Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe
Resource
win10v2004-20240426-en
General
-
Target
55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe
-
Size
88KB
-
MD5
3b47dbab8b41ccc785f7e06e19eb2908
-
SHA1
3c023ffbf16c24f5725f6fd63a5cc24f8decbf23
-
SHA256
55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849
-
SHA512
2d7273d301856774716de14d228c13abd96d96174e5879503f9347c8b63165c51790c710bd1d0d8af9803b58ce36307bea4228e3e530d1babd74cf216c79751d
-
SSDEEP
1536:ahUDofByDJWbMGcEFLPEPKOJUsy1+VMA:aIofBHbKMP0PvMA
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1980-140-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/1980-141-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/1980-137-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/1980-143-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/1980-314-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/1076-499-0x0000000000400000-0x000000000040B000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exepid process 1392 explorer.exe 1076 explorer.exe 1428 explorer.exe 2324 explorer.exe -
Loads dropped DLL 5 IoCs
Processes:
55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exepid process 1980 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe 1980 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe 1980 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe 1980 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe 1980 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe -
Processes:
resource yara_rule behavioral1/memory/1980-140-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1980-141-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1980-137-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1980-135-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1980-143-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1980-314-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1076-499-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Video Driver = "C:\\Users\\Admin\\AppData\\Roaming\\config\\explorer.exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exeexplorer.exeexplorer.exedescription pid process target process PID 2220 set thread context of 1980 2220 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe PID 1392 set thread context of 1076 1392 explorer.exe explorer.exe PID 1392 set thread context of 1428 1392 explorer.exe explorer.exe PID 1428 set thread context of 2324 1428 explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 explorer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 explorer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 explorer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A explorer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 0f00000001000000140000000f6aad4c3fe04619cdc8b2bd655aa1a26042e6500b000000010000005400000053007400610072006600690065006c006400200043006c00610073007300200032002000430065007200740069006600690063006100740069006f006e00200041007500740068006f007200690074007900000053000000010000004800000030463021060b6086480186fd6d0107170330123010060a2b0601040182373c0101030200c03021060b6086480186fd6e0107170330123010060a2b0601040182373c0101030200c009000000010000002a000000302806082b0601050507030106082b0601050507030206082b0601050507030406082b06010505070303140000000100000014000000bf5fb7d1cedd1f86f45b55acdcd710c20ea988e71d000000010000001000000090c4f4233b006b7bfaa6adcd8f577d77030000000100000014000000ad7e1c28b064ef8f6003402014c3d0e3370eb58a2000000001000000130400003082040f308202f7a003020102020100300d06092a864886f70d01010505003068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f72697479301e170d3034303632393137333931365a170d3334303632393137333931365a3068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f7269747930820120300d06092a864886f70d01010105000382010d00308201080282010100b732c8fee971a60485ad0c1164dfce4defc80318873fa1abfb3ca69ff0c3a1dad4d86e2b5390fb24a43e84f09ee85fece52744f528a63f7bdee02af0c8af532f9eca0501931e8f661c39a74dfa5ab673042566eb777fe759c64a99251454eb26c7f37f19d530708fafb0462affadeb29edd79faa0487a3d4f989a5345fdb43918236d9663cb1b8b982fd9c3a3e10c83bef0665667a9b19183dff71513c302e5fbe3d7773b25d066cc323569a2b8526921ca702b3e43f0daf087982b8363dea9cd335b3bc69caf5cc9de8fd648d1780336e5e4a5d99c91e87b49d1ac0d56e1335235edf9b5f3defd6f776c2ea3ebb780d1c42676b04d8f8d6da6f8bf244a001ab020103a381c53081c2301d0603551d0e04160414bf5fb7d1cedd1f86f45b55acdcd710c20ea988e73081920603551d2304818a3081878014bf5fb7d1cedd1f86f45b55acdcd710c20ea988e7a16ca46a3068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f72697479820100300c0603551d13040530030101ff300d06092a864886f70d01010505000382010100059d3f889dd1c91a55a1ac69f3f359da9b01871a4f57a9a179092adbf72fb21eccc75e6ad88387a197ef49353e7706415862bf8e58b80a673fecb3dd21661fc954fa72cc3d4c40d881af779e837abba2c7f534178ed91140f4fc2c2a4d157fa7625d2e25d3000b201a1d68f917b8f4bd8bed2859dd4d168b1783c8b265c72d7aa5aabc53866ddd57a4caf820410b68f0f4fb74be565d7a79f5f91d85e32d95bef5719043cc8d1f9a000a8729e95522580023eae31243295b4708dd8c416a6506a8e521aa41b4952195b97dd134ab13d6adbcdce23d39cdbd3e7570a1185903c922b48f9cd55e2ad7a5b6d40a6df8b74011469a1f790e62bf0f97ece02f1f1794 explorer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
explorer.exedescription pid process Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe Token: SeDebugPrivilege 1076 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exeexplorer.exeexplorer.exepid process 2220 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe 1980 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe 1392 explorer.exe 1076 explorer.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.execmd.exeexplorer.exeexplorer.exedescription pid process target process PID 2220 wrote to memory of 1980 2220 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe PID 2220 wrote to memory of 1980 2220 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe PID 2220 wrote to memory of 1980 2220 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe PID 2220 wrote to memory of 1980 2220 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe PID 2220 wrote to memory of 1980 2220 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe PID 2220 wrote to memory of 1980 2220 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe PID 2220 wrote to memory of 1980 2220 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe PID 2220 wrote to memory of 1980 2220 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe PID 1980 wrote to memory of 2560 1980 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe cmd.exe PID 1980 wrote to memory of 2560 1980 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe cmd.exe PID 1980 wrote to memory of 2560 1980 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe cmd.exe PID 1980 wrote to memory of 2560 1980 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe cmd.exe PID 2560 wrote to memory of 1544 2560 cmd.exe reg.exe PID 2560 wrote to memory of 1544 2560 cmd.exe reg.exe PID 2560 wrote to memory of 1544 2560 cmd.exe reg.exe PID 2560 wrote to memory of 1544 2560 cmd.exe reg.exe PID 1980 wrote to memory of 1392 1980 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe explorer.exe PID 1980 wrote to memory of 1392 1980 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe explorer.exe PID 1980 wrote to memory of 1392 1980 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe explorer.exe PID 1980 wrote to memory of 1392 1980 55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe explorer.exe PID 1392 wrote to memory of 1076 1392 explorer.exe explorer.exe PID 1392 wrote to memory of 1076 1392 explorer.exe explorer.exe PID 1392 wrote to memory of 1076 1392 explorer.exe explorer.exe PID 1392 wrote to memory of 1076 1392 explorer.exe explorer.exe PID 1392 wrote to memory of 1076 1392 explorer.exe explorer.exe PID 1392 wrote to memory of 1076 1392 explorer.exe explorer.exe PID 1392 wrote to memory of 1076 1392 explorer.exe explorer.exe PID 1392 wrote to memory of 1076 1392 explorer.exe explorer.exe PID 1392 wrote to memory of 1428 1392 explorer.exe explorer.exe PID 1392 wrote to memory of 1428 1392 explorer.exe explorer.exe PID 1392 wrote to memory of 1428 1392 explorer.exe explorer.exe PID 1392 wrote to memory of 1428 1392 explorer.exe explorer.exe PID 1392 wrote to memory of 1428 1392 explorer.exe explorer.exe PID 1392 wrote to memory of 1428 1392 explorer.exe explorer.exe PID 1392 wrote to memory of 1428 1392 explorer.exe explorer.exe PID 1392 wrote to memory of 1428 1392 explorer.exe explorer.exe PID 1428 wrote to memory of 2324 1428 explorer.exe explorer.exe PID 1428 wrote to memory of 2324 1428 explorer.exe explorer.exe PID 1428 wrote to memory of 2324 1428 explorer.exe explorer.exe PID 1428 wrote to memory of 2324 1428 explorer.exe explorer.exe PID 1428 wrote to memory of 2324 1428 explorer.exe explorer.exe PID 1428 wrote to memory of 2324 1428 explorer.exe explorer.exe PID 1428 wrote to memory of 2324 1428 explorer.exe explorer.exe PID 1428 wrote to memory of 2324 1428 explorer.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe"C:\Users\Admin\AppData\Local\Temp\55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe"C:\Users\Admin\AppData\Local\Temp\55746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\KFJXG.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Video Driver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\config\explorer.exe" /f4⤵
- Adds Run key to start application
PID:1544
-
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1076
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"5⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2324
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dc260d1d0776a71ec1b5b90f996740e
SHA1dbb19c1a9714828c892fba51166b5fa941292ab0
SHA2562331f08fb2e3c4c22043d1160588106e2404d517fce5c286c0793e4cb9674d16
SHA51219deb1274f5124e30bead94f2d8a86af55526800fef3271f4f81a85754c27665a42fb8ff0a57db8bd3bd4b6fee03fac6706cf74168c6c0983202814d33a98a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e6b38c757a62a9d3e2be80c4d3715176
SHA13e8b9b1892ac282f25c0e36480fee15270ee3656
SHA25603e5a87734fba03c0a2bd9d6c21fb7ce8d78952ae5ae4063e3d92349777efec9
SHA512d1acb7e99a5f0276126dd4e6fcad256e9557aa857cc4e8e1c233666d9e85c1a8353e2fa5625cf299b65d002a0dd443f526bcc84792a4ab84f816e585f7f28f7d
-
Filesize
149B
MD5fc1798b7c7938454220fda837a76f354
SHA1b232912930b2bc24ff18bf7ecd58f872bbe01ea0
SHA2567f0a5917b5aca9c5beb153aad0ef95bf0aeafb83768da5b086c3f029ba42d7c8
SHA512d1abdd45a8e5d33893b9d19424174a07feed145d2e6b4be318ab5fde503f850579a4a101a010f30e16ecde2c7123f45357a8341214655321ee0f0097ca911331
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
88KB
MD53b47dbab8b41ccc785f7e06e19eb2908
SHA13c023ffbf16c24f5725f6fd63a5cc24f8decbf23
SHA25655746ab43a9873111030c4892f188251f4b3ce13417f438af9b9f72ba1625849
SHA5122d7273d301856774716de14d228c13abd96d96174e5879503f9347c8b63165c51790c710bd1d0d8af9803b58ce36307bea4228e3e530d1babd74cf216c79751d