Overview
overview
10Static
static
10BearFlix\BearFlix.exe
windows7-x64
9BearFlix\BearFlix.exe
windows10-2004-x64
9BearFlix\data.exe
windows7-x64
1BearFlix\data.exe
windows10-2004-x64
3BearFlix\libcef.exe
windows7-x64
9BearFlix\libcef.exe
windows10-2004-x64
9BearFlix\strip.exe
windows7-x64
9BearFlix\strip.exe
windows10-2004-x64
9BruteFlix ...ed.exe
windows7-x64
9BruteFlix ...ed.exe
windows10-2004-x64
9BruteFlix ...le.dll
windows7-x64
1BruteFlix ...le.dll
windows10-2004-x64
1BruteFlix ...et.dll
windows7-x64
1BruteFlix ...et.dll
windows10-2004-x64
1BruteFlix ...on.dll
windows7-x64
1BruteFlix ...on.dll
windows10-2004-x64
1BruteFlix ...ta.exe
windows7-x64
9BruteFlix ...ta.exe
windows10-2004-x64
9BruteFlix ...ef.exe
windows7-x64
9BruteFlix ...ef.exe
windows10-2004-x64
9BruteFlix ...ec.exe
windows7-x64
1BruteFlix ...ec.exe
windows10-2004-x64
3Dark Star ...32.dll
windows7-x64
3Dark Star ...32.dll
windows10-2004-x64
3Dark Star ...64.dll
windows7-x64
1Dark Star ...64.dll
windows10-2004-x64
1Dark Star ...io.exe
windows7-x64
9Dark Star ...io.exe
windows10-2004-x64
9Dark Star ...al.exe
windows7-x64
3Dark Star ...al.exe
windows10-2004-x64
3Dark Star ...32.exe
windows7-x64
1Dark Star ...32.exe
windows10-2004-x64
3Analysis
-
max time kernel
291s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 07:59
Static task
static1
Behavioral task
behavioral1
Sample
BearFlix\BearFlix.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
BearFlix\BearFlix.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
BearFlix\data.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
BearFlix\data.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
BearFlix\libcef.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
BearFlix\libcef.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
BearFlix\strip.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
BearFlix\strip.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral9
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\BruteFlix_protected.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\BruteFlix_protected.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral11
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Colorful.Console.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Colorful.Console.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral13
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Leaf.xNet.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Leaf.xNet.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral15
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Newtonsoft.Json.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\Newtonsoft.Json.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral17
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\data.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\data.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral19
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libcef.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libcef.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral21
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libexec.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\libexec.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral23
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15232.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15232.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral25
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15264.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Dark Star Netflix Checker By Scorpio\Bunifu_UI_v15264.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral27
Sample
Dark Star Netflix Checker By Scorpio\Netflix Checker By Scorpio.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
Dark Star Netflix Checker By Scorpio\Netflix Checker By Scorpio.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral29
Sample
Dark Star Netflix Checker By Scorpio\alocal.exe
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Dark Star Netflix Checker By Scorpio\alocal.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral31
Sample
Dark Star Netflix Checker By Scorpio\database32.exe
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
Dark Star Netflix Checker By Scorpio\database32.exe
Resource
win10v2004-20240730-en
General
-
Target
BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\BruteFlix_protected.exe
-
Size
499KB
-
MD5
95fb8d6e4711d68a03da70c28590f3cf
-
SHA1
e63d4905e61575f8b1227ca13ef8d727e62f3e6e
-
SHA256
170a2009c0f8c0558e5c39061f499083ea9f4a5bf7c4af66c5d6074293893970
-
SHA512
07a8a1bcdc903c5eed4e3f42cb9197a5b49068136d54e6acc09c035088175a6309057bd7dcaeb120ec00bccb2b7e7924fa1fec30915457272f42ba869dc40c94
-
SSDEEP
6144:xrUHZYwUeFnp0Ak27gU6bF8VqOAOlpfQ6H21SyA8n7Tcnts/3dbCCgw+eh52caKv:xY5DjFnphE78AOjF9RyAA2omknPaEh
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
winsrvhost.exedata.cfgdescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winsrvhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ data.cfg -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
data.cfgwinsrvhost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion data.cfg Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion data.cfg Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winsrvhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winsrvhost.exe -
Executes dropped EXE 2 IoCs
Processes:
UserOOOBE.exewinsrvhost.exepid process 2440 UserOOOBE.exe 2612 winsrvhost.exe -
Loads dropped DLL 4 IoCs
Processes:
BruteFlix_protected.exepid process 2056 BruteFlix_protected.exe 2056 BruteFlix_protected.exe 2056 BruteFlix_protected.exe 2056 BruteFlix_protected.exe -
Processes:
resource yara_rule \ProgramData\winsrvhost\winsrvhost.exe themida behavioral9/memory/2612-26-0x00000000013A0000-0x00000000017FB000-memory.dmp themida behavioral9/memory/2612-56-0x00000000013A0000-0x00000000017FB000-memory.dmp themida behavioral9/memory/2752-60-0x0000000000BD0000-0x0000000001458000-memory.dmp themida behavioral9/memory/2752-59-0x0000000000BD0000-0x0000000001458000-memory.dmp themida behavioral9/memory/2612-27-0x00000000013A0000-0x00000000017FB000-memory.dmp themida behavioral9/memory/2612-25-0x00000000013A0000-0x00000000017FB000-memory.dmp themida behavioral9/memory/2612-24-0x00000000013A0000-0x00000000017FB000-memory.dmp themida behavioral9/memory/2612-23-0x00000000013A0000-0x00000000017FB000-memory.dmp themida behavioral9/memory/2612-22-0x00000000013A0000-0x00000000017FB000-memory.dmp themida behavioral9/memory/2612-21-0x00000000013A0000-0x00000000017FB000-memory.dmp themida behavioral9/memory/2612-497-0x00000000013A0000-0x00000000017FB000-memory.dmp themida -
Processes:
winsrvhost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winsrvhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
data.cfgpid process 2752 data.cfg -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
BruteFlix_protected.exedata.cfgwinsrvhost.exeIEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BruteFlix_protected.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language data.cfg Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winsrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{174CC581-4FDE-11EF-838F-D692ACB8436A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428661944" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08d17eceae3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000e28a00ed336ae6b40f8f20045c8727f2db93713ee113e1343260727d18a9eade000000000e8000000002000020000000f5d14c19dc27533842fcf803e591762d9e4fc66cd0849ae3f80b5be3ff619f032000000038ea831c1114ad911e39b1188eee3ee6708aefbb87a10cd8be28fb2d086e86a7400000002fec8b8a5abfec15b74e6c3f2eaed8ee25dd2a1243a75f6bdaa916fbee155541fe6b40b831ebc90028c29fa6b87dc5c27984236ec34955b0aa94fd45d73f690e iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2684 iexplore.exe 2684 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
BruteFlix_protected.exedata.cfgiexplore.exedescription pid process target process PID 2056 wrote to memory of 2440 2056 BruteFlix_protected.exe UserOOOBE.exe PID 2056 wrote to memory of 2440 2056 BruteFlix_protected.exe UserOOOBE.exe PID 2056 wrote to memory of 2440 2056 BruteFlix_protected.exe UserOOOBE.exe PID 2056 wrote to memory of 2440 2056 BruteFlix_protected.exe UserOOOBE.exe PID 2056 wrote to memory of 2752 2056 BruteFlix_protected.exe data.cfg PID 2056 wrote to memory of 2752 2056 BruteFlix_protected.exe data.cfg PID 2056 wrote to memory of 2752 2056 BruteFlix_protected.exe data.cfg PID 2056 wrote to memory of 2752 2056 BruteFlix_protected.exe data.cfg PID 2056 wrote to memory of 2612 2056 BruteFlix_protected.exe winsrvhost.exe PID 2056 wrote to memory of 2612 2056 BruteFlix_protected.exe winsrvhost.exe PID 2056 wrote to memory of 2612 2056 BruteFlix_protected.exe winsrvhost.exe PID 2056 wrote to memory of 2612 2056 BruteFlix_protected.exe winsrvhost.exe PID 2752 wrote to memory of 2684 2752 data.cfg iexplore.exe PID 2752 wrote to memory of 2684 2752 data.cfg iexplore.exe PID 2752 wrote to memory of 2684 2752 data.cfg iexplore.exe PID 2752 wrote to memory of 2684 2752 data.cfg iexplore.exe PID 2684 wrote to memory of 1688 2684 iexplore.exe IEXPLORE.EXE PID 2684 wrote to memory of 1688 2684 iexplore.exe IEXPLORE.EXE PID 2684 wrote to memory of 1688 2684 iexplore.exe IEXPLORE.EXE PID 2684 wrote to memory of 1688 2684 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\BruteFlix_protected.exe"C:\Users\Admin\AppData\Local\Temp\BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\BruteFlix_protected.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\ProgramData\UserOOOBE\UserOOOBE.exeC:\ProgramData\\UserOOOBE\\UserOOOBE.exe ,.2⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\BruteFlix - Multi Module Netflix Valid Mail & Mail Access Checker\data.cfgdata.cfg2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://t.me/Team_Pentesters3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\ProgramData\winsrvhost\winsrvhost.exeC:\ProgramData\\winsrvhost\\winsrvhost.exe w7sn4xP92s8X4J5GOUE5kYMJcQekdeUj8Bllqp8mGCHP7yubAan02ddTgkijm0Sr2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e950986f689cb7402d73255bc8f0875d
SHA15b1d91b5fa9a2c1eaf5ada44e1b518ba109c7643
SHA256791be33b4537688a2b442878b66a180191d77709883be1b2ceac050317866cc3
SHA5120f4e6bd2720214c04a87344c8aececfbc623ee482b650ee5d15fcc4d1ec8b1d9909be2fac1d130a49de3c1559f39a3c4e5146c8891367ac543f1bc0bd52e1980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522cd82a9106e05c88da648fb64e71701
SHA16b81b4976f67986715d5e34e3298a18450039636
SHA256690bb241be3fc03a203732bc88d26fe572334fe3b078e7d56be3340fe8f1ca20
SHA5126161c61deaa8b6a06a46230a58b5fa25edeaa55369c7dfe1317d7bee631a00802749986850ec1d2310576a9404809a1810acedd848c03698a42532ac1b9a2bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5047d2453885b4abe91677798acef42e6
SHA162c61e21e7328e19c24ea1dab313d8570e32c087
SHA256a265c3cc762e82e1a250aa7568aaba0721e8b7c8abb5b71b73f1f7888bce905a
SHA51254a627e466230ce892b5ae05b84043a7a1886db0ae704150c7074534c8deb0c3eeaeefa68e62c4567502a0496c91aaa11d458c4b8b238290858a4bd237cffcda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b2bd6f40986b0a6a2cda4256b14419
SHA17af491f61dfecbb80d26ac578c83b5f814546ae6
SHA25606480408e823f40b80c802e52d379de20c9e2fa34836fac67d1aa9ced0c3c623
SHA51266fc33c5ba607aa53ed1f2b1336cedbabd48d07fdc84603b85d8ddd33b21fce6b11888f0d844341905a3da44d2cffce83963f41d85a83f2ae41996507ec0bd41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c969fed126cdebd37630d37d0cf15910
SHA131ec2b512423677d0716fc5c7b32d0b003497136
SHA2568e4cf88f34f2ed9473002e8069eae854a970842016333be1970d01d27a16d988
SHA5123fbba0f219470faf2152dd5cfedd1e2434c1c9b7cf7541dda5d4b604f7c5e39b71376a1290cdfc7719f681cfe3ea6b58cb10fb4017b3b230f096b3e8784ee83f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533987d39cf46979e39fa039c0def7dbc
SHA1147dc2d55d04b1c2e4d7a69b34eacf7f1f591276
SHA256257c5983222f994308e654303de87a8761de35ce9b375a83a1ba79b6d6518600
SHA512afb6956e86cab6d16e0188f499a94e48110ace771998d34f066736afc60cc05c707120baffaaa788d57517f1a38147d3a63f64783ada247578d29b1770a6fb93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c4444a8c03109c9b46187883837bbe
SHA1eb3c131bfff9ad694908dd654ed93611a2bff96e
SHA256f6adc538c028e493be9014ac5863ec56f626c2db900eaf4c4561e8e16e3ab08e
SHA512758bf745f81fb46bc783b9ad4306da56398b4af4addd14636de0b5190e3f28f70d05dbc9daec68e4a73489dba42488e2c9698a4937f93addbaeeb3cc19620c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bffe714c65e9252040c5ebf2a0172b36
SHA18153a5aea950aae57a18d9c642314886c20136e4
SHA256272f3cb8750f2f4cc4b95e8e9a10615836186cf42a3d389acdb26244434d2f02
SHA512cb863f675f8ae8e4768cef2e0b5265e04052788694770605afb3d2320720312ca1d7037db39515a58b82e70fd4eeae86fd760749f77d85497e554b804a1e3529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540d3012d3daa7b485a773dcac65a0677
SHA13b6674283a72f484d36ad41c2288a0bd85046f74
SHA2569179d849e938bfe47225aa6c31a054dee53e9a08854147c88bacc7281793ddfc
SHA512427067889563b0a82b9732be63b61bc165cea0509aced2a3da28d7252d10d6525995df407564752bbbfda1758ae466752140a5f5c940eaf31ceca4fb56549819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4b2254e103273375b288693eaea4b60
SHA147458edc0d381282ead4add09a2f5419b1652cc3
SHA2562f7b0dcba3f6def49f63126fe6c9ef1d8846abd63c21a4c71bd0e0671120f295
SHA512b997cde731ed39d1bfd63d649a6c6531bc6370f7e24037015a74b5769a113401b70c284d6b27fff5c672e889f936ca2d9a69f2b8671557c08324d6cedef0b8b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50782f9241a7776f11e9a4e403512a28a
SHA13bca42b7681c13d80de337b9195a684df611d75b
SHA256743c9b33dcf0a2e62e5d4d1961c1d50bae56c1e9e90a59e4e8fb45b6a0e169b1
SHA512c01309f8f1a045b90d0bf5ec91c862635fe95e3219edaf46a2d3554c302ee05d082358b006578842721e1ef714c1c419b56dedcdaed9d856707ede601cc9e122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdcaff8ffb0e031e0a9cc9364a30715a
SHA1ac32c9e2749b9fe3a8478a7e386976ff2505e0c8
SHA256c4a4d70e9293c697b5d43653460e2b7ed4008eb1bede3f4d30e273234502b07a
SHA512a17b3f1c9f1902166c3d9301b2aaa7333acae67272e89773dbcf27bb08fd02573844f6fa2ff614e46fc797bd0587d490f71252998f682565b73721e482c9c26e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576390bdba1641271a334f0467c87a3cc
SHA17427c5e2faf1e437c875cef3f3115b8816fe79db
SHA25608661b06abce8b2d69871e9fe3ed534ee44c83089db530bd86541863c45b6c7d
SHA512e0ef834d4e7f4077d54ebc4e446349181825f6d40959e88908ed27aef356ccc0630ad0915835e9119d6addaf2caf0509e0e42882570448ea900a958aed1ff74c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c16b48eb779333b2ea1be4ee49a2e3a9
SHA1feb005988985cf07230395a8fb7a32cbb81d1b91
SHA2568ce9cf0e6a41445ab2bdf5dd4098438cf8e043d2f7899351d300e62778e81651
SHA512e98b8e558765144f86ccbd33a4cc7b6455e944d31f61c5d70fb6eca3812b73e733d77747aa53c3385ebfd51aea67887b088d6bc6778ef8bafd4e8604812e8b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c94416226e0062b938febe9707fcc95
SHA1ab05e5bafb1f2e16bb07720b1b119eb13d93b16d
SHA25631f102a2f64394b061fa6b9384229ece6c057c953b2255f9da4422aaf4f3b2fc
SHA5125c903fee3cb2adf093735b19a0811412f22de4d8a1db554723823a4d66ae309388925bd8efb45ce27486039659247e1ef9496b43c1313bf83682c0b181b8aa58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da6d325e3c5175ac428c97e92fddcae5
SHA19a24fdc541faeae0d0bab721771447088cc39ea5
SHA256522768f79f861fa1add9553b8d848a81205870425adaa8f4e0920224b1ba401b
SHA512ffe17ee51417443299e32a8bef728cac2bb9079102a2d22dfb3d98f79ce7d78545cdf0a4b95e4df8ccb36702ee0bd8dd728847c875f25b775a6fae829a09ee87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd89373b150d8aee3c6e16662616e46
SHA196295114d4ea90e52e7673766d00a677e9a89a3b
SHA2562ce3ef6d9abc5bd110e916bbf986b6f0edbc75f1e8c2034e5f9ce8b759602b23
SHA5122553bb3630db7444838152d4a82db4f98d639186a0fa38db55729ca9373122c84d7b54c51f40408772dc56aa8159f451ea2a57065807ea7e67a78489d91281cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501c1a3db1b3e171bee5e3f7808cb8597
SHA17789a250a355ff776b3629cd863d7915280d08eb
SHA256281c98af12e549f8c110d9e1c3874efe6ed60b503b6d2de3d79f0b8172cab3eb
SHA5124189a604a000b68dddd48e8f8e206ca49e9993512156159f7267a9669ed7155a9f03856b32e66fb6591f0242573b9be8aca26843d364448f2efd17bac7ba769f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.6MB
MD5939712a4d4341fb67c0214621a78fca7
SHA153225cb2d07e8131c9fdb086a70a81cd41f588ea
SHA256f594ff49ea0a51dc4a76609291b7c3e44fcc92789378f899349609407ac55b61
SHA512f9cd9997394dae980b99018902e347a48b4eab44041e88bad6fc3d10c173b31cea44b0202e7233b1dc934c102c27f1ce5662a01e53b1b0f80197c9c73bb24144
-
Filesize
3.0MB
MD5a553208ea4a57f1334669fe1e80113b7
SHA1509aebd8384adb5f0d5f37dd3dd2b799ca7ddae6
SHA256c868a800bef638fd579202534fa763a584cf78a01447afc89908ed1bae308ace
SHA51208765ce1ed9d095527b469495b2138e6446c9034916f4030e7c02c43ea7b39708c1d3cd4f35c9df156633e77cdcb702258f7d627c028c902ac3f450dd0643eef