Analysis
-
max time kernel
115s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 01:33
Behavioral task
behavioral1
Sample
f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe
Resource
win7-20240704-en
General
-
Target
f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe
-
Size
858KB
-
MD5
102392331e6b2ed56770f25cddc17000
-
SHA1
c7fb462c16eb013fea4161ed24c118696233d770
-
SHA256
f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83
-
SHA512
014a4fc2af70ad33bba20d18c7759800dc67b97ed1ab176aa0b7f3cf203d6a0567e44fd53578af21742aacdaa5a126fe291b3d771e632733d2416e743311ab19
-
SSDEEP
24576:/EN973phvt8tmUdkw1xG8fFjGMaOnO+pwFL9N09PPQT:/EN973PvEL2wHBODLcPoT
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 8 IoCs
resource yara_rule behavioral1/memory/2536-11-0x0000000000080000-0x00000000000DE000-memory.dmp family_agenttesla behavioral1/memory/2536-4-0x0000000000080000-0x00000000000DE000-memory.dmp family_agenttesla behavioral1/memory/2536-12-0x0000000000080000-0x00000000000DE000-memory.dmp family_agenttesla behavioral1/memory/2172-905-0x0000000000400000-0x000000000045E000-memory.dmp family_agenttesla behavioral1/memory/2172-912-0x0000000000400000-0x000000000045E000-memory.dmp family_agenttesla behavioral1/memory/2172-913-0x0000000000400000-0x000000000045E000-memory.dmp family_agenttesla behavioral1/memory/1944-1639-0x0000000000080000-0x00000000000DE000-memory.dmp family_agenttesla behavioral1/memory/1944-1638-0x0000000000080000-0x00000000000DE000-memory.dmp family_agenttesla -
Executes dropped EXE 4 IoCs
pid Process 1624 mighost.exe 2172 mighost.exe 628 mighost.exe 1944 mighost.exe -
resource yara_rule behavioral1/memory/2544-0-0x00000000013B0000-0x000000000154E000-memory.dmp upx behavioral1/memory/2544-467-0x00000000013B0000-0x000000000154E000-memory.dmp upx behavioral1/memory/2544-470-0x00000000013B0000-0x000000000154E000-memory.dmp upx behavioral1/files/0x000500000001a056-900.dat upx behavioral1/memory/1624-902-0x0000000000220000-0x00000000003BE000-memory.dmp upx behavioral1/memory/1624-1195-0x0000000000220000-0x00000000003BE000-memory.dmp upx behavioral1/memory/1624-1197-0x0000000000220000-0x00000000003BE000-memory.dmp upx behavioral1/memory/628-1628-0x0000000001360000-0x00000000014FE000-memory.dmp upx behavioral1/memory/628-1919-0x0000000001360000-0x00000000014FE000-memory.dmp upx behavioral1/memory/628-1920-0x0000000001360000-0x00000000014FE000-memory.dmp upx -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2544-467-0x00000000013B0000-0x000000000154E000-memory.dmp autoit_exe behavioral1/memory/2544-470-0x00000000013B0000-0x000000000154E000-memory.dmp autoit_exe behavioral1/memory/1624-1195-0x0000000000220000-0x00000000003BE000-memory.dmp autoit_exe behavioral1/memory/1624-1197-0x0000000000220000-0x00000000003BE000-memory.dmp autoit_exe behavioral1/memory/628-1919-0x0000000001360000-0x00000000014FE000-memory.dmp autoit_exe behavioral1/memory/628-1920-0x0000000001360000-0x00000000014FE000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2544 set thread context of 2536 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 30 PID 1624 set thread context of 2172 1624 mighost.exe 38 PID 628 set thread context of 1944 628 mighost.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0cd6239a0d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426650738" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61A7CB01-3D93-11EF-B3C2-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000ec14a53beed887d6fba42a007dd2336860bbe4c7a9eb311c78cc42c51a0926f4000000000e8000000002000020000000eeca577c9bc3a18882912981745f4cda5925e0acc8b0b48fc89fdc71e701ee8f200000000c245d2d230728e78d28d5705321002042a02b9a4a7da93a82c9d811f5509358400000002f5485468d4efe9224c4867efa45b546ff6239e47f5161d50f8bfbd14e9f6d88310e0ea92941eb6a273543ef118eb2f9f40ee2f32f146e6f3efe299206475f39 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2532 schtasks.exe 1144 schtasks.exe 1044 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 1640 iexplore.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 1640 iexplore.exe 1624 mighost.exe 1624 mighost.exe 1624 mighost.exe 628 mighost.exe 628 mighost.exe 628 mighost.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 1624 mighost.exe 1624 mighost.exe 1624 mighost.exe 628 mighost.exe 628 mighost.exe 628 mighost.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2536 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 30 PID 2544 wrote to memory of 2536 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 30 PID 2544 wrote to memory of 2536 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 30 PID 2544 wrote to memory of 2536 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 30 PID 2544 wrote to memory of 2536 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 30 PID 2544 wrote to memory of 2536 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 30 PID 2536 wrote to memory of 1640 2536 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 31 PID 2536 wrote to memory of 1640 2536 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 31 PID 2536 wrote to memory of 1640 2536 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 31 PID 2536 wrote to memory of 1640 2536 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 31 PID 1640 wrote to memory of 2900 1640 iexplore.exe 32 PID 1640 wrote to memory of 2900 1640 iexplore.exe 32 PID 1640 wrote to memory of 2900 1640 iexplore.exe 32 PID 1640 wrote to memory of 2900 1640 iexplore.exe 32 PID 2544 wrote to memory of 2532 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 34 PID 2544 wrote to memory of 2532 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 34 PID 2544 wrote to memory of 2532 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 34 PID 2544 wrote to memory of 2532 2544 f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe 34 PID 2680 wrote to memory of 1624 2680 taskeng.exe 37 PID 2680 wrote to memory of 1624 2680 taskeng.exe 37 PID 2680 wrote to memory of 1624 2680 taskeng.exe 37 PID 2680 wrote to memory of 1624 2680 taskeng.exe 37 PID 1624 wrote to memory of 2172 1624 mighost.exe 38 PID 1624 wrote to memory of 2172 1624 mighost.exe 38 PID 1624 wrote to memory of 2172 1624 mighost.exe 38 PID 1624 wrote to memory of 2172 1624 mighost.exe 38 PID 1624 wrote to memory of 2172 1624 mighost.exe 38 PID 1624 wrote to memory of 2172 1624 mighost.exe 38 PID 1640 wrote to memory of 1788 1640 iexplore.exe 39 PID 1640 wrote to memory of 1788 1640 iexplore.exe 39 PID 1640 wrote to memory of 1788 1640 iexplore.exe 39 PID 1640 wrote to memory of 1788 1640 iexplore.exe 39 PID 1624 wrote to memory of 1144 1624 mighost.exe 40 PID 1624 wrote to memory of 1144 1624 mighost.exe 40 PID 1624 wrote to memory of 1144 1624 mighost.exe 40 PID 1624 wrote to memory of 1144 1624 mighost.exe 40 PID 2680 wrote to memory of 628 2680 taskeng.exe 42 PID 2680 wrote to memory of 628 2680 taskeng.exe 42 PID 2680 wrote to memory of 628 2680 taskeng.exe 42 PID 2680 wrote to memory of 628 2680 taskeng.exe 42 PID 628 wrote to memory of 1944 628 mighost.exe 43 PID 628 wrote to memory of 1944 628 mighost.exe 43 PID 628 wrote to memory of 1944 628 mighost.exe 43 PID 628 wrote to memory of 1944 628 mighost.exe 43 PID 628 wrote to memory of 1944 628 mighost.exe 43 PID 628 wrote to memory of 1944 628 mighost.exe 43 PID 1640 wrote to memory of 1716 1640 iexplore.exe 44 PID 1640 wrote to memory of 1716 1640 iexplore.exe 44 PID 1640 wrote to memory of 1716 1640 iexplore.exe 44 PID 1640 wrote to memory of 1716 1640 iexplore.exe 44 PID 628 wrote to memory of 1044 628 mighost.exe 45 PID 628 wrote to memory of 1044 628 mighost.exe 45 PID 628 wrote to memory of 1044 628 mighost.exe 45 PID 628 wrote to memory of 1044 628 mighost.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe"C:\Users\Admin\AppData\Local\Temp\f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe"C:\Users\Admin\AppData\Local\Temp\f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=f8943f37773d0fb0189fd4e40d32f97d3314451cb4addf56262fd14056bc9b83.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:537615 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:603155 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn TRACERT /tr "C:\Users\Admin\cdp\mighost.exe" /sc minute /mo 1 /F2⤵
- Scheduled Task/Job: Scheduled Task
PID:2532
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {53827575-233B-4AC1-B193-CDADA38050CB} S-1-5-21-2212144002-1172735686-1556890956-1000:MVFYZPLM\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\cdp\mighost.exeC:\Users\Admin\cdp\mighost.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\cdp\mighost.exe"C:\Users\Admin\cdp\mighost.exe"3⤵
- Executes dropped EXE
PID:2172
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn TRACERT /tr "C:\Users\Admin\cdp\mighost.exe" /sc minute /mo 1 /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:1144
-
-
-
C:\Users\Admin\cdp\mighost.exeC:\Users\Admin\cdp\mighost.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\cdp\mighost.exe"C:\Users\Admin\cdp\mighost.exe"3⤵
- Executes dropped EXE
PID:1944
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn TRACERT /tr "C:\Users\Admin\cdp\mighost.exe" /sc minute /mo 1 /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:1044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
579B
MD5f55da450a5fb287e1e0f0dcc965756ca
SHA17e04de896a3e666d00e687d33ffad93be83d349e
SHA25631ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0
SHA51219bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C
Filesize252B
MD5f15bea5e815cac81e599ca0eb017c892
SHA1f88312eb72b6e1642ffd546d98e2cd0898196a35
SHA25647dc771db329d3320e2a5d1046f76b6cc1d12f1299fd49037160e3e9a51335f3
SHA512149f2809aa5aa530d9358e544f151a48bc51f0507ecf151c13049a7c277002517b27ca42a9a8714417fb9a6d0487e993ef8debc7866dc880434ce5784f206f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea1f767c85f99ff1cc66deb2a9981dec
SHA1ba2e2a4022715d30eaf000dc00858f4e4ac1b43b
SHA256225548ccbac2c491c8b1f39c10cb750b5392cd59ff0f7a366fd35c2175694ea2
SHA5128138f2d651e33b900f9e856edd19b9b5ac37f323c1fae3c0746ad5187d2995f929f9cb7c1bec7b2171b914db2a57fa7d05768a19d7ce4d4af430a90534b2f503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5556946afc905addc866f9707df7e3bc9
SHA1d81c801fec0cdae6621c1f1456c4ef2c60111437
SHA256522f07d19b132c299cf65568f4b424dc6f1879ff536a0c59309cf5d3cf0b9f06
SHA5128b7232ecd9a52a916e15542b067f3a2a1583a7e86dcfc9fd91debeba4ac11c233d4028c330f51feed1bb3bdd7c5b306ea14ff3d98d8f008cc866ea8fa7115e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d701f3e797096dba78d8be127bdb7d
SHA182002f8cb2142fc1667b3aa852b5aaa9e797988f
SHA2564bb3fe4aef21790f70aac046c660546a3178f39a3340c1472fd2a22527ef9649
SHA5126f83f675d539f2804959606ead064cd54b6e59e1ac1a2e81b744e872f4cc73a8e0032b17765d366a553f941753f6913650afd78af438feb996de6405fd5d0d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e056bd2ddff96bd980e072b221243cd
SHA10c1942d8544e1e66279a5183ac1605204f583d28
SHA256fa489ead022ade3eb44e7b84d07229feaf606de8076ca761ccc1fa64207e9884
SHA512527baec301e79bf4caea8f2eb124c31966c500480531d00bf716edc9051e0e13ffba7358a43daae678e914c2804a17b01c2e44956fdade9f37921af0713eabc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af51df8687d2c688421017cdbf36098e
SHA15e8870f561efe57731b286e2bda80f331721aa79
SHA256c02b43ecbc63c1c1a414f7267edd3ed61d9c5540e26d343d441f8eea9dfa1eb6
SHA512d4237d57b34372e9713189dd9b4473c78c93c1174df82f5738f24def3132f5bc3d6245b1726b9e97ac5b15f80eace07db95f0cf7c33193677a684cf79f1ffe4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5559c42bec8cfc950624a55585393d725
SHA137afe6cc66d0db8b7b5de5e2a33691f2d056aa68
SHA256b99023357fbaa0f3a9ebc7f31880ba3888e817364f004e1bd71fadc758236fa7
SHA5123c7e47738b8a28d9301e47e3bba3ad94c924676eceb7bd0fd863639d842841282d4e54dd1513dc5c33be0931c5f0baa11615741e85ef1c864c5175460a80237c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f7717836b1534dd2b57eb695e9227a2
SHA15f1792703e57bbc046e44f2940815307a076e244
SHA2565f1507f24f3861a37470223d18b221561022d07c5ad749b0e3d778a5e16f10c2
SHA51232303bfa3999eacfc2c98f6e95fd2ccb79ccfe83dc7ef88aa17b1ca00a297bd514985a1b38bb122d7c33d6db10e2c32998941b95a1e9166ede0dc2ab48e5d96e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5483c16edd7f087218dd002be3fa21c66
SHA180b6b69666242b25af31964b1b2b28eb87e020ba
SHA256fdd2159c4840630bc862c61dda11a17ad4fbb482871e5e26c17bee85bcfbc1f1
SHA512c718124e3f6894f371f08f0b0af5f1a59d6f53b4890c286e09a1729382c84d7de699a89d451314694d588b674cccbcf2637cb6d90c0fe95314dd5c5598f2ffcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5345e1b8d40e6e5bd7b23e17750c6f93e
SHA1fae52be1fc1c5a1a6c8add17d3a088cafae02408
SHA2569a020b9718025bd2d345a280fca31aa2e01fcef989eda63b51cbb98fad10992e
SHA5120b1cdb9cf8c11460eda0f5e10d2cf16e71032002ef3db5efef7d7221cad15c17f98431ebdd41b71f678641cfe4a4ff6a294ccf13293f4a473add92bc0b554848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa23eb0c0398f3af800175467d029bb
SHA14e6502a39683806119e5a77d392b9cd4773d70ef
SHA2564355569c71f85554de43289f52a39427e6c83d5010bd4630ee30d3b2e1e6313f
SHA5125fcc6ce4119dece29e3e0b093806b7d138a5dde3744817f191bdc8f259f963421bab33b5edd451ddf9a1de65c002937c10c1823a1f261c15bcebee28762a02db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5391c57a6017adc343eabc7e783e9a6f6
SHA10eb05120d519bc88783444009f698fbab751b28b
SHA25657a68f09094e9b0ec52da98f2cad4c99bd4b8f9add948d157aa37815d2288c26
SHA512d0468f8bc22a9d80014ca867a5138edf754678d2e2c7090704184eecdbe770f62b6f280339169b46069f18482dce501ef2818b1a6c60c95004a48461ef0337f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d5e35b5fb7e0f10225879436ca57c3
SHA126dd0070d3f02eac7f34b9c20fbdba0aec4546e2
SHA256f15f6e968b029b4bf930c290bff23bdbadf692c94ea6100ea97e1bfd3441e575
SHA51271f4fd8bcc07fd43cefa2b4db2c86caa14c2803f221048fb932a945531b0b12217cdd0d336cffc3042f3902855655a5f58287934fce4ff35caf21825f1136be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5994423d4c90b50415fa56554c9f10b18
SHA1b297c9b577307715ebfdc61cb4adbd68ce403d21
SHA2562e636445e65f8201428f0b8d32a978206349aa1e6eb3e1c71dc0150c6c234c5c
SHA512a14d1bfe0f08a1aa00d866feca4f95ff8f6f776a61b9eafd362ff9c6f4b03abe6264e1fe6bb992b81b9fd1b8d609f00333682286740817f88bb222155998bf2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ca45011bb8ec96a6732a96ce02f17a
SHA1ae37643521252ac07b9d0b75874bc89ac4130b79
SHA2568e39065f660cf4278a043112a5914ad703770ebd022e95ea4860050c8a82eff7
SHA5122bd53808e2474a52fff7cf752c2c48630c7a2c20b7d3545f5ff6a825daac5f6e6cb48c8eb38ed884aa9fea8b4f68e840300ff29e36abd3413df8a0f436adce96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583d5c1ec611c60d97b5968bab2f01b31
SHA1279fa503ff4dc3d658a2b57545f4a9f1c243d8b3
SHA2566adf987b0492b5f27ac79e9cfd61aa41459722239e56b0d7aee796794dd2c33e
SHA5128b0e4d0a0284544a29509e10efbfe0440aa206ce375c4f814cfe9239091a83aa3b67c078c86c3e285d856d9b779d5c59e52ff094518924e87034c9a50161c4a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568cd78e6412b3a4c38bab5dd7b543798
SHA17d63e382fdd2f232683b08f5b94e019eabdcf583
SHA25654c4690e46194082d1a0ee10b98754c31e032bb60583090840da8f73ed7fbfb7
SHA51257c131f8506418f8dfb57f3b96d975ebd8a139b559bf01f9fdc4670af0b0c170146f67e382ed02046bd7cf20906132ecf55c63a5931e862cb03d1d935b482885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56b4381d8711d2955170a78a3ea2cdd
SHA1e58daa5d0ca4915c91dfc957435df61c19c1f255
SHA2564a90fa615df7aa71777c007e1da6a5fdd89ec01e70b6f76f02db8b1aa18a4527
SHA5120fecf8b75f8d2bf7efe19204ea2fcce01eb05f2b80923b1df112802537d4f0ceb0dc65d7097412c378a9a7535ef878f76943285674a95c056e7b94bc51a191ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0508cf1c1fbc04464ebbd7b1620743a
SHA170a005d8240bb84a7ec6148d6546a712c0d3968c
SHA256882c2d703a7fb9a96f9ab269066c91cb6b381c8826850df3ff268d8470cdb103
SHA5121a72168dc46700855b20c89941adf217784125ffe0bf98ec9269a19ac4b78add4e2dbc3a7be28a5cf87abb731fb450a0dd99b95137605c810d1ec9f0c52cb27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553586347d766b4e1a5e2a05eea5648cb
SHA18a37b0dd047523f5c08abf4a6c14bda9c5d1d898
SHA256ae2b1b9f20cc25402b77961ebb43efecf4738996ac1e928e6305d4cca76526e6
SHA51279412321e3349267a34efb4f33568242572df3315ea4a113c7903fe9486316df1ed4240971a5cbb749fe52f6673a6e522f0f9267a683a108d70043fe6e20575d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ba85eede76ae4681c8bcb3fc6b24ae1
SHA16359f9cde9def69e79f1a43eaed0a87d35b0e652
SHA256b3bc370b08703a2257b1bc3b8755defdaf0515052d8885814c94917f32659c42
SHA512f60f9df4c1c0ba332133939530707b30dbc5243a93aa5b5f8402e1f751a008840ff4ad358ae131d477205274c37a72805dc8f8d343d2247724e34d7d138b3279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577fe0adf8aeb3bd1d25326e2143cfaae
SHA112e7f52143f6171a498726464687ca22656ec1fb
SHA2565945e386ccc016e201a0743f294913cdc6e68a06b683b4da7ed8682bfb999bde
SHA512af86d9ebb895cb89a9ee9ef436f9c1c8209d669c68b3dc61ead1d545d3ff11a7d324eee3f660699acb2f659759ec63a1cc148c763310b341182ee6861f5f917f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea94dc12a7a0eb46dea5f9e5abcaa62d
SHA1a025c00f02d2fb5ff6a6b038cdd3cc052568ab0a
SHA25688fbc461aca954650ff1cea9285ef44db6f09c050e90719c6b1f3cb0a598e626
SHA512572ac01b4214650fcc86ee75ed3e577389036890cc0158137ed5b341e192ca249501b42ecb218b495e25e1f726f273e7d4341cb685b1a8b6ec5850e5dd97d391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51de17470ec35fabe8992505fa606daaf
SHA1db9503c3ffdd2074066c503424830872463dd3dc
SHA2566a368c13b9102d7a3f09f34cbf81b6fa8ff48a5e4a459a40cb407a6de4ba149e
SHA512ba2f494d36e682206e8d90139983604476d0a62677fceab08e7a765a283e299b7d1fe7d8c6b311f9a2bc16367932a1c2c5c8b8f13d1c9ddc5d5b105b97238bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f456752713df38af9d784999b29ec647
SHA1a5416dee575438932135f58cc1d9ea582f0afa04
SHA2561b22881b5178295a38c58d1f1b9f241b3b32fe4f9745e46caebcb01fade358df
SHA51274ec054a2befe1de9154b8cf6dee89dc06ff0e4f96fe8df0cc6f5f83566c300e1383c8f8ab32650201a77caf6c703ad695f1f51fc7f0a646b1f3c9e43d8d2a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533abc912b51047ed9e6c0ca598ede274
SHA119f6e1193781473bdf58840a7afe10a12ac8e06c
SHA2564e8ba74b1787738ce7d227206c86939504f76433f13148ca9f7876657c1bd059
SHA512c14270c8e12e4f5a7a1231ed22ea4673576154e5830c5b61d8187fcc054d57b0ea0fbdc63384b97c38dc0b0647007c1bdd3250d50309d51e84946ff1447ab88a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525427b9ed2d9b9ea1495b54e7b794776
SHA13cb540618497976b32d32b24bb418176a5aeb2ca
SHA2568848cdc24d2deb159a1ce495c8765593525cffc3167bdbe6eb4f9a5bfcff1488
SHA5125291ebb43b862a4d9ee5b21602ddf747dab6542579200308781fa7b0420771f8e85fe717994484c68dcf0e612ac88c67e79c81dfc314285e08ddb830ef4bd1b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b099da9031b3f43be28e030486790b04
SHA10c7e10df3eaac1c23d96940e0499ec129236d96f
SHA256623619088d37d9831564e1e66224402d689d32020b756200af6e5e97c9e52442
SHA51236accb9aca189ee564f8ce6caad346168163b856cc8b4b85942b58fdd5e4a6cda991e2a3d7c78ee5d5347bd8ec4061a09cb05ce20a09461b88dbc1ef23c89802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8b3e3c4f28dc417ff15ce23ec76ab3b
SHA18522a0c749dfccc9816b5a43c0fa7bbe80a04ed6
SHA256ee64d0111816ecb59a3c36d0d2e3872c8a476c73bb5448100b72672c78b88a3e
SHA512dec68bca0c8659370eae2ae594e044af2b944785724062a014599d380eaa2cecda77c875d8b85c18de5b569fe9f8ae3523135234229f22945f78d93db7295c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b752f40240efba18a4e86feeeb891ffd
SHA163aa4d389aaaf230900e5ea3e5d0674f621b48bf
SHA2563b510ea742817ba8f1fb1345a5a3aa171a003ac72bc2e9f5e540274ec8dd3921
SHA512dcb4d5fb59f5dd8bda32129b2b6e759950e3e56ffd54195a5d92f2add15507b93970d3d62a186ce404aba4c6328f0cf7a04f81fb71145e92d706de92cdaa0bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546fd014bff5404583cde6873f7b49ab9
SHA1fc4947a182448cd254f80d2cb0bbc6e86c7958c5
SHA2560e5e5f6958cd34d3b5771b35fef23fc6ed2bbe0f7cf57628b862bfdb6f951a2f
SHA51254e916b6c35085cf47a61cc1162d5c930a792d086608828a3681bf884c417540d9ce12c76c5a8247c0d7ea4945d3899f7eae0ca3505a18a92dfaa8212ffc095d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0ae59eb7382f6b695069c962380d538
SHA1286f0921b9c3830a7f3eed8d4260bf2fee38bbf8
SHA25677ff230610413b96d9c7c144ce2a08cdbb581b85ff937e02c03ce2f3480e5ae9
SHA51244e06349952ada828398939a24fee60209c8a27b298a957aa23f451255b4bec30843783ba86e3ca634a9d875d5822055f8d7e62f392db82b2bce43bb91a3fabd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51633704a23011003bacae3878f27369c
SHA1cc72f4961885dc1e3a5fd1e501de9660c4f44445
SHA256fd68f61abf1971d66ea63c01d5fd4995223508f6bbcdc6ce648790959d847f1a
SHA5124c8ef373a4a0032ff065ae344961f8a624d6fb31b4993847ca98588c3015d2677747cb20e3d63ecefd6ecc488be78c002e449dc6b680aace28b36f6dd29a1d0d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
858KB
MD533da5eb08696d626d2879a8883f2d4fd
SHA10b3fedd056e8d378a76009a4e9a1e34a555f8ed5
SHA2560d6e31f70c83a5ec1f1b4dd43f956e038403ff3a4f179941e6ad1504f4c54647
SHA5122bad8cdcb21ce5f81a8af90bbb451c8375186f5e27267311bedcf227b2d25781e939aaeb75deee0268651003e83479fa93f928ed99682438ed9cab7a1d996711