea5eb7280a25edc0b2e3d4c6cdde3

  • SHA512

    efb92705d50713b06c208a308c0a8eee17c8b05c8622b0158c5974b89484739d2b48d96a860268d86afd5b51f715362542208a12b7e441c6d29d95d5ca3fa1a4

  • SSDEEP

    393216:BiIE7Yo9+4ucW+eGQRJ9jo7BGcGmY/dt1Wom2:u7r9+RcW+e5RJ9Mgpm2

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 41 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 33 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MonkeModManager_2 (1).exe
    "C:\Users\Admin\AppData\Local\Temp\MonkeModManager_2 (1).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Users\Admin\AppData\Local\Temp\MonkeModManager_2 (1).exe
      "C:\Users\Admin\AppData\Local\Temp\MonkeModManager_2 (1).exe"
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3952
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4276
        • C:\Windows\system32\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\Crypto\Cipher\_raw_cbc.pyd

    Filesize

    12KB

    MD5

    0c46d7b7cd00b3d474417de5d6229c41

    SHA1

    825bdb1ea8bbfe7de69487b76abb36196b5fdac0

    SHA256

    9d0a5c9813ad6ba129cafef815741636336eb9426ac4204de7bc0471f7b006e1

    SHA512

    d81b17b100a052899d1fd4f8cea1b1919f907daa52f1bad8dc8e3f5afc230a5bca465bbac2e45960e7f8072e51fdd86c00416d06cf2a1f07db5ad8a4e3930864

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\Crypto\Cipher\_raw_cfb.pyd

    Filesize

    13KB

    MD5

    3142c93a6d9393f071ab489478e16b86

    SHA1

    4fe99c817ed3bcc7708a6631f100862ebda2b33d

    SHA256

    5ea310e0f85316c8981ed6293086a952fa91a6d12ca3f8af9581521ee2b15586

    SHA512

    dcafec54bd9f9f42042e6fa4ac5ed53feb6cf8d56ada6a1787cafc3736aa72f14912bbd1b27d0af87e79a6d406b0326602ecd1ad394acdc6275aed4c41cdb9ef

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\Crypto\Cipher\_raw_ctr.pyd

    Filesize

    14KB

    MD5

    a34f499ee5f1b69fc4fed692a5afd3d6

    SHA1

    6a37a35d4f5f772dab18e1c2a51be756df16319a

    SHA256

    4f74bcf6cc81bac37ea24cb1ef0b17f26b23edb77f605531857eaa7b07d6c8b2

    SHA512

    301f7c31dee8ff65bb11196f255122e47f3f1b6b592c86b6ec51ab7d9ac8926fecfbe274679ad4f383199378e47482b2db707e09d73692bee5e4ec79c244e3a8

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\Crypto\Cipher\_raw_ecb.pyd

    Filesize

    10KB

    MD5

    dedae3efda452bab95f69cae7aebb409

    SHA1

    520f3d02693d7013ea60d51a605212efed9ca46b

    SHA256

    6248fdf98f949d87d52232ddf61fada5ef02cd3e404bb222d7541a84a3b07b8a

    SHA512

    8c1cab8f34de2623a42f0750f182b6b9a7e2affa2667912b3660af620c7d9ad3bd5b46867b3c2d50c0cae2a1bc03d03e20e4020b7ba0f313b6a599726f022c6c

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\Crypto\Cipher\_raw_ofb.pyd

    Filesize

    12KB

    MD5

    a13584f663393f382c6d8d5c0023bc80

    SHA1

    d324d5fbd7a5dba27aa9b0bdb5c2aebff17b55b1

    SHA256

    13c34a25d10c42c6a12d214b2d027e5dc4ae7253b83f21fd70a091fedac1e049

    SHA512

    14e4a6f2959bd68f441aa02a4e374740b1657ab1308783a34d588717f637611724bc90a73c80fc6b47bc48dafb15cf2399dc7020515848f51072f29e4a8b4451

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\Crypto\Hash\_BLAKE2s.pyd

    Filesize

    14KB

    MD5

    06d3e941860bb0abedf1baf1385d9445

    SHA1

    e8c16c3e8956ba99a2d0de860dcfc5021f1d7de5

    SHA256

    1c340d2625dad4f07b88bb04a81d5002aabf429561c92399b0eb8f6a72432325

    SHA512

    6f62acff39b77c1ec9f161a9bfa94f8e3b932d56e63daee0093c041543993b13422e12e29c8231d88bc85c0573ad9077c56aa7f7a307e27f269da17fba8ee5a3

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\Crypto\Util\_strxor.pyd

    Filesize

    10KB

    MD5

    fae081b2c91072288c1c8bf66ad1aba5

    SHA1

    cd23ddb83057d5b056ca2b3ab49c8a51538247de

    SHA256

    af76a5b10678f477069add6e0428e48461fb634d9f35fb518f9f6a10415e12d6

    SHA512

    0adb0b1088cb6c8f089cb9bf7aec9eeeb1717cf6cf44b61fb0b053761fa70201ab3f7a6461aaae1bc438d689e4f8b33375d31b78f1972aa5a4bf86afad66d3a4

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\VCRUNTIME140.dll

    Filesize

    106KB

    MD5

    4585a96cc4eef6aafd5e27ea09147dc6

    SHA1

    489cfff1b19abbec98fda26ac8958005e88dd0cb

    SHA256

    a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736

    SHA512

    d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\VCRUNTIME140_1.dll

    Filesize

    48KB

    MD5

    7e668ab8a78bd0118b94978d154c85bc

    SHA1

    dbac42a02a8d50639805174afd21d45f3c56e3a0

    SHA256

    e4b533a94e02c574780e4b333fcf0889f65ed00d39e32c0fbbda2116f185873f

    SHA512

    72bb41db17256141b06e2eaeb8fc65ad4abdb65e4b5f604c82b9e7e7f60050734137d602e0f853f1a38201515655b6982f2761ee0fa77c531aa58591c95f0032

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\_asyncio.pyd

    Filesize

    69KB

    MD5

    2cd68ff636394d3019411611e27d0a3b

    SHA1

    da369c5d1a32f68639170d8a265a9ea49c2c8ebd

    SHA256

    0d4fbd46f922e548060ea74c95e99dc5f19b1df69be17706806760515c1c64fe

    SHA512

    37388d137454f52057b2376d95abcc955fa1edc3e20b96445fa45d1860544e811df0c547f221c8671dc1a4d90262bb20f3b9f114252f3c47a8c3829951a2ce51

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\_bz2.pyd

    Filesize

    82KB

    MD5

    c7ce973f261f698e3db148ccad057c96

    SHA1

    59809fd48e8597a73211c5df64c7292c5d120a10

    SHA256

    02d772c03704fe243c8de2672c210a5804d075c1f75e738d6130a173d08dfcde

    SHA512

    a924750b1825747a622eef93331fd764d824c954297e37e8dc93a450c11aa7ab3ad7c3b823b11656b86e64de3cd5d409fda15db472488dfaa4bb50341f0b29d1

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\_cffi_backend.cp312-win_amd64.pyd

    Filesize

    178KB

    MD5

    0572b13646141d0b1a5718e35549577c

    SHA1

    eeb40363c1f456c1c612d3c7e4923210eae4cdf7

    SHA256

    d8a76d1e31bbd62a482dea9115fc1a109cb39af4cf6d1323409175f3c93113a7

    SHA512

    67c28432ca8b389acc26e47eb8c4977fddd4af9214819f89df07fecbc8ed750d5f35807a1b195508dd1d77e2a7a9d7265049dcfbfe7665a7fd1ba45da1e4e842

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\_ctypes.pyd

    Filesize

    121KB

    MD5

    10fdcf63d1c3c3b7e5861fbb04d64557

    SHA1

    1aa153efec4f583643046618b60e495b6e03b3d7

    SHA256

    bc3b83d2dc9e2f0e6386ed952384c6cf48f6eed51129a50dfd5ef6cbbc0a8fb3

    SHA512

    dc702f4100ed835e198507cd06fa5389a063d4600fc08be780690d729ab62114fd5e5b201d511b5832c14e90a5975ed574fc96edb5a9ab9eb83f607c7a712c7f

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\_decimal.pyd

    Filesize

    247KB

    MD5

    21c73e7e0d7dad7a1fe728e3b80ce073

    SHA1

    7b363af01e83c05d0ea75299b39c31d948bbfe01

    SHA256

    a28c543976aa4b6d37da6f94a280d72124b429f458d0d57b7dbcf71b4bea8f73

    SHA512

    0357102bffc2ec2bc6ff4d9956d6b8e77ed8558402609e558f1c1ebc1baca6aeaa5220a7781a69b783a54f3e76362d1f74d817e4ee22aac16c7f8c86b6122390

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\_hashlib.pyd

    Filesize

    63KB

    MD5

    f495d1897a1b52a2b15c20dcecb84b47

    SHA1

    8cb65590a8815bda58c86613b6386b5982d9ec3f

    SHA256

    e47e76d70d508b62924fe480f30e615b12fdd7745c0aac68a2cddabd07b692ae

    SHA512

    725d408892887bebd5bcf040a0ecc6a4e4b608815b9dea5b6f7b95c812715f82079896df33b0830c9f787ffe149b8182e529bb1f78aadd89df264cf8853ee4c4

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\_lzma.pyd

    Filesize

    155KB

    MD5

    4e2239ece266230ecb231b306adde070

    SHA1

    e807a078b71c660db10a27315e761872ffd01443

    SHA256

    34130d8abe27586ee315262d69af4e27429b7eab1f3131ea375c2bb62cf094be

    SHA512

    86e6a1eab3529e600dd5caab6103e34b0f618d67322a5ecf1b80839faa028150c492a5cf865a2292cc8584fba008955da81a50b92301583424401d249c5f1401

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\_multiprocessing.pyd

    Filesize

    34KB

    MD5

    811bcee2f4246265898167b103fc699b

    SHA1

    ae3de8acba56cde71001d3796a48730e1b9c7cce

    SHA256

    fb69005b972dc3703f9ef42e8e0fddf8c835cb91f57ef9b6c66bbdf978c00a8c

    SHA512

    1f71e23ce4b6bc35fe772542d7845dcbea2a34522ba0468b61cb05f9abab7732cbf524bcff498d1bd0b13b5e8a45c373cca19ad20e5370f17259e281edf344be

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\_overlapped.pyd

    Filesize

    54KB

    MD5

    f9c67280538408411be9a7341b93b5b0

    SHA1

    ccf776cd2483bc83b48b1db322d7b6fcab48356e

    SHA256

    5d298bb811037b583cff6c88531f1742fae5eee47c290adb47ddbd0d6126b9cc

    SHA512

    af2156738893ef504d582ace6750b25bc42ad1ec8a92e0550ce54810706d854f37a82f38eb965a537cad5d35c0178c5eb7b4d20db2a95bebfecf9a13c0592646

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\_queue.pyd

    Filesize

    31KB

    MD5

    6e00e0821bb519333ccfd4e61a83cb38

    SHA1

    3550a41bb2ea54f456940c4d1940acab36815949

    SHA256

    2ad02d49691a629f038f48fcdee46a07c4fcc2cb0620086e7b09ac11915ae6b7

    SHA512

    c3f8332c10b58f30e292676b48ecf1860c5ef9546367b87e90789f960c91eae4d462dd3ee9cb14f603b9086e81b6701aab56da5b635b22db1e758ed0a983e562

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\_socket.pyd

    Filesize

    81KB

    MD5

    899380b2d48df53414b974e11bb711e3

    SHA1

    f1d11f7e970a7cd476e739243f8f197fcb3ad590

    SHA256

    b38e66e6ee413e5955ef03d619cadd40fca8be035b43093d2342b6f3739e883e

    SHA512

    7426ca5e7a404b9628e2966dae544f3e8310c697145567b361825dc0b5c6cd87f2caf567def8cd19e73d68643f2f38c08ff4ff0bb0a459c853f241b8fdf40024

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\_sqlite3.pyd

    Filesize

    121KB

    MD5

    cee93c920951c1169b615cb6330cedda

    SHA1

    ef2abf9f760db2de0bd92afe8766a0b798cf8167

    SHA256

    ff25bdbeef34d2aa420a79d3666c2660e7e3e96259d1f450f1af5268553380ec

    SHA512

    999d324448bb39793e4807432c697f01f8922b0aba4519a21d5dc4f4fc8e9e4737d7e104b205b931af753eda65f61d0c744f12be84446f9c6cb3c2a5b35b773c

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\_ssl.pyd

    Filesize

    173KB

    MD5

    9b4e74fd1de0f8a197e4aa1e16749186

    SHA1

    833179b49eb27c9474b5189f59ed7ecf0e6dc9ea

    SHA256

    a4ce52a9e0daddbbe7a539d1a7eda787494f2173ddcc92a3faf43b7cf597452b

    SHA512

    ae72b39cb47a859d07a1ee3e73de655678fe809c5c17ffd90797b5985924ddb47ceb5ebe896e50216fb445526c4cbb95e276e5f3810035b50e4604363eb61cd4

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\_uuid.pyd

    Filesize

    24KB

    MD5

    3c8737723a903b08d5d718336900fd8c

    SHA1

    2ad2d0d50f6b52291e59503222b665b1823b0838

    SHA256

    bb418e91e543c998d11f9e65fd2a4899b09407ff386e059a88fe2a16aed2556b

    SHA512

    1d974ec1c96e884f30f4925cc9a03fb5af78687a267dec0d1582b5d7561d251fb733cf733e0cc00faee86f0fef6f73d36a348f3461c6d34b0238a75f69320d10

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\_wmi.pyd

    Filesize

    35KB

    MD5

    ee33f4c8d17d17ad62925e85097b0109

    SHA1

    8c4a03531cf3dbfe6f378fdab9699d51e7888796

    SHA256

    79adca5037d9145309d3bd19f7a26f7bb7da716ee86e01073c6f2a9681e33dad

    SHA512

    60b0705a371ad2985db54a91f0e904eea502108663ea3c3fb18ed54671be1932f4f03e8e3fd687a857a5e3500545377b036276c69e821a7d6116b327f5b3d5c1

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\base_library.zip

    Filesize

    1.3MB

    MD5

    3909f1a45b16c6c6ef797032de7e3b61

    SHA1

    5a243f6c8db11bf401aeac69f4c2a0c6cd63b3a8

    SHA256

    56cce68da6a7ebd11aab4b4a4e6a164647b42b29ae57656532c530d1e22e5b44

    SHA512

    647e343eb9732150c0fd12c7142a960ede969b41d5a567940e89636f021f0c0b3249b6cfc99c732190085bcae7aa077f8ac52c8e7fe7817d48a34489f0cd5148

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\charset_normalizer\md.cp312-win_amd64.pyd

    Filesize

    10KB

    MD5

    298e4ac2e7fdd949b49d662249d3bfa9

    SHA1

    11b6b6e3788fc7d738b4d6aad8eb12dd7c698b74

    SHA256

    a20cfd0e3fc4b4fafc91a55852c781de3661aa7bd7b41742eebc031f36cc0521

    SHA512

    63227ece3cdf744c940f95b8b0e7da0bdd4ff4529a87997d52e2855468bc5b0dc11c2e695af0a5b6a8cb93fb07bdb9f008634f56ea0ffebbb91392883038e1e8

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\charset_normalizer\md__mypyc.cp312-win_amd64.pyd

    Filesize

    114KB

    MD5

    e3eae22d5ce2e744780200079155fd30

    SHA1

    0cb3d5c85249bfb889997630c950e3200b002b41

    SHA256

    e3475aba6767a4af06e9f953b7949ad089f65c9ba006bc618be3a242e097726d

    SHA512

    8cd8eeba5dbce8d08c04021a859b2c81eee1a52c151774472a38d125253f09843e66b1c489ed592fe0b2dc44047c6d40173f58fea51ea36015bcb5030dccf84e

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\libcrypto-3.dll

    Filesize

    4.9MB

    MD5

    51e8a5281c2092e45d8c97fbdbf39560

    SHA1

    c499c810ed83aaadce3b267807e593ec6b121211

    SHA256

    2a234b5aa20c3faecf725bbb54fb33f3d94543f78fa7045408e905593e49960a

    SHA512

    98b91719b0975cb38d3b3c7b6f820d184ef1b64d38ad8515be0b8b07730e2272376b9e51631fe9efd9b8a1709fea214cf3f77b34eeb9fd282eb09e395120e7cb

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\libffi-8.dll

    Filesize

    38KB

    MD5

    0f8e4992ca92baaf54cc0b43aaccce21

    SHA1

    c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

    SHA256

    eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

    SHA512

    6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\libssl-3.dll

    Filesize

    771KB

    MD5

    bfc834bb2310ddf01be9ad9cff7c2a41

    SHA1

    fb1d601b4fcb29ff1b13b0d2ed7119bd0472205c

    SHA256

    41ad1a04ca27a7959579e87fbbda87c93099616a64a0e66260c983381c5570d1

    SHA512

    6af473c7c0997f2847ebe7cee8ef67cd682dee41720d4f268964330b449ba71398fda8954524f9a97cc4cdf9893b8bdc7a1cf40e9e45a73f4f35a37f31c6a9c3

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\pyexpat.pyd

    Filesize

    195KB

    MD5

    f554064233c082f98ef01195693d967d

    SHA1

    f191d42807867e0174ddc66d04c45250d9f6561e

    SHA256

    e1d56ffbf5e5fab481d7a14691481b8ff5d2f4c6bf5d1a4664c832756c5942fe

    SHA512

    3573a226305cec45333fc4d0e6fc0c3357421ad77cd8a1899c90515994351292ee5d1c445412b5563aa02520736e870a9ee879909cd992f5be32e877792bdb88

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\python312.dll

    Filesize

    6.6MB

    MD5

    5c5602cda7ab8418420f223366fff5db

    SHA1

    52f81ee0aef9b6906f7751fd2bbd4953e3f3b798

    SHA256

    e7890e38256f04ee0b55ac5276bbf3ac61392c3a3ce150bb5497b709803e17ce

    SHA512

    51c3b4f29781bb52c137ddb356e1bc5a37f3a25f0ed7d89416b14ed994121f884cb3e40ccdbb211a8989e3bd137b8df8b28e232f98de8f35b03965cfce4b424f

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\select.pyd

    Filesize

    30KB

    MD5

    bffff83a000baf559f3eb2b599a1b7e8

    SHA1

    7f9238bda6d0c7cc5399c6b6ab3b42d21053f467

    SHA256

    bc71fbdfd1441d62dd86d33ff41b35dc3cc34875f625d885c58c8dc000064dab

    SHA512

    3c0ba0cf356a727066ae0d0d6523440a882aafb3ebdf70117993effd61395deebf179948f8c7f5222d59d1ed748c71d9d53782e16bd2f2eccc296f2f8b4fc948

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\sqlite3.dll

    Filesize

    1.4MB

    MD5

    82ea0259009ff75bba817bd8c15c7588

    SHA1

    04c49687d8241b43ae61a6c59299255ef09a7b39

    SHA256

    8aa8b909a39fcc33d1ec2ad51eac6714a318c6efd04f963d21b75d8f64809ad6

    SHA512

    1f8b3343898462e385d25e1820a3d7d971d633933e482ea9ffc596e7e1f902f5657a9f2c104cf320eeef34cce814261304e2e1c063be4c6a807adc9b75f3e670

  • C:\Users\Admin\AppData\Local\Temp\_MEI31282\unicodedata.pyd

    Filesize

    1.1MB

    MD5

    a1388676824ce6347d31d6c6a7a1d1b5

    SHA1

    27dd45a5c9b7e61bb894f13193212c6d5668085b

    SHA256

    2480a78815f619a631210e577e733c9bafecb7f608042e979423c5850ee390ff

    SHA512

    26ea1b33f14f08bb91027e0d35ac03f6203b4dfeee602bb592c5292ab089b27ff6922da2804a9e8a28e47d4351b32cf93445d894f00b4ad6e2d0c35c6c7f1d89

  • C:\Users\Admin\AppData\Local\Temp\crcook.txt

    Filesize

    29B

    MD5

    155ea3c94a04ceab8bd7480f9205257d

    SHA1

    b46bbbb64b3df5322dd81613e7fa14426816b1c1

    SHA256

    445e2bcecaa0d8d427b87e17e7e53581d172af1b9674cf1a33dbe1014732108b

    SHA512

    3d47449da7c91fe279217a946d2f86e5d95d396f53b55607ec8aca7e9aa545cfaf9cb97914b643a5d8a91944570f9237e18eecec0f1526735be6ceee45ecba05