Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 22:43
Static task
static1
Behavioral task
behavioral1
Sample
AndroidSideloaderv2.30.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AndroidSideloaderv2.30.0.exe
Resource
win10v2004-20240802-en
General
-
Target
AndroidSideloaderv2.30.0.exe
-
Size
4.2MB
-
MD5
7e2b918a866b24b1faf8cf3ad9292a6e
-
SHA1
798c5d509dfad39ee7384ed604e34a01ba8bd5cb
-
SHA256
04ce50b0cf7fddaaac3e1940e21234ddfc6f05d352891989f8067310f4ec6a69
-
SHA512
2cce264bc27f438cb3f1e0fd245158da620934eff58bf83ec5fd66460b9bfdeb0af7d9dfee09b6e9062d2d99cc8fa76219f3073afa44910ff07fb5351631314f
-
SSDEEP
24576:kR2wjV//vxExkun/JcDJ7bdukqjVnlqud+/2P+Ap+KVwN52/h:w2w5//vxExjn/QJ7bYkqXfd+/9A9
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
pid Process 628 7z.exe 3860 7z.exe 4196 adb.exe 1068 adb.exe 4088 adb.exe 2308 rclone.exe 3348 rclone.exe 3920 7z.exe 1636 adb.exe 996 adb.exe 4184 adb.exe 4292 adb.exe 1428 adb.exe -
Loads dropped DLL 16 IoCs
pid Process 4196 adb.exe 4196 adb.exe 1068 adb.exe 1068 adb.exe 4088 adb.exe 4088 adb.exe 1636 adb.exe 1636 adb.exe 996 adb.exe 996 adb.exe 4184 adb.exe 4184 adb.exe 4292 adb.exe 4292 adb.exe 1428 adb.exe 1428 adb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 17 raw.githubusercontent.com 18 raw.githubusercontent.com 36 raw.githubusercontent.com -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AndroidSideloaderv2.30.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adb.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C rclone.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 AndroidSideloaderv2.30.0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 AndroidSideloaderv2.30.0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c0000000100000004000000000800001900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef453000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286040000000100000010000000497904b0eb8719ac47b0bc11519b74d0200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e AndroidSideloaderv2.30.0.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\CA7788C32DA1E4B7863A4FB57D00B55DDACBC7F9 AndroidSideloaderv2.30.0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 0400000001000000100000003e455215095192e1b75d379fb187298a0f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d090000000100000068000000306606082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050508020206082b0601050507030606082b0601050507030706082b0601050507030906082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520031000000620000000100000020000000ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b1d00000001000000100000006ee7f3b060d10e90a31ba3471b9992367f000000010000000c000000300a06082b060105050703097a000000010000000c000000300a06082b060105050703097e00000001000000080000000000042beb77d501030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c190000000100000010000000a823b4a20180beb460cab955c24d7e21200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 rclone.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 rclone.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\7F95276D4951499FD756DF344AA24FB38CEAF678 AndroidSideloaderv2.30.0.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\7F95276D4951499FD756DF344AA24FB38CEAF678\Blob = 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 AndroidSideloaderv2.30.0.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\CA7788C32DA1E4B7863A4FB57D00B55DDACBC7F9\Blob = 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 AndroidSideloaderv2.30.0.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3348 rclone.exe 3348 rclone.exe 3348 rclone.exe 3348 rclone.exe 2308 rclone.exe 2308 rclone.exe 2308 rclone.exe 2308 rclone.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 2320 AndroidSideloaderv2.30.0.exe Token: SeRestorePrivilege 628 7z.exe Token: 35 628 7z.exe Token: SeSecurityPrivilege 628 7z.exe Token: SeSecurityPrivilege 628 7z.exe Token: SeRestorePrivilege 3860 7z.exe Token: 35 3860 7z.exe Token: SeSecurityPrivilege 3860 7z.exe Token: SeSecurityPrivilege 3860 7z.exe Token: SeDebugPrivilege 3348 rclone.exe Token: SeDebugPrivilege 2308 rclone.exe Token: SeRestorePrivilege 3920 7z.exe Token: 35 3920 7z.exe Token: SeSecurityPrivilege 3920 7z.exe Token: SeSecurityPrivilege 3920 7z.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2320 wrote to memory of 628 2320 AndroidSideloaderv2.30.0.exe 86 PID 2320 wrote to memory of 628 2320 AndroidSideloaderv2.30.0.exe 86 PID 2320 wrote to memory of 3860 2320 AndroidSideloaderv2.30.0.exe 91 PID 2320 wrote to memory of 3860 2320 AndroidSideloaderv2.30.0.exe 91 PID 2320 wrote to memory of 4196 2320 AndroidSideloaderv2.30.0.exe 93 PID 2320 wrote to memory of 4196 2320 AndroidSideloaderv2.30.0.exe 93 PID 2320 wrote to memory of 4196 2320 AndroidSideloaderv2.30.0.exe 93 PID 2320 wrote to memory of 1068 2320 AndroidSideloaderv2.30.0.exe 95 PID 2320 wrote to memory of 1068 2320 AndroidSideloaderv2.30.0.exe 95 PID 2320 wrote to memory of 1068 2320 AndroidSideloaderv2.30.0.exe 95 PID 1068 wrote to memory of 4088 1068 adb.exe 97 PID 1068 wrote to memory of 4088 1068 adb.exe 97 PID 1068 wrote to memory of 4088 1068 adb.exe 97 PID 2320 wrote to memory of 2308 2320 AndroidSideloaderv2.30.0.exe 98 PID 2320 wrote to memory of 2308 2320 AndroidSideloaderv2.30.0.exe 98 PID 2320 wrote to memory of 3348 2320 AndroidSideloaderv2.30.0.exe 99 PID 2320 wrote to memory of 3348 2320 AndroidSideloaderv2.30.0.exe 99 PID 2320 wrote to memory of 3920 2320 AndroidSideloaderv2.30.0.exe 103 PID 2320 wrote to memory of 3920 2320 AndroidSideloaderv2.30.0.exe 103 PID 2320 wrote to memory of 1636 2320 AndroidSideloaderv2.30.0.exe 105 PID 2320 wrote to memory of 1636 2320 AndroidSideloaderv2.30.0.exe 105 PID 2320 wrote to memory of 1636 2320 AndroidSideloaderv2.30.0.exe 105 PID 2320 wrote to memory of 996 2320 AndroidSideloaderv2.30.0.exe 107 PID 2320 wrote to memory of 996 2320 AndroidSideloaderv2.30.0.exe 107 PID 2320 wrote to memory of 996 2320 AndroidSideloaderv2.30.0.exe 107 PID 2320 wrote to memory of 4184 2320 AndroidSideloaderv2.30.0.exe 109 PID 2320 wrote to memory of 4184 2320 AndroidSideloaderv2.30.0.exe 109 PID 2320 wrote to memory of 4184 2320 AndroidSideloaderv2.30.0.exe 109 PID 2320 wrote to memory of 4292 2320 AndroidSideloaderv2.30.0.exe 110 PID 2320 wrote to memory of 4292 2320 AndroidSideloaderv2.30.0.exe 110 PID 2320 wrote to memory of 4292 2320 AndroidSideloaderv2.30.0.exe 110 PID 2320 wrote to memory of 1428 2320 AndroidSideloaderv2.30.0.exe 113 PID 2320 wrote to memory of 1428 2320 AndroidSideloaderv2.30.0.exe 113 PID 2320 wrote to memory of 1428 2320 AndroidSideloaderv2.30.0.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\AndroidSideloaderv2.30.0.exe"C:\Users\Admin\AppData\Local\Temp\AndroidSideloaderv2.30.0.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\7z.exe"7z.exe" x "C:\Users\Admin\AppData\Local\Temp\dependencies.7z" -y -o"C:\RSL\platform-tools" -bsp12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\7z.exe"7z.exe" x "C:\Users\Admin\AppData\Local\Temp\rclone.zip" -y -o"C:\Users\Admin\AppData\Local\Temp" -bsp12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\RSL\platform-tools\adb.exe"C:\RSL\platform-tools\adb.exe" kill-server2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4196
-
-
C:\RSL\platform-tools\adb.exe"C:\RSL\platform-tools\adb.exe" start-server2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\RSL\platform-tools\adb.exeadb -L tcp:5037 fork-server server --reply-fd 5643⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4088
-
-
-
C:\Users\Admin\AppData\Local\Temp\rclone\rclone.exe"C:\Users\Admin\AppData\Local\Temp\rclone\rclone.exe" listremotes --config vrp.download.config --inplace2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\rclone\rclone.exe"C:\Users\Admin\AppData\Local\Temp\rclone\rclone.exe" sync ":http:/meta.7z" "C:\Users\Admin\AppData\Local\Temp" --inplace --http-url https://theapp.vrrookie.xyz/ --tpslimit 1.0 --tpslimit-burst 32⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Users\Admin\AppData\Local\Temp\7z.exe"7z.exe" x "C:\Users\Admin\AppData\Local\Temp\meta.7z" -y -o"C:\Users\Admin\AppData\Local\Temp\meta" -p"gL59VfgPxoHR" -bsp12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\RSL\platform-tools\adb.exe"C:\RSL\platform-tools\adb.exe" devices2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1636
-
-
C:\RSL\platform-tools\adb.exe"C:\RSL\platform-tools\adb.exe" shell dumpsys battery2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:996
-
-
C:\RSL\platform-tools\adb.exe"C:\RSL\platform-tools\adb.exe" shell df2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4184
-
-
C:\RSL\platform-tools\adb.exe"C:\RSL\platform-tools\adb.exe" shell pm list packages -32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4292
-
-
C:\RSL\platform-tools\adb.exe"C:\RSL\platform-tools\adb.exe" shell df2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5d79a7c0a425f768fc9f9bcf2aa144d8f
SHA13da9e4c4566bd6d4efeeaf7ceab9e9e83f2f67e5
SHA2561ad523231de449af3ba0e8664d3af332f0c5cc4f09141691ca05e35368fa811a
SHA512ff650b98ecc55df6c2cb1b22221b1e71d63c01324f8a8b0f05f1497f5416131f7c33ef2ea17ed323cb2bfdbe7ae1824474544434899d2cb89e9c8c00db7dbb15
-
Filesize
71KB
MD5e6e1716f53624aff7dbce5891334669a
SHA19c17f50ba4c8e5db9c1118d164995379f8d686fb
SHA25651a61758a6f1f13dd36530199c0d65e227cd9d43765372b2942944cc3296ca2c
SHA512c47392b6f7d701e78f78e0b0ddce5508ab8d247a4095391e77cd665e955f4938e412ffcb6076534dcad287af4f78d84668496935e71b9bb46a98401522815eb9
-
Filesize
5.6MB
MD564daf7cca61d468d26a407d79a7c26a9
SHA151b451089e73c9a03e2f24ab2fc81896d48c6126
SHA256997324a38d89e3b282306bf25ccaa167c49a35850ac0ab4a169e7a15afa82fc8
SHA5125a7bd06326e8ee868a2e6c724bc74bd290acaa00f3442807d3f69489a374a13a3cb41fbaf929c79525bdac319bd9a64ecfaf3cbdb6585ae332a485e911d8370d
-
C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\ah11xjwl.newcfg
Filesize3KB
MD5c8293bc9b358629842e14ff4caa6029e
SHA107d31f9873603dc1ee89075bd85d0ba8680e9a3f
SHA2568b44620d50ba42a42c701b09da49921a89c118aba0a52b1a4b683a4dc3cde6dc
SHA5129ef6ec965d1486e1475bed7ffaa72522ea3f2b2c7d5267dd7049793bb64b0fe59d7c5c883da0c7083577d916a781066c66018ce6fcfa3ee189ee43219f7b82ed
-
C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\st1fnsju.newcfg
Filesize2KB
MD58526ebaafe9dc0828d877d547a47fee9
SHA110707c206291f540921441981d73967034860dc6
SHA256350e32a82cbc32cee29f62ef073a45208eb6f76df4fbd838bb8ccc51e38d125c
SHA512ba0141feae8cd808323ed8972fb47be5595bfd4c063f593f4635e18c439383fabb52638d66ec3bab345b45ad5fb2923afe26ec12f1f0900cd95e3118dc652063
-
C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\user.config
Filesize838B
MD56dc22626c68e39d1f7a92bc247d064fa
SHA106d72094b8ccfb2cd09e3b04fa79cd2f4efbb40c
SHA2565b1cfb327e8e4f605cdb650526ab442cc846ce97cfdc51d1da23dfecb3abdf60
SHA51209858fce9752da51c915859873510c5f115b8d2b2ffa9b3bfe8bee20b804de1fe3ef8bbe5448b2374d6089af29e9d7914e0098df675e5eef240d4f1649a0db72
-
C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\user.config
Filesize2KB
MD52551ca2a494ee18d2482c397638a3b29
SHA106fb6a0fcf448f9c55543a895173ddf83a084b99
SHA25676c9edd7324ff356bca54b0059e32869267b356f0d2029ff290e849d350e7ea9
SHA512ba4cf619c40f16394b4b9f4b15758691b9db1d834cc73177107efe8f91bad451c4cbbb15b987cd040a54ad5794b01aa0900f772518a3cc3890cd8ec81243af71
-
C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\user.config
Filesize2KB
MD521adbb8013400081b1af55efdbac38a9
SHA1a0e359ed84c6afb989d7e9dffd89dc1d01852b50
SHA2566814e431760eda918d9b347fb0cac5e851e16a26983a1675de8040bdbb5e935a
SHA512f37a90f71c939a516443f93901d01234d5303260918e34b8dababa7f0dc8b3227872e9392fecdc871e0ba8bbccd41e6ab42208b79a0ab51bb84b1c181f1aec83
-
C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\user.config
Filesize3KB
MD5129fd55a88ab9992a8b36aaa82b689a3
SHA1f6a8bcd9d3b6472f40bf66d3ef7d4a2efab30311
SHA256c7cd42b6709870a7b6449bc94777ff4948ad011148d4e183b7570b037b446e9e
SHA512fb849435a38e955658c4e47169c3fa517031c96d23fee090f0bf7b0090bdd9747ad5afd4a67720500f718413a4b9b8e9e1f193123105fab16ccbdb337c24af55
-
C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\ybpcbvtt.newcfg
Filesize2KB
MD5e5478c67e4bcd0c23233ad100150c708
SHA16d49afff53038594eb3e06ed385612f8e3c30f1d
SHA256a8e989e2be2726957bcfcc33bc122858732042d5c187d113cb0600748df2d9d1
SHA5125f39edbcfed800d9c3f721df441bd59e41e469b3985dde7e52a1e973f46771de5540af317816d8782cbdf15fc2e27953a6d7c00385797f4b346d43c0fbe35e0e
-
C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\yd4wxxsc.newcfg
Filesize3KB
MD555ca1a8516271e6143e40ba7c2ef54de
SHA151748df3a01d969ada5ed594bedfac24f7af092e
SHA256acdd128b0912946966e86ab3fadc1cc7547a05676c6b908c5327ab64af3d27a6
SHA512cd6f10cc6ad0611bfdf960308b6f0a74ef3e9deb4f55a36e78df8bed0d31b44e95cca31e66fe6e20c204394b4b03715050c824176a3bcc2d3e372dfe63b992ff
-
Filesize
1.2MB
MD51a7eaa1dab7867e15d7800ae0b5af5e3
SHA19e6d344bd8724aa1862f4254d8c42b7cc929a797
SHA256356bea8b6e9eb84dfa0dd8674e7c03428c641a47789df605c5bea0730de4aed2
SHA512a12373ec7ec4bac3421363f70cc593f4334b4bb5a5c917e050a45090220fab002c36ba8b03be81159fd70955b4680146c9469e44ddf75a901465d6b1231ee6cd
-
Filesize
5.5MB
MD554850eca0050c5468f712187828655ce
SHA130607a286efe050f9387f3127888b4073595d1a1
SHA25606e1523a9cc9be6bd9d7a33c2720519d1a071747222f044bdf0c4d590a508575
SHA51240d575da0d48f6b0ab7dbeabf68a4b40551157671e34f5669fe2627fe51d8f623e00adcff24df6abf9ea765dd02ffdcca2783b73f617ee0fb1fca1a88f0d4675
-
Filesize
30.2MB
MD5d06f4d491b8b08f35644a1d37b6e907f
SHA142bbf0ba570cd2e65564b0a7966ee7446b4c7509
SHA256ebf98d2fd6002b2404bb1e712805e8b63d967e541548ae8e88ab256606098b13
SHA512705ca1d9658d610fed1cb6744652866905977b06b5d794a124506b84d5c37a36a3dfa0e2412ba4b7a2f11a82f11a8700c06a6a7cbeb0d224a709aa2cb5ad3829
-
Filesize
83B
MD5a013a807855d864175a73f8db56eaf05
SHA1ccd8405bcfb4d5b83d3aa6b51c56f3707b534e97
SHA25677a3b8cdee01f86f3a7043296253215c4e05fd1b27a836d17c03fee0b3ec2c80
SHA5127eed4b8422b5e63e8bab01365b42cacb8f1c16a70000de22e4e2879ca13d044e1c7a04974c4bb9ebdd7b7ba1eb5f4fb061260662e9216190b7677a843d0360a8
-
Filesize
24B
MD595ecadb6472bf8d2b5e29c19ff7b6aec
SHA1d418d8d05f1cac3547d233744d765c2100c53f26
SHA256922180290a957b2db5cbd885f952df998245de0cbc9c0795a58c93c86f20c530
SHA512c8c31b23989f5392a25d32b2fd1c14c8ad3cdb58117c509ec33ff7a70b3551a5914c0882c593b27ef36e6e96ce86b490d96d9bf5261b9094799ebd874864e3a7
-
Filesize
12B
MD55db92c491778fc426d102a6cdccde39d
SHA1725c01af9d4fe1f53a8f22da3185c6fb0fbfa417
SHA256124a4f8420dae0a5ebf04ce715399de35dbc8817143225113e4f6f05f6c6f524
SHA512ecd97119339b44c8e7eebcbf4604ef40edca13edc5ade502def9b840e477943c401acb2ed420f13c4e9091d00e88639b327924dde2ee60c9abb3c68b09e06214
-
Filesize
187KB
MD5468ddcadd5efe272c3de0bd189330e64
SHA1370c4f4985f3aadb9dfb69c39a19d1d139e3aae6
SHA256cbb0afb20bb89d02a3572533a02aae1121244a0efbb6fe72ac6bcb40a7e196f1
SHA5120a9206d7a8daa8163dfd85a220d5f8a8b3d40e76f42a4b88be7a0ce50748c6d9b36c621d78ee6ebf70a6910cb896a2c2aa25cf1649e63c0834ba2e8bdaba0cfe
-
Filesize
270KB
MD5b214f2f0196baf9a3c7846fc151b27dd
SHA164fc3a8ea2fbfeff0bb9a024bc7f1053f2893044
SHA2569dc4f17f1777adbfb20528bda920fc95f13c8cdbdaf9d3681777171915fca465
SHA5125482688f3ff7361d206c1edaad379d24072e62cb0a6473beb95e77681d142fdb8a29ed24c14f7b522e3e06e8248d3577a163c60e4a9d0e34adb2d10c69a30a50
-
Filesize
2.7MB
MD5500a6699c3901b0c93ff2a71ec3b4375
SHA132958268a418a23cb48ebbd98636d739429302c6
SHA256701f21c773776610c012740d1e99429b16490d09c1a9fcd870203724deb538ad
SHA512412fadb84e9787f26256715670cc501809301ce6c5dfa2d157a3887c4801f8e4f6bfacee0d886240b8e5a32036d4b23cb8522dd0e1a6f7edcccdc8e35bf5ff4a
-
Filesize
2.2MB
MD5a2615e31d5e8a4fd1c43f95c15e416f0
SHA1b6d2b4491f6a2f4111fe246623881ced39939edd
SHA256943c4b42b1914bfc98b822317e068c4c4f61525bc914d160775e8e7400206ee9
SHA5128e3a514ba05e83133c48a93af55cd26735932f569dc18beea60de7c84617df6645a428408b9d7fa22069c89036dc8dc91e9e73abaacf90617d13cf757e19e57a
-
Filesize
87KB
MD55772d853963d55d09674b71a3d9cdd9f
SHA1f2121894e9609885573cede6495ff4e14e00a83e
SHA2561bbd86a8ad5dde0ed29d8f13294f607c4c61d95af8ae46be683eb9c2b1a56c09
SHA512246ff67de109f4a3a1f395f89a2e6e07395a1065b3ddbef6875de6c6bb69781331d500f701a9db1faf4fa7834eaae3d46a2a7a525b7b83092b2d1d6e1736431f
-
Filesize
2.5MB
MD51a66854721f4431f57d691845cbbb99e
SHA1a2689e2a63d7f60f737cedfb411518d3cc7ac67f
SHA2563e435c81cc364a3c6f1d5f9305f03dbf5152e85f445c9354cc16b30654fd444e
SHA512171f289fbc94bab66ae3233335a022820b91fddc5fd2b1f9a9ade7e48e7474aacb3400c40424a85203d17cb3c36730fa69ae278bf65f4dbeb1834b246898a94b
-
Filesize
20.3MB
MD5eae00849accd0d8d902eda140aee7238
SHA1f6a3ca9091e099df1df1e56640ae93fa24c6acb7
SHA256117b99441024607d6043e274c7fcbed64d07ad87347d17dd0a717bdc1c59716b
SHA51280a3bde49a66c24ea97421591f3fbf0dd4b35af47c20f11ecd379a41cf5d64e7260144e6a01f74bfaf856bda38b82f9b34b98bdde28efef6bcd03a232f3547a7